SlideShare une entreprise Scribd logo
1  sur  10
Strong Authentication for All!
The situation Our digital life is driven by insecure passwords ,[object Object]
Phishing issues, Trojans, spyware…
“Login / Password” too easily compromised
“Lost password” recovery issue
Hard to remember and manageInadequate user experience…
Remote network access is the top priority…
Strong authentication is the solution Current situation to protect network access: 1) “Login / Password combination”: “what I know” - Obsolete and insecure - Boring for users 2) Strong authentication with physical devices: “what I own” - USB tokens; smartcards; OTP tokens (one time password); PKI:…are all inadequate for users 3) Biometrics: “what I am” - Privacy issues - You cannot “reset” compromised fingerprints! Nothing is offered to enhance the user’s experience!
Our value proposition “A new approach to enhance the strong authentication user’s experience with SECURITY & SIMPLICITY.  We recognize the devices your user already owns...”
The Digital DNA technology offer Strong Authentication for All! 1°) Remote access protection for private and public networks : VPN SSL, Extranets, Webmails, Web sites.. 2°) For almostevery vertical markets: Corporate, Finance, e-banking, Healthcare, e-commerce, social networks, etc.

Contenu connexe

Tendances

NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S)- The Worldwide IOT Based Security System  MerchantNewDVR(S)- The Worldwide IOT Based Security System  Merchant
NewDVR(S)- The Worldwide IOT Based Security System MerchantNewDVR(S) Pte Ltd
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsRemo Hardeman
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Tehnologija ni nevtralna
Tehnologija ni nevtralnaTehnologija ni nevtralna
Tehnologija ni nevtralnaDomen Savič
 
Near field communication
Near field communicationNear field communication
Near field communicationParamvir Singh
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

Tendances (19)

Ethical hacking demo
Ethical hacking demoEthical hacking demo
Ethical hacking demo
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
Anvizcase t60
Anvizcase t60Anvizcase t60
Anvizcase t60
 
NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S)- The Worldwide IOT Based Security System  MerchantNewDVR(S)- The Worldwide IOT Based Security System  Merchant
NewDVR(S)- The Worldwide IOT Based Security System Merchant
 
Presentation
PresentationPresentation
Presentation
 
Portfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - EngelsPortfolio Omerta Information Security - Engels
Portfolio Omerta Information Security - Engels
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT Security Trends during COVID-19
IoT Security Trends during COVID-19IoT Security Trends during COVID-19
IoT Security Trends during COVID-19
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Tehnologija ni nevtralna
Tehnologija ni nevtralnaTehnologija ni nevtralna
Tehnologija ni nevtralna
 
Cyber security
Cyber security Cyber security
Cyber security
 
Stand options
Stand optionsStand options
Stand options
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Near field communication
Near field communicationNear field communication
Near field communication
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 

En vedette

Kynangbanhang 8952
Kynangbanhang 8952Kynangbanhang 8952
Kynangbanhang 8952bigbigpro
 
Why All Retailers Will Have a Mobile Application !
Why All Retailers Will Have a Mobile Application !Why All Retailers Will Have a Mobile Application !
Why All Retailers Will Have a Mobile Application !TigerAppCreator
 
Login People The Digital Dna Brochure Fr
Login People The Digital Dna Brochure FrLogin People The Digital Dna Brochure Fr
Login People The Digital Dna Brochure FrFredericPaumier
 
Jezus de Nazarener
Jezus de NazarenerJezus de Nazarener
Jezus de Nazarenergoedbericht
 

En vedette (7)

Nicole 1975 1982
Nicole 1975 1982Nicole 1975 1982
Nicole 1975 1982
 
Activities
ActivitiesActivities
Activities
 
Kynangbanhang 8952
Kynangbanhang 8952Kynangbanhang 8952
Kynangbanhang 8952
 
Lesson plan vi
Lesson plan viLesson plan vi
Lesson plan vi
 
Why All Retailers Will Have a Mobile Application !
Why All Retailers Will Have a Mobile Application !Why All Retailers Will Have a Mobile Application !
Why All Retailers Will Have a Mobile Application !
 
Login People The Digital Dna Brochure Fr
Login People The Digital Dna Brochure FrLogin People The Digital Dna Brochure Fr
Login People The Digital Dna Brochure Fr
 
Jezus de Nazarener
Jezus de NazarenerJezus de Nazarener
Jezus de Nazarener
 

Similaire à Login People Digital Dna 5mn Corporate June2011 En

Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfaoneonlinestore1
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxMuddasarahmed5
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Information security
 Information security Information security
Information securityJin Castor
 

Similaire à Login People Digital Dna 5mn Corporate June2011 En (20)

Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
a)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdfa)In the words of Snowden properly Imlemented strong crypto system.pdf
a)In the words of Snowden properly Imlemented strong crypto system.pdf
 
Information security
Information securityInformation security
Information security
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Financial services 20150503
Financial services 20150503Financial services 20150503
Financial services 20150503
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Octopus Authentication Platform
Octopus Authentication PlatformOctopus Authentication Platform
Octopus Authentication Platform
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online Security
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Information security
 Information security Information security
Information security
 

Login People Digital Dna 5mn Corporate June2011 En

  • 2.
  • 4. “Login / Password” too easily compromised
  • 6. Hard to remember and manageInadequate user experience…
  • 7. Remote network access is the top priority…
  • 8. Strong authentication is the solution Current situation to protect network access: 1) “Login / Password combination”: “what I know” - Obsolete and insecure - Boring for users 2) Strong authentication with physical devices: “what I own” - USB tokens; smartcards; OTP tokens (one time password); PKI:…are all inadequate for users 3) Biometrics: “what I am” - Privacy issues - You cannot “reset” compromised fingerprints! Nothing is offered to enhance the user’s experience!
  • 9. Our value proposition “A new approach to enhance the strong authentication user’s experience with SECURITY & SIMPLICITY. We recognize the devices your user already owns...”
  • 10. The Digital DNA technology offer Strong Authentication for All! 1°) Remote access protection for private and public networks : VPN SSL, Extranets, Webmails, Web sites.. 2°) For almostevery vertical markets: Corporate, Finance, e-banking, Healthcare, e-commerce, social networks, etc.
  • 11. Technology at a glance Compliant with all web standards
  • 13. About us LOGIN PEOPLE®, creator of the Digital DNA technology offers to its clients access control security solutions for private and public networks. The Digital DNA technology® helps users to be authenticated both by what they know (their PIN code) and what they own (a laptop, a smartphone, a USB key). The user chooses which equipment they wish to use as an authentication token. LOGIN PEOPLE® provides an answer to the “Login / Password” weakness and helps fight against identity theft, password sharing, and theft of personal or sensitive data on networks. LOGIN PEOPLE is listed at NYSE Euronext Paris (code: MLLP).
  • 14. Contact LOGIN PEOPLES.A. (France) LOGIN PEOPLEINC (USA) New YorkPO Box 737352. Elmhurst. New York 11373. Tel : +1 917.406.5470 San Francisco 26 O’Farrell Street San Francisco, CA 94006 Sophia Antipolis (Headquarters)Buropolis2 1240, route des Dolines Sophia Antipolis06560 Valbonne Tél : +33(0)4 93 33 06 66 Fax : +33(0)4 93 67 58 45Paris 8, passage Brulon 75012 Paris Tél : +33(0)1 82 83 36 83 Fax : +33(0)9 88 77 66 55 www.loginpeople.com