frontone our new and different solutions

18
Digital Security& Privacy Redefined

Upload: frontone

Post on 20-Aug-2015

164 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: FrontOne our new and different solutions

Digital Security& Privacy

Redefined

Page 2: FrontOne our new and different solutions

Digital Risks&Opportunities

Risks

Electronic & Identity Fraud

Cyber Attacks, Espionage

Rapidly Changing Business

Environments

Competitive Landscape

Opportunities

New & Secure Digital Identity

New Hack-Resistant Security

Platform

Protects: Users Transactions;

Communications and Digital

Assets

Built-in Security: Apps; Cloud

Services;Internet &Mobile

Payments…etc

Page 3: FrontOne our new and different solutions

The Whole Solution

• FrontOnetakes care of security across all layers and all

components facilitating a digital exchange under one unified

platform.

• Digital Identity: Dynamic; Non-Transferable

• Authentication: Continuous Mutual Authentication

• Data Verification: Device Centric Digital Signature – Offers of a

physical element activated by user action.

• Data Protection: Encryption key is unique for each dataset.

Access to protected data is bi-directional requiring action from both

server and client. Add our patented 3A-Key for a true end-to-end

security solution that is hard to match.

Page 4: FrontOne our new and different solutions

Digital Identity

• Others• Static Identities: Password or One Time Password

• Vulnerabilities:Phishing, Malware, etc

• Fact:Cyber Criminals – HAVE MASTERED THE ART OF

STEALING DIGITAL IDENTITIES.

• FrontOne• Dynamic Identity: PHISHING & MALWARE - DEFEATED

Page 5: FrontOne our new and different solutions

Authentication• Others

• Login – One Time User Authentication

• Vulnerabilities:Authenticated Session - HIJACKED

• Fact: HACKERS CIRCUMVENT TWO-FACTOR STRONG

AUTHENTICATION – WITH EACH PASSING DAY TWO-

FACTOR AUTHENTICATION BECOMES INCREASINGLY

LESS SECURE.

• FrontOne• Continuous Mutual Authentication: MAN IN THE MIDDLE, MAN

IN THE BROWSER - DEFEATED

Page 6: FrontOne our new and different solutions

Data Verification

• Others• Out Of Band Verification

• Vulnerabilities:Data Leaks, Vishing, Man In The Mobile,

etc.

• Fact:ZeuS, SpyeyeMitmo found in the wild, attack banks

• FrontOne• User Authorization At Personal Device: NO DATA LEAKS -

VISHING &MITMo - DEFEATED

Page 7: FrontOne our new and different solutions

Data Protection

• Others• Transparent Data Encryption

• Vulnerabilities:Level 7 Attacks and Security Breaches

• Consensus:IF YOU ARE TARGETED YOU WILL BE BREACHED

• FrontOne• Dynamic, User Centric Security Key Management

&Controls:Systematic Failure Is Prevented – The Risks Of

Security Breaches Are Mitigated

Page 8: FrontOne our new and different solutions

Secure End to End

• User End– 3AKey: USB HID Key (no

storage)– Smartphone App (Virtual

Connection)• Application Server End

– Zero Knowledge proof API• JANUS Server/Service End

– Random, Dynamic Element– User Centric Data Protection

Page 9: FrontOne our new and different solutions

FrontOne Innovations

• “Future Proofs” its solutions by introducing a dynamic elementinto every transaction thereby outmaneuvering adversaries.

• Provides a secure conduit between a user, FrontOne’s Server and Content/Service Provider that allows a ‘zero knowledge’ digital exchange to be complete with a high level of security and confidentially.

• Mitigates the risks of unauthorized access to protected data by introducing user/device centric key management.

• FrontOne empowers organizations and users to take charge and be in control of digital identities, assets and transactions.

Page 10: FrontOne our new and different solutions

FrontOne Digital Signature

Message

Hash

FrontOne

Digital Signat

ure

Dynamic

Key

Hash

SIDCert

Important note: The data may be the same but our digital signature is not!

ADynamic Element In Every Transaction – Outmaneuvers Adversaries

Page 11: FrontOne our new and different solutions

Privacy Preserving Identification

User/ 3AKey

Service Provider

JANUS

Ea:>> Identity TokenSecure signaling path (if & when required)

Zero Knowledge

Proof

JANUS API

Application business

logic B>>U

serID, S

PID

C:<<A

ccess Token

F:>>userID, Identity Token

G:<<A

ccess Status

A:>

>Use

rID, r

eque

st

D:<

<Acc

ess

Toke

n

E:>

>Ide

ntity

Tok

en

H<<

Ser

vice

Page 12: FrontOne our new and different solutions

The Why, What and How

• Why We Need Something Better

1. Identity Theft:Phishing, Key-Logger, Malware …

2. Financial Fraud - Financial Malware,MITM, MITMO…

3. IP and Data Theft - APT, Zero Days, Insider…

4. Commercial Espionages and Economic Terrorists …

• What We have Done and How

Page 13: FrontOne our new and different solutions

Security Feature ComparisonProduct Name/

Feature Description3AKEY or SmartKey

Smartcard USB PKI

OTP Token

PKI Certificate

Strong Authentication (2FA) Y Y YMultiple Credential Support Y YTwo-Way Authentication Y Y YProtect Against Client Side Attacks YOffline Mutual Authentication YTransaction Signing Y Y YTransaction Verification YServer Task Authorization YUser-Centric Key For Data Protection YDevice ID& Verification YPhysical Control (not accessible digitally)

Y

Page 14: FrontOne our new and different solutions

Applications

• FrontOne’s Dynamic Digital Identity (ZERO KNOWLEDGE) – With simplistic user controls, here is the value proposition:

1. New hack-resistant digital identities for cloud and enterprise applications.

2. Advanced transaction security in internet banking and “card not present” transactions.

3. Advanced Data Protection for Enterprise &The Cloud

4. Advanced Mobile Payment Solution

5. Secure Electronic Voting

6. Many other digital security, privacy compliance and risk mitigation applications

Page 15: FrontOne our new and different solutions

FAQ - 1

• How is your solution compared with others?

Traditional layered security has limited effectiveness against new and emerging threats as attackers exploit weaknesses between uncoordinated layers to steal data or modify transactions.

FrontOne provides a unified security platform that delivers true end-to-end security. It starts by providing a secure digital credential, followed by continuous authentication with device centric data protection ultimately giving a user the final say in authentication.

Page 16: FrontOne our new and different solutions

FAQ - 2

• Will your solution protect users and transactions if a system is already infected?

1. Yes.

2. FrontOne provides true end-to-end security without being dependent. It has been designed with the assumption that a user’s computer has been compromised with unknown malware or may be at a future date.

3. Our solution provides a secure transaction environment for a broad range of applications.

Page 17: FrontOne our new and different solutions

FAQ - 3

• What about x.509 or PKI, isn’t it the best?

1. This technology is based on trust whereas FrontOne’s solution takes trust out of the equation. Our solution returns security and control to our clients.

2. Compliance is not equal to security.Most if not all companies that suffered security breaches were in “compliance” before falling victim to attacks.

3. Both x.509 are PKI are dumb in that they react to commands. There is no active authentication.

4. Extremely vulnerable to padding oracle attacks (recovers private certificate from physical device).

Are we finally ready to accept that the certificate system is completely broken?

Page 18: FrontOne our new and different solutions

Questions

mailto: [email protected]