Documente Academic
Documente Profesional
Documente Cultură
Increased cyberattacks
Market
disruption
Increased
mobility
Stricter
compliance
Cost
pressures
Compliance
requirements represent
a never-ending effort for
IT and security teams in
banks
Increased competition in
many segments serves
to intensify pricing
pressures
Increased threats
x2
The number of breaches in
the financial services sector
almost doubled between 2014
and 2015
60.4m
x3.1
3.1-fold increase in
malicious mobile programs
Market disruptions
27%
29%
49%
Increased mobility
Not willing to
compromise on security
Demanding
convenience
Stricter compliance
Cost pressures
Security from the Edge to the Core Addressing a Banks Entire Ecosystem
eBanking
Transaction
Processing
Enterprise
Security
eBanking
Retail banking
Corporate banking
eCommerce
Transaction Processing
Transaction
processing and
verification
eInvoicing, for
example for crossborder value-added
tax (VAT)
management
Inter-bank
transactions
Enterprise Systems
Safeguarding access
for local and remote
employees, including
those logging in to
virtual private networks
(VPNs)
Protecting
cardholder data
and other sensitive
assets in
databases
Reducing the
scope of efforts
required to comply
with PCI DSS and
other mandates
Securing sensitive
data in file shares
How does Layered Security from the Edge to the Core work ?
Encryption and
key management
Authentication and
transaction signing
16
Authentication
Fraud Management
Data Encryption
Endpoint protection
End users interact with their bank through several digital channels
smartphones, tablets, laptops. It is essential for banks to
establish safeguards across all devices. Controls need to be in
place to establish the authenticity and integrity of devices before
sensitive data is accessed or transactions are conducted.
Fraud management
Sophisticated cyber-attacks are an ever-present threat for banks. Fraud management which
offers end-to-end transaction monitoring and seamlessly integrates with the other security
layers provides protection for bank customers and back end systems.
u33
Office
u42[2]1
Slide 22
u33
This slide still needs to be improved, but I don't know what to suggest..
user, 1/7/2016
u42
Can you create a diagram that represents all the Identity and Data Protection solutions for banks?
user, 3/25/2016
eBanking Solutions
SOLUTION OVERVIEW
ARMORED
BROWSER
ENDUSER
DEVICES
AUTH
SERVERS
DEVICE
IDENTIFICATI
ON
DEVICE
REPUTATION
TRUSTED
USER
INTERFACE
EMBEDDED
SES/TEE
AUTHENTICATION &
TRANSACTION SIGNING
BIOMETRY
BEHAVIOU
R ANALYSIS
CALL
BACK
Q&A
PASSWORDS
PARTNERSHIP
FRAUD MANAGEMENT
GEMALTO
FRAUD
MANAGEMENT
EZIO E2E
ENCRYPTION
HSM
SafeNet Network
Encryption products
SafeNet PIN
Delivery
Transaction security
and Encryption
SOLUTION OVERVIEW
Key Storage
Network
Attached
HSM
Embedded
HSM
USB
Attached
HSM
Cloud HSM
Customizable
HSM
26
SafeNet Authentication
Service
SafeNet Encryption
Connectors
SafeNet KeySecure
Encryption
Solutions
SOLUTION OVERVIEW
Structured Data Encryption
Database
Encryption
Application
Data
Encryption
File
Encryption
Application
Data
Encryption
Tokenization
Transparent
Data
Encryption
Transparent
Data
Encryption
Key Manager
Key Manager
Cloud Encryption
Virtual Instance
Key Manager
Virtual Key
Manager
28
28
Enterprise
Authentication
Solutions
SOLUTION OVERVIEW
AUTHENTICATION
Management
Soft
OTP
Federation
PW
Vault
Enterpris
e ID
Social ID
OTP
OOB
Smartcard
USB
Context
Grid
SIM
TEE
Passw
ord
Bluetooth
SINGLE SIGN-ON
SSO
Portal
Desktop
Mobile
BYOI
Government
ID
FIDO
MOBILE ID
IDAAS
Provisioning
PAM
Authorization
Directory
Integration
29
Tokenization
ProtectDB
ProtectFile
ProtectApp
ProtectV
Application
Servers
Databases
Web & Application
Servers
30
30
Encryption
13.06.16
File Servers
& Shares
Virtual Machines
Tokenization
Manager
Payment
Transactions
ProtectApp
ProtectFile
ProtectDB
StorageSecure
ProtectV
Ethernet
Encryption
SIEM Tools
KeySecure or
Virtual KeySecure
Email Gateway
Luna HSM or
Cloud HSM
Customer KMIP
Client
SSL Webserver
File & Disk
Encryption
Doc
Signing
Cloud Storage
& Encryption
Gateways
Crypto Management
32
Security
Provide bestbest-inin-class security
technologies to enable banks
to prevent fraud and attacks
Ensure the right level of
security across all digital
channels
33
User convenience
Gemalto solutions are
customercustomer-centric and
designed with usability in
mind
Gemalto solutions allow
frictionless consumer
experience with the right
balance of visible and
invisible security thanks to
silent authentication
Compliance
Gemaltos solutions allow
banks to comply with the
most demanding standards
and regulations in a costcostefficient manner.
Competitiveness
Gemaltos solutions enable
banks to streamline their
operation costs by adapting
their marketing mix
Thank you
Sheung-Chi NG
APAC
Sheungchi.Ng@safenet-inc.com
Jun 2016