Secure Access. Every User. Every Time.

gabonesedestructionSoftware and s/w Development

Feb 17, 2014 (3 years and 5 months ago)

59 views

Secure Access. Every User. Every Time.

Why Strong Authentication?

People write
them down

People are
deceived into
giving them up

People share
passwords
with friends

People use
software to
steal them

People watch
other people
type them

Passwords alone are just not enough!

Enterprise Strong Authentication: Large
Addressable Market


Local Authentication
Users
-

270M

Remote Access
Users


90M

IDC: remote access market, year
-
over
-
year growth rate of 34% through 2010

360M WW Knowledge Workers



18M (20%)


2
-
Factor
Adoption

8M (3%)


2
-
Factor
Adoption



7% have 2
nd

factor today



93% of market available

Enterprise Authentication Market Trends

VPN

Security
-
Market Drivers

Number of Users

Low

High

Regulatory Mandate

Single
Sign
-
on

Remote Mail
(OWA)

Portal
(Sharepoint)

SaaS

(
Salesforce
)

Local
Authentication

Early Adopters

30%
CAGR

Regulation

2
-
Factor
Authentication
Mandate

Citrix Platinum Edition

Access
Gateway

Password
Manager

Presentation
Server


Virtual desktop

Focused GTM

Opportunistic

Web
Interface

The State of Strong Authentication Today

Knowledge Based
(KBA)

Challenge / Response


Verifies information
from/about the user

What you know

What is your favorite food?


What is your favorite movie?


But…

Susceptible to social
engineering attack

Hard to remember even
more information

One Time Passwords

(OTP)


Verifies the device
held by the user

What you have


But…

Expensive to manage and
provision

Can be lost, stolen, or
forgotten

Biometrics

Verifies the user

What you are

Fingerprint

Iris

Voice


But…

Expensive to purchase and
deploy specialized hardware

Hardware to manage and
maintains

Tokens / Cards

BioPassword’s Unique Biometric Software

Requires no change in user
behavior

Easily deploys across the
enterprise or the Internet

Accurately verifies the user

Biometric Authentication

Advantages

Requires no special hardware to
manage or distribute


Biometric solution based on repetitive
pattern of typing on a keyboard

Keystroke Dynamics (KD)

Keystroke Biometrics

Rhythm cannot be shared, lost,
stolen or forgotten

Imposters rejected 99.2% despite holding correct
password

Legitimate users granted access 98% without need
for backup authentication method

http://www.tolly.com/DocDetail.aspx?DocNumber=207233



BioPassword
-

Over 99% Accurate

Complementary Authentication Options

Authentication Options

KBA/OTP with BioPassword

KBA for in
-
band authentication option

Easily deployed into web and
enterprise environments


Multiple factors to deliver high security
for all access methods


every time

Keystroke

Biometrics

OTP for out
-
of
-
band authentication
option

Broad coverage of access points

Eliminates the denial of access to
legitimate users

Combination is the strongest
authentication solution

OTP

KBA

Challenge/
Response

Keystroke

Biometrics

BioPassword Best Authentication Option

Cost of Ownership

Level of Security

Authentication

Curve

High Cost/

Low Security

High Cost/

High Security

Low Cost/

Low Security

Low Cost/

High Security

Fingerprint

Scanner

Physical

Biometrics

Tokens/

Smart Cards

Weak

Passwords

Knowledge Based
Authentication

Strong

Passwords

Computer

Profiling


High

(Worst)



Low

(Best)


Low


High

Software OTP

Strong Authentication
Software


Keystroke biometrics


Knowledge based
authentication


Software OTP

What you know

What you have

What you are

Local

Thin

Client

Customer Facing

Applications

BioPassword Solution: Breadth of Coverage

Internet

Applications

Outlook Web Access

Citrix Web Interface

Local PC

Authentication

Server(s)

11

BP Auth Software

Offline PC

Intranet/Portal
Applications

Remote Access (VPN)

Citrix Access Gateway

Juniper

F5

VPN

VPN Appliance

Enterprise SSO

Enterprise

Enterprise Edition

Internet Edition

Internet

Citrix

Web

BioPassword
-

Citrix Ready Integration




Presentation Server


Web Interface


Access Gateway Advanced


Access Gateway Enterprise


Password Manager


Citrix Thin Clients (w/XPe)


Wyse


HP


Neoware

Integrated/tested with:


Global

Toyota

Morgan Stanley

Walt Disney

First Data

Fiserv

Dominos


Europe

ARE Local Authority

Citec

LaFarge





Not for External Publication

Select BioPassword Customers

14

Customers in

Finance

Manufacturing

Healthcare

Energy

Government





Education

Select BioPassword Customers

15

Mark Upson

President and CEO


marku@biopassword.com

1605 NW Sammamish Road

Issaquah, WA 98027

See it in action…

Why Strong Authentication?

People write
them down

People are
deceived into
giving them up

People share
passwords
with friends

People use
software to
steal them

People watch
other people
type them

Passwords alone are just not enough!

Most troubling …



By the end of 2007,
75% of enterprises will be
infected with
undetected
,
financially motivated
,
targeted malware that evaded their traditional
perimeter and host defenses.

The threat
environment is changing


financially motivated,
targeted attacks are increasing, and automated
malware
-
generation kits allow simple creation of
thousands of variants quickly


but our security
processes and technologies haven't kept up
.”


Gartner's
Top Predictions for IT Organizations and users, 2007 and
Beyond


Select Customers

18

Select Customers

Customers in

Finance

Ecommerce

Healthcare

Energy

Government



State



Local

Education

BioPassword Enterprise Edition for
Citrix Environments

Password Manager for
Single Sign
-
On

Presentation Server Applications

Access Gateway VPNs for
Remote Access