SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
All about
ICT Security
A leading ICT integrated security company
which offers you safe and pleasant security experiences
Mobile/ IoT Security
As a leading Mobile/ IoT integrated security company,
it is committed to enhance global Security IQ (SQ: Security IQ)
SECURITY
MOBILE
Next-Generation Integrated Authentication Service
It creates the best consumer values by developing leading technologies
such as FinTech and biometric authentication
in the next-generation authentication service sector
****
R&D/Analysis Education on Security Technology
As a part of WhiteHat’s talent nurturing program,
it is committed to reinforce professional competency of security personnel
in the financial, public, and business sectors, thereby
leading the future of the information security industry
COMPANY
OVERVIEW
Who We Are
Our Story
AWARDS GLOBAL
RaonSecure has its business philosophy in its name which refers to “Raon” meaning “pleasure” in Korean
and an English word “Secure”
Ministerial Awards from the Ministry of Science, ICT, and Future
Planning on the 3rd
Information Protection Day
Grand Prize awarded at the 14th
Mobile Technology
USIM Smart Authentication hosted by the Ministry of Science,
ICT, and Future Planning
TouchEn OnePass was FIDO-certified
Official partnership with Samsung Electronics KNOX
Accredited for its cooperation with the U.S. Apple in developing
MDM solution technology
Launched RaonSecure Inc.
Launched Security education program and Raon WhiteHat center
Accredited for its cooperation with the U.S. Apple in developing
MDM solution technology
Registered as Samsung Electronics S.E.A.P. Gold Partner
·
·
·
·
·
·
·
·
·
Launched the nation’s first mobile token
‘USIM Smart Authentication Service’ together
with telecommunications company
Raon WhiteHat center, designated as a training partner agency
for the 1st
Cyber Security Talent Nurturing Program (K-Shield)
by the Ministry of Science, ICT, and Future Planning-KISA
·
·
2012 2013
·
·
·
·
·
·
·
·
·
·
Raon WhiteHat center, designated as a training partner agency
for the 2nd
Cyber Security Talent Nurturing Program (K-Shield)
by the Ministry of Science, ICT, and Future Planning-KISA
Cooperation contracts with Samsung Electronics
in providing MDM solution dedicated to KNOX
and in the business and marketing
Ministerial Awards from the Ministry of Science, ICT,
and Future Planning on the 3rd
Information Protection Day
Designated as a member business in providing technological
support such as monitoring weakness in security technology
to the National Security Research Institute under Electronics
and Telecommunications Research Institute (ETRI)
MDM TouchEn mGuard was CC-certified
Launched an USIM Smart Authentication service for three major
telecommunications companies
Launched a NX-based integrated security solution
Raon WhiteHat center, designated as a training partner agency
for the 3rd
Cyber Security Talent Nurturing Program (K-Shield)
by the Ministry of Science, ICT, and Future Planning-KISA
Launched Biometric authentication-based
simple authentication/payment solution
International FIDO-certified
2014 2015
COMPANY OVERVIEW
BUSINESS
PORTFOLIO
Our Approach
The approach that builds our business
As the No.1 in solution&service business and mobile security,
the company has up-to-date technology
SERVICE
Security service for smartphone authentication certificates
Mobile phone electronic signature service
Research on security technology
Education on security technology
Real-time attack and defense system
SOLUTION
Mobile/ Smartphone Security
Network/ PKI Security
PC Security/ Non-ActiveX
BIO Simple Authentication/ Payment
Integrated authentication/ Authority/ Account management
Privacy Protection
BUSINESS PORTFOLIO
BUSINESS
PORTFOLIO
SOLUTION
BUSINESS PORTFOLIOSOLUTION
Mobile device management(MDM/MAM) Application forgery protection
An optimal MDM/MAM solution for mobile device management
in a mobile office and BYOD environment
A strong decompile prevention feature based on obfuscation
Application security which provides prevention solution
by disabling the operation in case of application forgery
Mobile Virtual Keypad Mobile Vaccine
The nation’s first virtual keypad solution for smartphone
The only solution compatible with all the web browsers
and smartphone applications
The nation’s first mobile vaccine solution for smartphone
Own a system which analyzes malignant code through research
by WhiteHat
Mobile OTP Mobile Web Electronic Signature
Mobile OTP solution which creates one-time password
through smartphone
Mobile SSO
The nation’s first mobile-based SSO
A solution which allows electronic signature on a mobile web
without installing Active X and Plug-in
Support banking and electronic payment services through
authentication certificates on all mobile webs
Mobile/ Smartphone Security
A solution which blocks the leakage of corporate
and private information through smart devices
Smartphone, Mobile device management
(MDM/MAM) – TouchEn mGuard
Optimal MDM/MAM solution which blocks the leakage of corporate and private information
in a mobile/BYOD environment
BUSINESS PORTFOLIOSOLUTION
Mobile device management
Integrated device management such as mobile device, user, corporate APP installation status,
access to device information
Central management of the status of BYOD and corporate phone
Provide a real-time monitoring on major MDM items and statistics by type
Provide an efficient Smart Office environment by strengthening security management
on mobile device
·
·
·
·
·
·
·
Block screen capture when operating mobile Office
Apply device security policy when accessing to security zone by connecting
to access control system
Prevent an illegal use by remote controlling when lost and stolen, deleting important data,
and tracking location
Prevent corporate information leakage
· Provide an on-premise APP Store to enable the central distribution/management
of my business APP
On-premise APP Store
Prevent corporate information leakage
Electronic subscription service
Mobile office
Access control system
Interconnecting security policy
to on-premise mobile services
Protecting assets of a company
by controlling mobile services
·
·
BUSINESS PORTFOLIOSOLUTION
PC Security / Non-ActiveX
An online security solution which safely protects
a user PC and a financial transaction environment
Keyboard security
A keyboard security solution which fundamentally prevents
a hacking attempt to intercept keyboard input
Provide its own E2E security
Personal PC firewall
Virtual Keyboard
Firewall/ vaccine solution which protects the user’s important
information from external risks
A solution which blocks hacking risks by allowing data input
on virtual keyboard only by mouse input
Provide its own E2E security
BUSINESS PORTFOLIOSOLUTION
Password authentication/electronic signature
Password/authentication/electronic signature solution between
web sections and various devices
Mobile password authentication
/electronic signature
A security solution which provides password/authentication
/electronic signature in moving/copying authentication
and other mobile environments
PKI Security
A security solution for wire/wireless network
Integrated authentication security
/FIDO-based BIO authentication
Effective management through an integrated platform of various authentication services
Provide an authentication service with guaranteed convenience and security
FIDO-based BIO authentication solution
A next-generation authentication solution which reconfirms user
identification on the server after verifying it in a safe hardware
security domain of the user’s smart device
Integrated authentication/authority
/account management
A solution for enterprise integrated authentication/authority
/account management in a PC and Mobile environment
- SSO (Single Sign On)
An applied security solution which allows access to various business
systems and services through single sign on when an external
/internal user needs to access multiple application servers
- EAM (Extranet Access Management)
As a security solution which controls the access of a user according
to the user’s rank, specialty, and authority, it is operated
by a set policy and an integrated authentication server
FIDO-based BIO Authentication
-TouchEn OnePass
A safe and simply BIO authentication solution without password
Provide a secure user authentication service which is applied to various online services
such as online backing, easy payment, game, and portal
BUSINESS PORTFOLIOSOLUTION
·
·
·
·
·
·
Work flow
****
Server
PIN, authentication,
fingerprint, face, iris
card company, portal,
shopping mall, game
Deliver verified
results only
Accord with
verified results
User smartphone (device)
Convenient
authentication
Facilitate a user’s access to service
by adopting simple but strong alternative
authentication technology
Expand the profit of the agency using
the service by eliminating additional
authentication procedures
such as SMS and ARS
Prevent personal information leakage by
storing a user’s authentication information
in a secure domain of the device
Provide various scalability such as
fingerprint, face, iris, and Secure PIN
The world’s first proven solution which
retains security and international
compatibility by winning FIDO CertifiedTM
in the field FIDO Client, Server,
ASM/Authenticator
Simple and safe authentication through
biometric authentication without
memorizing ID and Password of each
online service
BUSINESS
PORTFOLIO
SERVICE
RAON WHITEHAT CENTER
Research and education on security technology led by the world’s best WhiteHat
Elite white hackers give a lecture on up-to-date and practical hacking security techniques
to working-level security personnel
Elite white hackers provide a security audit service such as analysis on system weakness,
mock hacking, and security assessment
BUSINESS PORTFOLIOSERVICE
Research and publication
on recent hacking security technology
and security weakness
·
Awarded at multiple hacking
competitions home and abroad
The best white hacker lecturers
Effective curriculums
·
·
·
Up-to-date security to virtual business system
Application of attack and defense scenarios
Maximization of working-level security
performance through education
and establishment of a real-time attack
and defense system
·
·
·
Research
on security
technology
Education
on security
technology
Real-time
attack/defense
system
Maximizing security performance
through security technology education
The first Korean team winning
the world-class hacking competition
The best white hacker lecturers
Work flow
BIO Simple Authentication Service
Strengthened user identification service through BIO Simple Authentication
An occupied authentication service based on FIDO (PIN, BIO: fingerprint, face, voice, etc.)
and smartphone USIM
A Solution to security problems of the current 2nd
authentication (personal information leakage, inability
to identify SMS sender and reviver, weakness in delivering plaintext SMS)
Simple and fast authentication through fingerprint and other biometric authentications which mitigates
the inconvenience of entering SMS verification code
BUSINESS PORTFOLIOSERVICE
BIO simple authentication service
Authentication when
accessing account
2nd
authentication when
transferring money
·
·
· · ·Joining online membership
website Finding ID/Password
User identification when
purchasing products through
online shopping mall
User identification when
using easy payment
****
Enter
BIO information
Occupied authentication
completed
Deliver signature value,
phone number,
identification number
User identification through
telecommunications
company
BIO simple authentication
completed
CARD
PKI/ Network
security
Personal
information
protection
FinTech
security
Raon
WhiteHat
Mobile
security
Non-ActiveX
PC security
Management of smartphone device
(MDM/MAM)
Mobile vaccine
Mobile virtual keypad
Mobile phone electronic signature
Smart school MDM
Mobile OTP
Mobile SSO
APP fraud prevention
Virtual keyboard
Mobile WEB electronic signature
Electronic signature
Mobile password authentication
/ electronic signature
XML security
Accredited for international
standard technology
FIDO Certified TM
Smart OTP
User identification service
Device identification/security
FIDO simple authentication
Non-face to face
user identification
Online firewall/ vaccineKeyboard security
DB security
Healthcare security
Real-time attack/ defense system
(Cyber War Room)
자체 개발한 ‘PKI 기반의 터널링 기법’을 적용하여 키보드 입력시점부터
어플리케이션 영역까지 전 구간에서 입력 정보 유출을 차단합니다.
자체 E2E 구현하여 보안성 강화
IoT
security
Integrated
authentication
service
Service
RAONSECURE
Solution Map
A partner of K-Shield talent accreditation
education program
Research
on security technology
Education
on security technology
USIM smart authentication
REFERENCES
Our Customers
It has secured a majority of customers in the financial and public sectors based on its proven technology
and experiences in the ICT integrated security market. More than 500 businesses and 30 million individual
customers in the public, financial, and business sectors are using our products and services
REFERENCES
500
Client
30,000,000
Customers
(6-7F Revessant B/D) 6, Bongeunsa-ro 86-gil, Gangnam-gu, Seoul, Korea
www.raonsecure.com / blog.raonsecure.com
Tel. 822 561 4545 Fax : 822 548 5350
Copyright(C)RAONSECURE All rights reserved

Contenu connexe

Tendances

IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief Mestizo Enterprises
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Trlfilliat
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...Identive
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile ConnectFIDO Alliance
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital idCapgemini
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Investorideas.com
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecurityAndreas Leicher
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 

Tendances (20)

IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
IP UtiliNET ©Fusitronics Facial Biometric Systems Application Brief
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...Identive | Press Release | Identive Opens the Door to Physical Access with NF...
Identive | Press Release | Identive Opens the Door to Physical Access with NF...
 
FIDO & Mobile Connect
FIDO & Mobile ConnectFIDO & Mobile Connect
FIDO & Mobile Connect
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
A digital society needs a digital id
A digital society needs a digital idA digital society needs a digital id
A digital society needs a digital id
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Nxtd
NxtdNxtd
Nxtd
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network Security
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 

En vedette

Why FIDO Matters: Digital Government Services
Why FIDO Matters: Digital Government ServicesWhy FIDO Matters: Digital Government Services
Why FIDO Matters: Digital Government ServicesFIDO Alliance
 
2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido AllianceCOMPUTEX TAIPEI
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
ARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidKan-Han (John) Lu
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.NextMark Diodati
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in KoreaFIDO Alliance
 
Technical Overview of FIDO Solution
Technical Overview of FIDO SolutionTechnical Overview of FIDO Solution
Technical Overview of FIDO SolutionForgeRock
 
Open Standards in Identity Management
Open Standards  in  Identity ManagementOpen Standards  in  Identity Management
Open Standards in Identity ManagementPrabath Siriwardena
 

En vedette (9)

Why FIDO Matters: Digital Government Services
Why FIDO Matters: Digital Government ServicesWhy FIDO Matters: Digital Government Services
Why FIDO Matters: Digital Government Services
 
2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance2014 IoT Forum_ Fido Alliance
2014 IoT Forum_ Fido Alliance
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
ARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidARM: Trusted Zone on Android
ARM: Trusted Zone on Android
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
FIDO’s fit for Key Industries in Korea
 FIDO’s fit for Key Industries in Korea FIDO’s fit for Key Industries in Korea
FIDO’s fit for Key Industries in Korea
 
Technical Overview of FIDO Solution
Technical Overview of FIDO SolutionTechnical Overview of FIDO Solution
Technical Overview of FIDO Solution
 
Open Standards in Identity Management
Open Standards  in  Identity ManagementOpen Standards  in  Identity Management
Open Standards in Identity Management
 
FIDO in Windows10
FIDO in Windows10FIDO in Windows10
FIDO in Windows10
 

Similaire à raonsecure_en_min

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Mobile Security Blanco/Ueda
Mobile Security Blanco/UedaMobile Security Blanco/Ueda
Mobile Security Blanco/UedaFernando Blanco
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company BrochureDictao
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitAlan Quayle
 
Mobile technologies know your customers
Mobile technologies  know your customersMobile technologies  know your customers
Mobile technologies know your customersMyles Freedman
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactionslfilliat
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 

Similaire à raonsecure_en_min (20)

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Mobile Security Blanco/Ueda
Mobile Security Blanco/UedaMobile Security Blanco/Ueda
Mobile Security Blanco/Ueda
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Mbs w21
Mbs w21Mbs w21
Mbs w21
 
Mobile technologies know your customers
Mobile technologies  know your customersMobile technologies  know your customers
Mobile technologies know your customers
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Cidway Securing POS Transactions
Cidway Securing POS TransactionsCidway Securing POS Transactions
Cidway Securing POS Transactions
 
Computer's project
Computer's projectComputer's project
Computer's project
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 

raonsecure_en_min

  • 1. All about ICT Security A leading ICT integrated security company which offers you safe and pleasant security experiences
  • 2. Mobile/ IoT Security As a leading Mobile/ IoT integrated security company, it is committed to enhance global Security IQ (SQ: Security IQ) SECURITY MOBILE Next-Generation Integrated Authentication Service It creates the best consumer values by developing leading technologies such as FinTech and biometric authentication in the next-generation authentication service sector **** R&D/Analysis Education on Security Technology As a part of WhiteHat’s talent nurturing program, it is committed to reinforce professional competency of security personnel in the financial, public, and business sectors, thereby leading the future of the information security industry
  • 4. Who We Are Our Story AWARDS GLOBAL RaonSecure has its business philosophy in its name which refers to “Raon” meaning “pleasure” in Korean and an English word “Secure” Ministerial Awards from the Ministry of Science, ICT, and Future Planning on the 3rd Information Protection Day Grand Prize awarded at the 14th Mobile Technology USIM Smart Authentication hosted by the Ministry of Science, ICT, and Future Planning TouchEn OnePass was FIDO-certified Official partnership with Samsung Electronics KNOX Accredited for its cooperation with the U.S. Apple in developing MDM solution technology Launched RaonSecure Inc. Launched Security education program and Raon WhiteHat center Accredited for its cooperation with the U.S. Apple in developing MDM solution technology Registered as Samsung Electronics S.E.A.P. Gold Partner · · · · · · · · · Launched the nation’s first mobile token ‘USIM Smart Authentication Service’ together with telecommunications company Raon WhiteHat center, designated as a training partner agency for the 1st Cyber Security Talent Nurturing Program (K-Shield) by the Ministry of Science, ICT, and Future Planning-KISA · · 2012 2013 · · · · · · · · · · Raon WhiteHat center, designated as a training partner agency for the 2nd Cyber Security Talent Nurturing Program (K-Shield) by the Ministry of Science, ICT, and Future Planning-KISA Cooperation contracts with Samsung Electronics in providing MDM solution dedicated to KNOX and in the business and marketing Ministerial Awards from the Ministry of Science, ICT, and Future Planning on the 3rd Information Protection Day Designated as a member business in providing technological support such as monitoring weakness in security technology to the National Security Research Institute under Electronics and Telecommunications Research Institute (ETRI) MDM TouchEn mGuard was CC-certified Launched an USIM Smart Authentication service for three major telecommunications companies Launched a NX-based integrated security solution Raon WhiteHat center, designated as a training partner agency for the 3rd Cyber Security Talent Nurturing Program (K-Shield) by the Ministry of Science, ICT, and Future Planning-KISA Launched Biometric authentication-based simple authentication/payment solution International FIDO-certified 2014 2015 COMPANY OVERVIEW
  • 6. Our Approach The approach that builds our business As the No.1 in solution&service business and mobile security, the company has up-to-date technology SERVICE Security service for smartphone authentication certificates Mobile phone electronic signature service Research on security technology Education on security technology Real-time attack and defense system SOLUTION Mobile/ Smartphone Security Network/ PKI Security PC Security/ Non-ActiveX BIO Simple Authentication/ Payment Integrated authentication/ Authority/ Account management Privacy Protection BUSINESS PORTFOLIO
  • 8. BUSINESS PORTFOLIOSOLUTION Mobile device management(MDM/MAM) Application forgery protection An optimal MDM/MAM solution for mobile device management in a mobile office and BYOD environment A strong decompile prevention feature based on obfuscation Application security which provides prevention solution by disabling the operation in case of application forgery Mobile Virtual Keypad Mobile Vaccine The nation’s first virtual keypad solution for smartphone The only solution compatible with all the web browsers and smartphone applications The nation’s first mobile vaccine solution for smartphone Own a system which analyzes malignant code through research by WhiteHat Mobile OTP Mobile Web Electronic Signature Mobile OTP solution which creates one-time password through smartphone Mobile SSO The nation’s first mobile-based SSO A solution which allows electronic signature on a mobile web without installing Active X and Plug-in Support banking and electronic payment services through authentication certificates on all mobile webs Mobile/ Smartphone Security A solution which blocks the leakage of corporate and private information through smart devices
  • 9. Smartphone, Mobile device management (MDM/MAM) – TouchEn mGuard Optimal MDM/MAM solution which blocks the leakage of corporate and private information in a mobile/BYOD environment BUSINESS PORTFOLIOSOLUTION Mobile device management Integrated device management such as mobile device, user, corporate APP installation status, access to device information Central management of the status of BYOD and corporate phone Provide a real-time monitoring on major MDM items and statistics by type Provide an efficient Smart Office environment by strengthening security management on mobile device · · · · · · · Block screen capture when operating mobile Office Apply device security policy when accessing to security zone by connecting to access control system Prevent an illegal use by remote controlling when lost and stolen, deleting important data, and tracking location Prevent corporate information leakage · Provide an on-premise APP Store to enable the central distribution/management of my business APP On-premise APP Store Prevent corporate information leakage Electronic subscription service Mobile office Access control system Interconnecting security policy to on-premise mobile services Protecting assets of a company by controlling mobile services · ·
  • 10. BUSINESS PORTFOLIOSOLUTION PC Security / Non-ActiveX An online security solution which safely protects a user PC and a financial transaction environment Keyboard security A keyboard security solution which fundamentally prevents a hacking attempt to intercept keyboard input Provide its own E2E security Personal PC firewall Virtual Keyboard Firewall/ vaccine solution which protects the user’s important information from external risks A solution which blocks hacking risks by allowing data input on virtual keyboard only by mouse input Provide its own E2E security
  • 11. BUSINESS PORTFOLIOSOLUTION Password authentication/electronic signature Password/authentication/electronic signature solution between web sections and various devices Mobile password authentication /electronic signature A security solution which provides password/authentication /electronic signature in moving/copying authentication and other mobile environments PKI Security A security solution for wire/wireless network Integrated authentication security /FIDO-based BIO authentication Effective management through an integrated platform of various authentication services Provide an authentication service with guaranteed convenience and security FIDO-based BIO authentication solution A next-generation authentication solution which reconfirms user identification on the server after verifying it in a safe hardware security domain of the user’s smart device Integrated authentication/authority /account management A solution for enterprise integrated authentication/authority /account management in a PC and Mobile environment - SSO (Single Sign On) An applied security solution which allows access to various business systems and services through single sign on when an external /internal user needs to access multiple application servers - EAM (Extranet Access Management) As a security solution which controls the access of a user according to the user’s rank, specialty, and authority, it is operated by a set policy and an integrated authentication server
  • 12. FIDO-based BIO Authentication -TouchEn OnePass A safe and simply BIO authentication solution without password Provide a secure user authentication service which is applied to various online services such as online backing, easy payment, game, and portal BUSINESS PORTFOLIOSOLUTION · · · · · · Work flow **** Server PIN, authentication, fingerprint, face, iris card company, portal, shopping mall, game Deliver verified results only Accord with verified results User smartphone (device) Convenient authentication Facilitate a user’s access to service by adopting simple but strong alternative authentication technology Expand the profit of the agency using the service by eliminating additional authentication procedures such as SMS and ARS Prevent personal information leakage by storing a user’s authentication information in a secure domain of the device Provide various scalability such as fingerprint, face, iris, and Secure PIN The world’s first proven solution which retains security and international compatibility by winning FIDO CertifiedTM in the field FIDO Client, Server, ASM/Authenticator Simple and safe authentication through biometric authentication without memorizing ID and Password of each online service
  • 14. RAON WHITEHAT CENTER Research and education on security technology led by the world’s best WhiteHat Elite white hackers give a lecture on up-to-date and practical hacking security techniques to working-level security personnel Elite white hackers provide a security audit service such as analysis on system weakness, mock hacking, and security assessment BUSINESS PORTFOLIOSERVICE Research and publication on recent hacking security technology and security weakness · Awarded at multiple hacking competitions home and abroad The best white hacker lecturers Effective curriculums · · · Up-to-date security to virtual business system Application of attack and defense scenarios Maximization of working-level security performance through education and establishment of a real-time attack and defense system · · · Research on security technology Education on security technology Real-time attack/defense system Maximizing security performance through security technology education The first Korean team winning the world-class hacking competition The best white hacker lecturers
  • 15. Work flow BIO Simple Authentication Service Strengthened user identification service through BIO Simple Authentication An occupied authentication service based on FIDO (PIN, BIO: fingerprint, face, voice, etc.) and smartphone USIM A Solution to security problems of the current 2nd authentication (personal information leakage, inability to identify SMS sender and reviver, weakness in delivering plaintext SMS) Simple and fast authentication through fingerprint and other biometric authentications which mitigates the inconvenience of entering SMS verification code BUSINESS PORTFOLIOSERVICE BIO simple authentication service Authentication when accessing account 2nd authentication when transferring money · · · · ·Joining online membership website Finding ID/Password User identification when purchasing products through online shopping mall User identification when using easy payment **** Enter BIO information Occupied authentication completed Deliver signature value, phone number, identification number User identification through telecommunications company BIO simple authentication completed CARD
  • 16. PKI/ Network security Personal information protection FinTech security Raon WhiteHat Mobile security Non-ActiveX PC security Management of smartphone device (MDM/MAM) Mobile vaccine Mobile virtual keypad Mobile phone electronic signature Smart school MDM Mobile OTP Mobile SSO APP fraud prevention Virtual keyboard Mobile WEB electronic signature Electronic signature Mobile password authentication / electronic signature XML security Accredited for international standard technology FIDO Certified TM Smart OTP User identification service Device identification/security FIDO simple authentication Non-face to face user identification Online firewall/ vaccineKeyboard security DB security Healthcare security Real-time attack/ defense system (Cyber War Room) 자체 개발한 ‘PKI 기반의 터널링 기법’을 적용하여 키보드 입력시점부터 어플리케이션 영역까지 전 구간에서 입력 정보 유출을 차단합니다. 자체 E2E 구현하여 보안성 강화 IoT security Integrated authentication service Service RAONSECURE Solution Map A partner of K-Shield talent accreditation education program Research on security technology Education on security technology USIM smart authentication
  • 18. Our Customers It has secured a majority of customers in the financial and public sectors based on its proven technology and experiences in the ICT integrated security market. More than 500 businesses and 30 million individual customers in the public, financial, and business sectors are using our products and services REFERENCES 500 Client 30,000,000 Customers
  • 19. (6-7F Revessant B/D) 6, Bongeunsa-ro 86-gil, Gangnam-gu, Seoul, Korea www.raonsecure.com / blog.raonsecure.com Tel. 822 561 4545 Fax : 822 548 5350 Copyright(C)RAONSECURE All rights reserved