Entrust Sales Conference 2014 Template

Download Report

Transcript Entrust Sales Conference 2014 Template

Financial Institutions Identity
Based Security
Sam Linford
Territory Manager
Who is Entrust?
Market Leader In
Secure Identities
& Transactions
Known for
Innovation
Proven Market
Penetration &
Customer Reliance
© Entrust, Inc. All rights reserved.
o One software platform to create, manage and leverage identities
o Across mobile, cloud, physical and logical environments
o Delivered via cloud and on-premise software options
o Leader in authentication, certificate management, encryption
and PKI technology
o Pioneered new capabilities in cloud, mobile and eGovernment
o More than 100 patents granted or pending
o 5,000 customers in 85 countries, with more than 500 million
secure identities
o Diversified customer base including financial institutions,
governments and enterprises
o Globally, more than half of all ePassports utilize Entrust
2
7/7/2015
Entrust, Part of Datacard Group
© Entrust, Inc. All rights reserved.
3
7/7/2015
With a customer retention rate more than
Who is Entrust?
95%, we like to say we are known
byInthe customers
we
keep.
Market Leader
o One software platform
to create,
manage, and leverage identities
Identity-Based
Security
Known for
Innovation
Proven Market
Penetration &
Customer
Reliance
© Entrust, Inc. All rights reserved.
o Across mobile, cloud, physical, and logical environments
o Delivered via cloud and on-premise software options
o Leader in authentication, certificate management, encryption,
and public key infrastructure technology
o Pioneered new capabilities in Cloud, Mobile, and eGovernment
o Over 100 patents granted or pending
o 5,000 customers in 85 countries, with over 500 million secure
identities
o Diversified customer base including financial institutions,
governments, and enterprises
o Globally, over half of all ePassports utilize Entrust
o 95% average customer renewal rate
4
7/7/2015
© Entrust, Inc. All rights reserved.
5
7/7/2015
The Problem
Evolving Sophistication of the Threat Landscape
SMS Bypass
Man-in-the-Middle
Distributed Denial
of Service (DDoS)
State-Sponsored
Attacks
Organized Crime
Hacktivists
DNS
Poisoning
Man-in-the-Browser
Spear-Phishing
© Entrust, Inc. All rights reserved.
6
Advanced Persistent
Threats (APTs)
7/7/2015
Today’s Threats are Focused on
Stealing or Compromising Identities
MITB / MITM / DDoS
Integrity attack – appear as the real
identity
ZITMO / MITMO
Compromise mobile SMS, photos, &
contacts
HTML Injection
Identity stolen through injected fields
Key Logging
Identity and actions compromised
Session-Riding / Token-Stealing
Identity integrity is compromised
DNS Poisoning
URL identity is compromised
DIGITAL IDENTITY
© Entrust, Inc. All rights reserved.
7
7/7/2015
The Problem
Millions of Malicious Programs
Malware Variants: An Arms Race
161
In Millions
100
Total Malware
67
New Malware
For the Years Ended Dec. 31, 2003 – 2013
1
2
2
3
2003
2004
2005
2006
48
9
2007
61
35
18
31
12
18
18
2008
2009
2010
2011
2012
2013
Source: AV_TEST GmbH
© Entrust, Inc. All rights reserved.
8
7/7/2015
© Entrust, Inc. All rights reserved.
9
7/7/2015
Regulatory Demands
o BSA / AML / KYC
o PCI
o FFIEC – Authentication in an Internet Banking Environment
o 2005, 2011
© Entrust, Inc. All rights reserved.
PCI
© Entrust, Inc. All rights reserved.
11
7/7/2015
Diverse Demands Across The Enterprise
o Identities across multiple Line Of Business
o Retail, Wholesale, High net worth, Investment
o Channels / services
o Traditional: Web, ATM, Voice,
o Mobile: introduces new security challenges
o P2P payments, RDC, EMV
o Securing internal identities
o Employee identities
o Websites, applications, servers, ATM’s / kiosks
o Mergers, acquisitions, geographic expansion
Constant challenge to meet both user experience and security needs
© Entrust, Inc. All rights reserved.
Constant And Rapid Pace Of Change
Has Led To Authentication Silos
o Array of authentication approaches
o
o
o
o
o
o
o
o
Device fingerprinting & IP Geo
Knowledge-based authentication
OTP based
Certificate-based auth.
Fraud monitoring
Out of band notification & verification
Transaction signing
Voice biometric authentication
Challenges:
• Highly complex and expensive to manage
• Point solutions are hard to adapt to new threats
• Significant effort to build a cohesive cross-channel UX
© Entrust, Inc. All rights reserved.
© Entrust, Inc. All rights reserved.
14
7/7/2015
What Are We To Do?
Protecting Identities Solves The Problem
Authenticate & Secure Identities of
People
Apps
Devices
15
Machines
Servers
What Are We To Do?
Protecting Identities Solves The Problem
To Ensure Identities are Authorized to
Conduct
Transactions
Access
Networks
Cross
Borders
16
Enter
Facilities
Control
Infrastructure
Entrust Solutions
© Entrust, Inc. All rights reserved.
17
7/7/2015
How We Solve It
Entrust Portfolios
3 Key Portfolios
o Authentication &
Fraud Detection
o Digital Certificates & PKI
o Secure Cloud Services
© Entrust, Inc. All rights reserved.
18
7/7/2015
A True Software Authentication Platform
© Entrust, Inc. All rights reserved.
19
7/7/2015
A Software Authentication Platform that Addresses
Multiple Domains
Flexibility
Ease of Use
Physical/Logical
Mobile
APIs & SDKs
Federation
Self-Service
Cloud
Authentication
Suite
Integrations
Web Admin
OTA
© Entrust, Inc. All rights reserved.
20
7/7/2015
MOBILE
a game changer
© Entrust Inc. All Rights Reserved.
21
July 7, 2015
What Makes Mobile Secure?
o Signed / vetted applications (stores)
o Application sand-boxing architecture on device
o Ability to block use of persistent / shared memory
o Security controls can be embedded into applications
o digital identities that cannot be stolen / guessed, PIN protected apps.
o Microphones, cameras, GPS can be leveraged
o Fragmented ecosystem compared to desktop browsers
o Divers OS platforms; vendor-specific mobile applications
Mobile: a challenging attack vector for criminals to make a profit
© Entrust, Inc. All rights reserved.
Mobile Transactions Are Growing
P2P payments will be a big
impetus to grow mobile
banking Source: Aite Group
37% commercial today
71% consumer today
Source: Aite Group
© Entrust Inc. All Rights Reserved.
23
July 7, 2015
Entrust IdentityGuard
Take Advantage of the Mobile Evolution
Leverage the Device
Secure the Device
o Strong
Authentication
o Desktop
Malware Protection
o Mobile
Smart Credentials
o Transaction-Signing
© Entrust, Inc. All rights reserved.
o Identities &
Transactions
o Device Certificates
o MDM Integration
o Application Protection
o Analytics
24
7/7/2015
Leveraging Mobile For Malware / MITB Protection
❼ Transaction is completed
❶ Transaction initiated from user
Compromised with desktop Malware?
❸ Transaction
detailssent
retrieved
❷ Notification
over“Out
secure
of connection
Band”
❻ Signed transaction is sent1.to User initiatives online transaction
IdG for verification
Transactions can be:
• Wire transfers
❹ User reviews transaction
• ACH payments
on phone/ tablet
❺ Transaction is digitally signed
• Stock trade
• Change of account information
using mobile application
• Unlimited # of rows
(OATH or x.509)
Risk Mitigation
Trusted Advisor Recommendations
Desktop Malware
Analytics
Protection
MDM
Integration
Device
Certificates
Application
Protection
Soft Token
Authentication
Grid
Authentication
Transaction
Signing
Smart
Credential
Legend
Secure
Mobile
Leverage
Mobile
SMS
Authentication
Business Value
Transactionguard
“Front door” access and in session transactional details
User behavior profiling AND Web access behavior
Blend of rules and statistical learning
27
27
Case Study
© Entrust, Inc. All rights reserved.
28
7/7/2015
Multi-function
Multi-Factor
Multi-application
Cross-sector
© Entrust, Inc. All rights reserved.
29
Cross Jurisdiction
7/7/2015
© Entrust, Inc. All rights reserved.
30
7/7/2015
© Entrust, Inc. All rights reserved.
31
7/7/2015
© Entrust, Inc. All rights reserved.
32
7/7/2015
Proud Winner of Two
2014 SC Magazine Awards
“Best Multifactor Solution”
“Best Fraud Prevention
Solution”
33
With a customer retention rate more than
Who is Entrust?
95%, we like to say we are known
byInthe customers
we
keep.
Market Leader
o One software platform
to create,
manage, and leverage identities
Identity-Based
Security
Known for
Innovation
Proven Market
Penetration &
Customer
Reliance
© Entrust, Inc. All rights reserved.
o Across mobile, cloud, physical, and logical environments
o Delivered via cloud and on-premise software options
o Leader in authentication, certificate management, encryption,
and public key infrastructure technology
o Pioneered new capabilities in Cloud, Mobile, and eGovernment
o Over 100 patents granted or pending
o 5,000 customers in 85 countries, with over 500 million secure
identities
o Diversified customer base including financial institutions,
governments, and enterprises
o Globally, over half of all ePassports utilize Entrust
o 95% average customer renewal rate
34
7/7/2015
©35
Entrust, Inc. All rights reserved.
7/7/2015