auth shield information security solution provider

Post on 18-Jul-2015

40 Views

Category:

Internet

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

INNEFU LABS“Information Security at it’s best”

ABOUT US

Information Security R&D Organization specializing in creating unique technologies and products

All technologies are indigenous and have been evaluated and approved by multiple Government Agencies

Empanelled with DRDO for providing - Two Factor Authentication Social Media Monitoring Link Analysis and Pattern Recognition

Private an

d Con

fidential -IN

NE

FU

LA

BS

CONTD.

More than Six years of experience in Information Security

Served key clients in Private and Public sector

Unique and Innovative technologies including – AuthShield - Two Factor Authentication Chronos – One Touch Malware Removal Innsight – Social Media Analysis InteleLinx - Link Analysis and Pattern Matching

Framework

Private an

d Con

fidential -IN

NE

FU

LA

BS

PATENT PENDING TECHNOLOGIES

AuthShield 2FA – One Touch Authentication integrated with Mail

solutions including POP / IMAP protocol

One Touch Authentication integrated with Database update queries for workflow management

02/27/15

4

Private an

d Con

fidential - IN

NE

FU

LA

BS

Private an

d Con

fidential -IN

NE

FU

LA

BS

SOME OF OUR GOVERNMENT CLIENTS

Delhi Police

JK PoliceMinistry of Home AffairsIndian Army

Ministry of Defense

National Investigation Agency

AP Police

UP Police

National Technical Research Organization

Chandigarh Police

SOME OF OUR CORPORATE & PSU’S CLIENTS

Private an

d Con

fidential -IN

NE

FU

LA

BS

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

7

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

8

More than 130 Licenses running in Delhi Police

SOME OF OUR PRODUCTS

“Innovation For You”

Private an

d Con

fidential -IN

NE

FU

LA

BS

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

10

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

11

AuthShield Two Factor Authentication

Hack Proof second factor of authentication to protect user’s credentials. Is integrated with multiple applications including but not limited to – •VPN•Windows Login•Internet Banking•Core Banking•Email Servers•Intranet Applications including ERP etc

BanksLarge CorporatesGovernment Organizations looking to protect their Mail ServersTelecom CompaniesSupply chain organizationsOrganizations with Distributor NetworksData Centers

AUTHSHIELD – TWO FACTOR AUTHENTICATION

Maps the physical Identity of the user against the server - 99.9% Security against user level Attacks

Identify the user based on – Something he knows (user name / password)Something in the users possessions

02/27/15

12

Private an

d Con

fidential - IN

NE

FU

LA

BS

DIFFERENT FORM FACTORS

Soft TokenSoft Token

SMS TokenSMS Token

Push TokenPush TokenMobile TokenMobile Token

Hard TokenHard Token

USB TokenUSB Token

OUR UNIQUE OFFERINGS - ONE TOUCH AUTHENTICATION – EASE OF CONVENIENCE

Integration of One Touch Authentication with POP / IMAP Protocol

Integration with One Touch Authentication for Workflow Management

CHRONOS – ONE TOUCH MALWARE REMOVAL

02/27/15

15

Private an

d Con

fidential - IN

NE

FU

LA

BS

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

16

CHRONOS – ONE TOUCH MALWARE REMOVAL

Patent Pending Technology

Only such technology of its kind

Removes any and all malware from the systems at a click of a button

Takes system back to a safe state removing all malwares while saving all data

Easy data retrieval in case of a system crash due to malware

Private an

d Con

fidential -IN

NE

FU

LA

BS

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

18

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

19

Carry out Link Analysis between multiple Call Data Records

Multiple versions including – •Client - Server architecture•Stand alone client system

Superior to any other product in the industry •Can handle large amounts if data (in 100 of GB's) quickly and seamlessly•Custom query builder •More than 100 inbuilt reports and queries which have all been customized with the inputs from different Law Enforcement Agencies

• Central Intelligence Agencies• State police Departments• Local Police stations

CASES WHERE CDR / TOWER DUMP ANALYSIS IS USEFUL

Murders

Kidnapping and Robbery cases

Identify terrorist outfits / Arms Mafia Networks

Extortion / Threat calls

Bomb Blasts

02/27/15

20

Private an

d Con

fidential - IN

NE

FU

LA

BS

INTELLIGENT DATA MANAGEMENT AND MINING SYSTEM

“Linkages between seemingly unrelated Raw Data has become one of the most crucial aspects of investigation today”

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

22

Link Disparate sets of data together to draw intelligence – •Operational Details•Interrogation Reports•Suspect Database•Crime Records

• Central Intelligence Agencies• State police Departments

FRAUD MANAGEMENT SOLUTIONS

02/27/15

23

Private an

d Con

fidential - IN

NE

FU

LA

BS

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

24

FRAUD MANAGEMENT SYSTEMSAuthShield Fraud Management Solutions – •Built on a powerful payment management platform•Single touch point to a whole world of risk data intelligence•Analytics customized to region and industry•Risk experts on multiple layers

• Banks• E-Commerce companies

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

25

02/27/15P

rivate and C

onfiden

tial - INN

EF

U L

AB

S

26

Social Media Monitoring toolkit to monitor trends and happenings on Social Media.

•Gather intelligence for future events•Investigate past incidents•Predictive analysis etc.

Monitor – • Facebook• Twitter• Youtube

• Consumer product companies looking to check the sentiments for / against their products online

• Central Intelligence Agencies• State police Departments

SMART PHONE EMPLOYEE TRACKING APPLICATIONS

02/27/15

27

Private an

d Con

fidential - IN

NE

FU

LA

BS

02/27/15

28

Private an

d Con

fidential - IN

NE

FU

LA

BS

Applications available for Smart phones including Android, Blackberry etc which monitor multiple activities of the user including - •GPS Locations•Phone calls Logs•SMS•Mails etc

• Corporate using the product to monitor the activities of their sales team

• State Police departments

THANK YOUQUESTIONS WELCOME

INNEFU LABS PVT. LTD

www.innefu.com

+91-11-47065864 / 66

contact@innefu.com, info@innefu.com

Private an

d Con

fidential -IN

NE

FU

LA

BS

top related