ca webfort from value perspective

26
Core Technology Strong Authentication Made Simple Online Payments Credit & Debit Payments B2B Transactions e-Funds Transfers No Hardware Required Very Simple to Use More Cost-Effective Secure Roaming Web Services Secure Email Digital Signatures Identity Management Enterprise Portals Online Banking Supply Chain CRM / HRM Pharma & Healthcare VPNs CheckPoint Cisco Nortel Aventail

Upload: pinak-pani-paul

Post on 08-Aug-2015

82 views

Category:

Leadership & Management


2 download

TRANSCRIPT

Page 1: Ca WebFort from Value perspective

Core Technology

Strong Authentication Made Simple

Online Payments

• Credit & Debit Payments

• B2B Transactions

• e-Funds Transfers

No Hardware Required

Very Simple to Use

More Cost-Effective

Secure Roaming

Web Services

• Secure Email

• Digital Signatures

• Identity Management

Enterprise Portals

• Online Banking

• Supply Chain

• CRM / HRM

• Pharma & Healthcare

VPNs

• CheckPoint

• Cisco

• Nortel

• Aventail

Page 2: Ca WebFort from Value perspective

ArcotID = Strong Authentication

• Strongest private key protection available in software

• Something you know - PIN activates ArcotID, similar to hardware smart card

• Something you have - Valid ArcotID with associated unique digital certificate used in challenge – response process

• Protected by Arcot’s patented Cryptographic Camouflage and patent-pending Key Authority technologies• Breakthrough in cryptography

• Creates a hacker-proof container that is immune from offline (brute force or password guessing) attack

• ArcotID can be stored on any supported client device or issued on CD without fear of compromise

• Storage independent: software only version, CD, USB tokens, etc.

• PKI standards compliant: RSA, DSA, PKCS, MS CAPI

Page 3: Ca WebFort from Value perspective

Security Provided byCryptographic Camouflage

Page 4: Ca WebFort from Value perspective

CA Technologies Solved the Problem

“Since the invention of public key cryptography,

people have been struggling to secure the private

key without the assistance of hardware. CA's

innovative Cryptographic Camouflage

has solved this problem.”

Martin Hellman

Co-Inventor of Public Key Cryptography

& Professor Emeritus at Stanford University

Page 5: Ca WebFort from Value perspective

Authentication Alternatives

COST-EFFECTIVE &

CONVENIENCE

S

E

C

U

R

I

T

Y

Weak

Strong

Low High

Username

Password

Hardware

Tokens Smart

CardsArcotID

Software Smart Card

Page 6: Ca WebFort from Value perspective

Easy to Use

• ArcotID – ATM like user interface

• ArcotID – HTML form user interface

Page 7: Ca WebFort from Value perspective

Deployment Options• Initial identification options

• In-person at the company

• Electronically via activation code

• ArcotID deployment options

• Electronically via the Internet

• Wallet-sized CD deployment

• USB Token

• Optional roaming

• Electronic download anywhere via the Internet

Page 8: Ca WebFort from Value perspective

ArcotID: Easy Integration for Web applications

Page 9: Ca WebFort from Value perspective

CA Technologies for VPN Solution

CA Technologies VPN Integrations:

•Microsoft Windows 2000 EAP

•Check Point FW-1/ VPN-1

•Cisco VPN 3000 Series

•Nortel Contivity

•Aventail SSL VPN

Page 10: Ca WebFort from Value perspective

CA Digital Signing with Adobe

Open a standard PDF Document

Select Digital Signature Tool

Choose Smart Card (ArcotID or hardware)

Enter PIN

Signature Added

Verify Signature

Signed Document

Page 11: Ca WebFort from Value perspective

A Better Means of Authentication

Username/

Password

Hardware

Token

Smart

Cards

ArcotID

User Cost

0Friendly Secure Effective Portable Signing

Page 12: Ca WebFort from Value perspective

ArcotID vs. Smart Card

• “Hacker Proof”

• RSA 1024 bit

• PKCS #11, CSP

• S/MIME secure mail

• SSL client authentication

• “Hacker Proof”

• RSA 1024 bit

• PKCS #11, CSP

• S/MIME secure mail

• SSL client authentication

ArcotID: Similarities Smart Card: Similarities

• Nothing to forget or lose; No inventory

• Inventory is needed

• Reader deployment and training is required

• Additional hardware and training costs for users

• Cannot use everywhere

ArcotID: Differences Smart Card: Differences

• Easy to use

• Low cost; millions of users

• Use everywhere: Online & Wallet CD options

Page 13: Ca WebFort from Value perspective

WebFort Customers (a sample)

FINANCIAL SERVICES ENTERPRISEHealthCare/Pharma

Swedbank

Page 14: Ca WebFort from Value perspective

The CA Advantage

More Cost-Effective and User-Friendly Solution

Significantly lower admin, deployment, and support costs

No hardware hassles – no physical device to issue, install or support

Simple to use – with portability for anywhere, anytime access

Easy, Rapid Deployment within Identrus

Seamless operation with signing and email agent plug-ins

In-house and hosted deployment options

Scaleable, lightweight deployment to large user groups

Protect Trust Investments and Maintain Flexibility

Leverage existing bank CA(Certificate Authority) and certificates

Migrate across certificate authorities as needs / requirements change

Market Leader in Transactional Security

Extensive experience

5 year history of innovation as authentication experts

Page 15: Ca WebFort from Value perspective

ArcotID Strong Authentication

Step-by-Step

How it thwarts an attack

Page 16: Ca WebFort from Value perspective

This patented technology is called

“ Cryptographic Camouflage”

ArcotID Strong Authentication

Page 17: Ca WebFort from Value perspective

An unauthorized person

gains access to a User’s desktopIf a

ArcotID Strong Authentication

Page 18: Ca WebFort from Value perspective

In his attempt to logon

he is challenged by the ArcotID

If a He assumes that this device is only

protected by a password or PIN

ArcotID Strong Authentication

Page 19: Ca WebFort from Value perspective

If a

..but it is also protected by

“Cryptographic Camouflage”

ArcotID Strong Authentication

Page 20: Ca WebFort from Value perspective

If a

The hacker launches a offline “brute force”

attack on the ArcotID

ArcotID Strong Authentication

Page 21: Ca WebFort from Value perspective

The brute force attack looks for the

combination of characters that will produce

a well formed mathmatically

correct de-crypted key

If a 456789

567890

678901

789012

890123

………

123456

234567

345678

456789

567890

678901

789012

890123

………

ArcotID Strong Authentication

Page 22: Ca WebFort from Value perspective

To his surprise... every combination

produces what appears to be a

valid mathematically

correctly formed key

If a

567890

678901

789012

890123

………

123456

234567

345678

456789

567890

678901

789012

890123

………

ArcotID Strong Authentication

Page 23: Ca WebFort from Value perspective

In fact, a 6 digit numeric PIN would

produce 1 million keys

If a

123456

234567

345678

456789

567890

678901

789012

890123

………123456

234567

345678

456789

567890

678901

789012

890123

………

ArcotID Strong Authentication

Page 24: Ca WebFort from Value perspective

The only way to determine which one is real

is to log onto

the online

application

If a If a 345678

456789

567890

678901

789012

890123

………123456

234567

345678

456789

567890

678901

789012

890123

………

ArcotID Strong Authentication

….and try it.

Page 25: Ca WebFort from Value perspective

After 3 attempts the ArcotID is disabled!

If a If a 345678

456789

567890

678901

789012

890123

………123456

234567

345678

456789

567890

678901

789012

890123

………

xx …and an email alert

is sent

to security

ArcotID Strong Authentication

Page 26: Ca WebFort from Value perspective

Thank you