SlideShare une entreprise Scribd logo
1  sur  18
Digital Security& Privacy

     Redefined
Digital Risks&Opportunities

Risks                          Opportunities
 Electronic & Identity Fraud     New & Secure Digital Identity
                                 New Hack-Resistant Security
 Cyber Attacks, Espionage
                                 Platform
 Rapidly Changing Business       Protects: Users Transactions;
 Environments                    Communications and Digital
                                 Assets
 Competitive Landscape
                                 Built-in Security: Apps; Cloud
                                 Services;Internet &Mobile
                                 Payments…etc
The Whole Solution
• FrontOnetakes care of security across all layers and
  all components facilitating a digital exchange under
  one unified platform.
   • Digital Identity: Dynamic; Non-Transferable
   • Authentication: Continuous Mutual Authentication
   • Data Verification: Device Centric Digital Signature – Offers
     of a physical element activated by user action.
   • Data Protection: Encryption key is unique for each dataset.
     Access to protected data is bi-directional requiring action
     from both server and client. Add our patented 3A-Key for a
     true end-to-end security solution that is hard to match.
Digital Identity

• Others
  • Static Identities: Password or One Time Password
  • Vulnerabilities:Phishing, Malware, etc
  • Fact:Cyber Criminals – HAVE MASTERED THE ART OF
    STEALING DIGITAL IDENTITIES.

• FrontOne
  • Dynamic Identity: PHISHING & MALWARE - DEFEATED
Authentication
• Others
  • Login – One Time User Authentication
  • Vulnerabilities:Authenticated Session - HIJACKED
  • Fact: HACKERS CIRCUMVENT TWO-FACTOR STRONG
    AUTHENTICATION – WITH EACH PASSING DAY TWO-
    FACTOR AUTHENTICATION BECOMES INCREASINGLY
    LESS SECURE.

• FrontOne
  • Continuous Mutual Authentication: MAN IN THE MIDDLE, MAN
    IN THE BROWSER - DEFEATED
Data Verification

• Others
  • Out Of Band Verification
  • Vulnerabilities:Data Leaks, Vishing, Man In The
    Mobile, etc.
  • Fact:ZeuS, SpyeyeMitmo found in the wild, attack banks

• FrontOne
  • User Authorization At Personal Device: NO DATA LEAKS -
    VISHING &MITMo - DEFEATED
Data Protection
• Others
  • Transparent Data Encryption
  • Vulnerabilities:Level 7 Attacks and Security Breaches
  • Consensus:IF YOU ARE TARGETED YOU WILL BE
    BREACHED

• FrontOne
  • Dynamic, User Centric Security Key Management
    &Controls:Systematic Failure Is Prevented – The Risks Of
    Security Breaches Are Mitigated
Secure End to End
• User End
  – 3AKey: USB HID Key (no storage)
  – Smartphone App (Virtual Connection)
• Application Server End
  – Zero Knowledge proof API
• JANUS Server/Service End
  – Random, Dynamic Element
  – User Centric Data Protection
FrontOne Innovations
• “Future Proofs” its solutions by introducing a dynamic elementinto
  every transaction thereby outmaneuvering adversaries.

• Provides a secure conduit between a user, FrontOne‟s Server
  and Content/Service Provider that allows a „zero knowledge‟
  digital exchange to be complete with a high level of security and
  confidentially.

• Mitigates the risks of unauthorized access to protected data by
  introducing user/device centric key management.

• FrontOne empowers organizations and users to take charge and
  be in control of digital identities, assets and transactions.
FrontOne Digital Signature

                                Cert
                        SID
                                                  ADynamic Element In
                              Hash                Every Transaction –
                                                  Outmaneuvers Adversaries




                                                                             FrontOne
   Message                Dynamic                   Hash                      Digital
                            Key                                              Signature



Important note: The data may be the same but our digital signature is not!
Privacy Preserving Identification
                Application          JANUS
                 business             API
                   logic
                          Service
                          Provider




                          Zero
                        Knowledge
                          Proof
        User/
                                             JANUS
        3AKey
                   Ea:>> Identity Token
                   Secure signaling path
                   (if & when required)
The Why, What and How
• Why We Need Something Better
  1. Identity Theft:Phishing, Key-Logger, Malware …
  2. Financial Fraud - Financial Malware,MITM, MITMO…
  3. IP and Data Theft - APT, Zero Days, Insider…
  4. Commercial Espionages and Economic Terrorists …
• What We have Done and How
Security Feature Comparison
               Product Name/           3AKEY or   Smartcard    OTP       PKI
             Feature Description       SmartKey    USB PKI    Token   Certificate
Strong Authentication (2FA)               Y          Y         Y
Multiple Credential Support               Y          Y
Two-Way Authentication                    Y          Y                    Y
Protect Against Client Side Attacks       Y
Offline Mutual Authentication             Y
Transaction Signing                       Y          Y                    Y
Transaction Verification                  Y
Server Task Authorization                 Y
User-Centric Key For Data Protection      Y
Device ID& Verification                   Y
Physical Control (not accessible          Y
digitally)
Applications
• FrontOne‟s Dynamic Digital Identity (ZERO KNOWLEDGE) –
  With simplistic user controls, here is the value proposition:
   1. New hack-resistant digital identities for cloud and enterprise
      applications.
   2. Advanced transaction security in internet banking and “card not
      present” transactions.
   3. Advanced Data Protection for Enterprise &The Cloud
   4. Advanced Mobile Payment Solution
   5. Secure Electronic Voting
   6. Many other digital security, privacy compliance and risk mitigation
      applications
FAQ - 1
• How is your solution compared with others?
Traditional layered security has limited effectiveness
   against new and emerging threats as attackers exploit
   weaknesses between uncoordinated layers to steal
   data or modify transactions.
FrontOne provides a unified security platform that delivers
   true end-to-end security. It starts by providing a secure
   digital credential, followed by continuous authentication
   with device centric data protection ultimately giving a
   user the final say in authentication.
FAQ - 2
• Will your solution protect users and transactions if a
  system is already infected?
   1. Yes.
   2. FrontOne provides true end-to-end security without being
      dependent. It has been designed with the assumption
      that a user‟s computer has been compromised with
      unknown malware or may be at a future date.
   3. Our solution provides a secure transaction environment
      for a broad range of applications.
FAQ - 3
• What about x.509 or PKI, isn‟t it the best?
   1. This technology is based on trust whereas FrontOne‟s solution
      takes trust out of the equation. Our solution returns security
      and control to our clients.
   2. Compliance is not equal to security.Most if not all companies
      that suffered security breaches were in “compliance” before
      falling victim to attacks.
   3. Both x.509 are PKI are dumb in that they react to commands.
      There is no active authentication.
   4. Extremely vulnerable to padding oracle attacks (recovers
      private certificate from physical device).
Are we finally ready to accept that the certificate system is completely broken?
Questions


mailto: Poy.chen@frontone.com

Contenu connexe

Tendances

Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business EthicsRahul Sharma
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public SafetyAdam Lewis
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationOKsystem
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 

Tendances (18)

Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
test
testtest
test
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 

En vedette

java.io - fluxos (streams) e arquivos
java.io - fluxos (streams) e arquivosjava.io - fluxos (streams) e arquivos
java.io - fluxos (streams) e arquivosMarcello Thiry
 
Genius or Chimpanzee?
Genius or Chimpanzee?Genius or Chimpanzee?
Genius or Chimpanzee?economystique
 
василий шукшин
василий шукшинвасилий шукшин
василий шукшинnolfin10
 
Rcc monthly project report 11 12
Rcc monthly project report 11 12Rcc monthly project report 11 12
Rcc monthly project report 11 12senthil667
 
هذه مدينة القدس
هذه مدينة القدس هذه مدينة القدس
هذه مدينة القدس hams-compo
 
Невозможное - это шанс проявить себя!
Невозможное - это шанс проявить себя!Невозможное - это шанс проявить себя!
Невозможное - это шанс проявить себя!nolfin10
 
Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!
Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!
Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!ctmctoman
 
Valor Monetário Esperado - VME (Série Gerência de Projetos)
Valor Monetário Esperado - VME (Série Gerência de Projetos)Valor Monetário Esperado - VME (Série Gerência de Projetos)
Valor Monetário Esperado - VME (Série Gerência de Projetos)Marcello Thiry
 
UF2 NF1 La pell i les seves alteracions 2011 2012 Diapositives
UF2 NF1 La pell i les seves alteracions 2011 2012 DiapositivesUF2 NF1 La pell i les seves alteracions 2011 2012 Diapositives
UF2 NF1 La pell i les seves alteracions 2011 2012 Diapositivesmts275
 
java.io - streams and files
java.io - streams and filesjava.io - streams and files
java.io - streams and filesMarcello Thiry
 
피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한
피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한
피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한nevereska
 
Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)Marcello Thiry
 
Expected Monetary Value - EMV (Project Management Series)
Expected Monetary Value - EMV (Project Management Series)Expected Monetary Value - EMV (Project Management Series)
Expected Monetary Value - EMV (Project Management Series)Marcello Thiry
 
Software Engineering - Introduction and Motivation (Marcello Thiry)
Software Engineering - Introduction and Motivation (Marcello Thiry)Software Engineering - Introduction and Motivation (Marcello Thiry)
Software Engineering - Introduction and Motivation (Marcello Thiry)Marcello Thiry
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 

En vedette (19)

Ppt final
Ppt finalPpt final
Ppt final
 
java.io - fluxos (streams) e arquivos
java.io - fluxos (streams) e arquivosjava.io - fluxos (streams) e arquivos
java.io - fluxos (streams) e arquivos
 
Genius or Chimpanzee?
Genius or Chimpanzee?Genius or Chimpanzee?
Genius or Chimpanzee?
 
василий шукшин
василий шукшинвасилий шукшин
василий шукшин
 
Rcc monthly project report 11 12
Rcc monthly project report 11 12Rcc monthly project report 11 12
Rcc monthly project report 11 12
 
Sri Lanka vs Turkey
Sri Lanka vs TurkeySri Lanka vs Turkey
Sri Lanka vs Turkey
 
هذه مدينة القدس
هذه مدينة القدس هذه مدينة القدس
هذه مدينة القدس
 
Невозможное - это шанс проявить себя!
Невозможное - это шанс проявить себя!Невозможное - это шанс проявить себя!
Невозможное - это шанс проявить себя!
 
Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!
Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!
Efectul nociv al consumului de substanțe etnobotanice asupra tinerilor!
 
Edrei2
Edrei2Edrei2
Edrei2
 
Valor Monetário Esperado - VME (Série Gerência de Projetos)
Valor Monetário Esperado - VME (Série Gerência de Projetos)Valor Monetário Esperado - VME (Série Gerência de Projetos)
Valor Monetário Esperado - VME (Série Gerência de Projetos)
 
Better than New
Better than NewBetter than New
Better than New
 
UF2 NF1 La pell i les seves alteracions 2011 2012 Diapositives
UF2 NF1 La pell i les seves alteracions 2011 2012 DiapositivesUF2 NF1 La pell i les seves alteracions 2011 2012 Diapositives
UF2 NF1 La pell i les seves alteracions 2011 2012 Diapositives
 
java.io - streams and files
java.io - streams and filesjava.io - streams and files
java.io - streams and files
 
피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한
피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한
피지워터 PR기획안 (2011년 KPR 공모전) - 윤서한
 
Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)Software engineering principles (marcello thiry)
Software engineering principles (marcello thiry)
 
Expected Monetary Value - EMV (Project Management Series)
Expected Monetary Value - EMV (Project Management Series)Expected Monetary Value - EMV (Project Management Series)
Expected Monetary Value - EMV (Project Management Series)
 
Software Engineering - Introduction and Motivation (Marcello Thiry)
Software Engineering - Introduction and Motivation (Marcello Thiry)Software Engineering - Introduction and Motivation (Marcello Thiry)
Software Engineering - Introduction and Motivation (Marcello Thiry)
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similaire à Digital Security and Privacy Redefined with FrontOne's Unified Platform

Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationMarketingArrowECS_CZ
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxArchana833240
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeCore Security
 

Similaire à Digital Security and Privacy Redefined with FrontOne's Unified Platform (20)

Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authentication
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Digital Security and Privacy Redefined with FrontOne's Unified Platform

  • 2. Digital Risks&Opportunities Risks Opportunities Electronic & Identity Fraud New & Secure Digital Identity New Hack-Resistant Security Cyber Attacks, Espionage Platform Rapidly Changing Business Protects: Users Transactions; Environments Communications and Digital Assets Competitive Landscape Built-in Security: Apps; Cloud Services;Internet &Mobile Payments…etc
  • 3. The Whole Solution • FrontOnetakes care of security across all layers and all components facilitating a digital exchange under one unified platform. • Digital Identity: Dynamic; Non-Transferable • Authentication: Continuous Mutual Authentication • Data Verification: Device Centric Digital Signature – Offers of a physical element activated by user action. • Data Protection: Encryption key is unique for each dataset. Access to protected data is bi-directional requiring action from both server and client. Add our patented 3A-Key for a true end-to-end security solution that is hard to match.
  • 4. Digital Identity • Others • Static Identities: Password or One Time Password • Vulnerabilities:Phishing, Malware, etc • Fact:Cyber Criminals – HAVE MASTERED THE ART OF STEALING DIGITAL IDENTITIES. • FrontOne • Dynamic Identity: PHISHING & MALWARE - DEFEATED
  • 5. Authentication • Others • Login – One Time User Authentication • Vulnerabilities:Authenticated Session - HIJACKED • Fact: HACKERS CIRCUMVENT TWO-FACTOR STRONG AUTHENTICATION – WITH EACH PASSING DAY TWO- FACTOR AUTHENTICATION BECOMES INCREASINGLY LESS SECURE. • FrontOne • Continuous Mutual Authentication: MAN IN THE MIDDLE, MAN IN THE BROWSER - DEFEATED
  • 6. Data Verification • Others • Out Of Band Verification • Vulnerabilities:Data Leaks, Vishing, Man In The Mobile, etc. • Fact:ZeuS, SpyeyeMitmo found in the wild, attack banks • FrontOne • User Authorization At Personal Device: NO DATA LEAKS - VISHING &MITMo - DEFEATED
  • 7. Data Protection • Others • Transparent Data Encryption • Vulnerabilities:Level 7 Attacks and Security Breaches • Consensus:IF YOU ARE TARGETED YOU WILL BE BREACHED • FrontOne • Dynamic, User Centric Security Key Management &Controls:Systematic Failure Is Prevented – The Risks Of Security Breaches Are Mitigated
  • 8. Secure End to End • User End – 3AKey: USB HID Key (no storage) – Smartphone App (Virtual Connection) • Application Server End – Zero Knowledge proof API • JANUS Server/Service End – Random, Dynamic Element – User Centric Data Protection
  • 9. FrontOne Innovations • “Future Proofs” its solutions by introducing a dynamic elementinto every transaction thereby outmaneuvering adversaries. • Provides a secure conduit between a user, FrontOne‟s Server and Content/Service Provider that allows a „zero knowledge‟ digital exchange to be complete with a high level of security and confidentially. • Mitigates the risks of unauthorized access to protected data by introducing user/device centric key management. • FrontOne empowers organizations and users to take charge and be in control of digital identities, assets and transactions.
  • 10. FrontOne Digital Signature Cert SID ADynamic Element In Hash Every Transaction – Outmaneuvers Adversaries FrontOne Message Dynamic Hash Digital Key Signature Important note: The data may be the same but our digital signature is not!
  • 11. Privacy Preserving Identification Application JANUS business API logic Service Provider Zero Knowledge Proof User/ JANUS 3AKey Ea:>> Identity Token Secure signaling path (if & when required)
  • 12. The Why, What and How • Why We Need Something Better 1. Identity Theft:Phishing, Key-Logger, Malware … 2. Financial Fraud - Financial Malware,MITM, MITMO… 3. IP and Data Theft - APT, Zero Days, Insider… 4. Commercial Espionages and Economic Terrorists … • What We have Done and How
  • 13. Security Feature Comparison Product Name/ 3AKEY or Smartcard OTP PKI Feature Description SmartKey USB PKI Token Certificate Strong Authentication (2FA) Y Y Y Multiple Credential Support Y Y Two-Way Authentication Y Y Y Protect Against Client Side Attacks Y Offline Mutual Authentication Y Transaction Signing Y Y Y Transaction Verification Y Server Task Authorization Y User-Centric Key For Data Protection Y Device ID& Verification Y Physical Control (not accessible Y digitally)
  • 14. Applications • FrontOne‟s Dynamic Digital Identity (ZERO KNOWLEDGE) – With simplistic user controls, here is the value proposition: 1. New hack-resistant digital identities for cloud and enterprise applications. 2. Advanced transaction security in internet banking and “card not present” transactions. 3. Advanced Data Protection for Enterprise &The Cloud 4. Advanced Mobile Payment Solution 5. Secure Electronic Voting 6. Many other digital security, privacy compliance and risk mitigation applications
  • 15. FAQ - 1 • How is your solution compared with others? Traditional layered security has limited effectiveness against new and emerging threats as attackers exploit weaknesses between uncoordinated layers to steal data or modify transactions. FrontOne provides a unified security platform that delivers true end-to-end security. It starts by providing a secure digital credential, followed by continuous authentication with device centric data protection ultimately giving a user the final say in authentication.
  • 16. FAQ - 2 • Will your solution protect users and transactions if a system is already infected? 1. Yes. 2. FrontOne provides true end-to-end security without being dependent. It has been designed with the assumption that a user‟s computer has been compromised with unknown malware or may be at a future date. 3. Our solution provides a secure transaction environment for a broad range of applications.
  • 17. FAQ - 3 • What about x.509 or PKI, isn‟t it the best? 1. This technology is based on trust whereas FrontOne‟s solution takes trust out of the equation. Our solution returns security and control to our clients. 2. Compliance is not equal to security.Most if not all companies that suffered security breaches were in “compliance” before falling victim to attacks. 3. Both x.509 are PKI are dumb in that they react to commands. There is no active authentication. 4. Extremely vulnerable to padding oracle attacks (recovers private certificate from physical device). Are we finally ready to accept that the certificate system is completely broken?

Notes de l'éditeur

  1. This diagram show the composition of message used for the purpose of secure identification.
  2. This diagram illustrate the paths and signals in completing a zero knowledge digital transactions.
  3. The hardware security devices market has been dominated by Onetime password device for some time, but the wide spread of Malware has changed that. In the past couple of years, we saw the increasing adoption of USB token and Smartphone based App, with the goal of better integration with the application to enhance transaction security. Most of these products and solution are based on smartcard and PKI technology. There is no question that these devices and solution increased the barrier of attack. However, it remain vulnerable to attacks as because the system is based on blind trust, and the system is very complicated, therefore most implementation does not include real time certificate verifications. As the result, we have seen report on Trojan in the wild already able to compromise PKI based authentication. It come as no surprise from a technological perspective, the system has designed to operates with or without user, certainly, does not consider user control as a security criteria. Thus resulting a fatal flaw, because it can not provide a physical component that is not accessible digitally.This comparison table also illustrate the many addition security features that are absent from other hardware security devices but is critical for providing a secure transaction environment for all kind of digital exchanges.
  4. http://www.pcworld.com/businesscenter/article/249242/verisign_hacked_what_we_dont_know_might_hurt_us.htmlhttp://nakedsecurity.sophos.com/2012/02/02/verisign-hacked/http://www.huffingtonpost.com/2012/02/02/verisign-hack_n_1249275.htmlhttp://blog.cryptographyengineering.com/2012/06/bad-couple-of-years-for-cryptographic.htmlhttp://arstechnica.com/security/2012/06/securid-crypto-attack-steals-keys/http://hal.inria.fr/docs/00/70/47/90/PDF/RR-7944.pdf
  5. http://www.pcworld.com/businesscenter/article/249242/verisign_hacked_what_we_dont_know_might_hurt_us.htmlhttp://nakedsecurity.sophos.com/2012/02/02/verisign-hacked/http://www.huffingtonpost.com/2012/02/02/verisign-hack_n_1249275.htmlhttp://blog.cryptographyengineering.com/2012/06/bad-couple-of-years-for-cryptographic.htmlhttp://arstechnica.com/security/2012/06/securid-crypto-attack-steals-keys/http://hal.inria.fr/docs/00/70/47/90/PDF/RR-7944.pdf