Documente Academic
Documente Profesional
Documente Cultură
June 2007
Know
Have
Are
93 million identity records reported lost or stolen since ChoicePoint in Feb. 2005
Source: Privacy Rights Clearinghouse
End users are not satisfied with existing 2 factor authentication methods because of:
Time based solution with no control over One Time Passwords generation Life time of token is set Expensive proprietary solution One device = one application. No room for flexibility
Corporate card
SIM card
Why?
High value information Password resets
Insider threats
Telecommuting
http://www.gemalto.com
http://www.protiva.gemalto.com/
Physical Access:
Secure access with Card form factor to buildings http://www.netsolutions.gemalto.com/
Technology:
Java and .NET Smart Cards Tokens with no set life time (change battery) Cards Card readers Included software with true anti-phishing capability
Logon
Remote Access
Secure E-mail
Microsoft partner Gemalto "has done a super job on this," said Gates. "We will be using their smart cards internally - each employee will use those to get in and out of the buildings as we used to connect to our machines. We're requiring them. We will completely replace passwords." Bill Gates, keynote address IT Forum, Copenhagen 2004
Computer Lock
Gemalto
Secure Computing
$175
$475 $333 $156 $170
Not available
RSA
Incumbent, helped define the market Well known, name brand Well entrenched at many end users Time Based Proprietary technology
Thank you!