1 / 21

eToken Solutions January 2003

eToken Solutions January 2003. www.eAladdin.com/eToken. Digital Identity Management. 3 Good reasons to use eToken Simple & Easy to use Enhanced security Cost effective, versatile and fully mobile solution Solutions and Technical Information Customers & References

abiola
Download Presentation

eToken Solutions January 2003

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. eToken SolutionsJanuary 2003 www.eAladdin.com/eToken

  2. Digital Identity Management • 3 Good reasons to use eToken • Simple & Easy to use • Enhanced security • Cost effective, versatile and fully mobile solution • Solutions and Technical Information • Customers & References • Press Coverage & Awards • About Aladdin

  3. Simple & Easy to use Enhanced Security Cost effective & fully mobile • Insert eToken into the USB port. • Type in a simple password. • Automatically logon to your application. • Logon requires eToken & Password (2–factor authentication). • All access profile, keys and certificates are securely stored on the eToken. • Secure SmartCard technology. • Increased ROI through improved password management. • Standard USB connectivity enables users mobility and eliminates the need to install and maintain a separate reader. • Standard connectivity to security systems eliminates the need to make changes to network topology or install dedicated servers. 3 Good Reasons To Use eToken

  4. Insert eToken into the USB port. • Type in a simple password. • Automatically logon to your application. Simple & Easy to Use And type your password (Factor 2) Just plug in your eToken (Factor 1) Without both “Factors”, a user cannot logon, or sign a transaction.

  5. It’s Your Digital Identity Organizer Simple & Easy to Use Your VPN Access Your Secure Key Storage Your Network Access Your Secure Certificate Storage Your Web Access Your Secure Password Storage Your Secure eMail Your Secure Key Generation Your Computer Data Protection

  6. Logon requires eToken & Password (2–factor authentication). • All access profiles, keys and certificates are securely stored on the eToken. • Secure SmartCard technology. Enhanced Security Does this sound familiar? • Writing your passwords on a piece of paper, keeping them in your wallet or pasting them on your computer screen. • Using the same password for multiple applications so it will be easy to remember. • Being annoyed when asked by your network administrator to change your password, or adhering to rigid password rules. • Forgetting your password.

  7. Enhanced Security Why passwords are not enough ! A recent NTA Survey found that: • A typical intensive IT user has more than 21 passwords and has 2 strategies to cope, neither of which are advisable from a security stand point; they either use common words as passwords or keep a written record of them. • 84% of users consider memorability the most important attribute of a password, resulting in 81% selecting a common word as a password. • 67% of all users rarely change their passwords, and 22% said they would only change if forced to do so. Source www.silicon.com , 2002 NTA Monitor Password Survey

  8. Standards Compliancy ITSEC LE4 FIPS 140-1 2/3 Enhanced Security eToken offers advanced Smartcard security in a USB Token form-factor!

  9. Increased ROI through improved password management. • Standard USB connectivity enables users mobility and eliminates the need to install and maintain a separate reader. • Standard connectivity to security systems eliminates the need to make changes to network topology or install dedicated servers. Cost Effective & Fully Mobile • META Group research shows that large organizations (*) typically have more than 75 applications, databases and systems requiring authentication. Users are also required to manage these passwords with different requirements and processes. META Group also highlights that implementation of Single Sign On technology provides bottom line benefits resulting in 32% reduction in help desk call volumes and 32% increase in security. August 2002, The Value Of Identity Management • Gartner Group estimates that password-related calls to IT service desks from internal end-users average 4 per year per user. Help desk support costs range from $51 to $147 per password reset action. April 2002 • Gartner Research also believes the advantages from using strong authentication has increased and the disadvantages of implementation decreased to make smartcards the way to go. Gartner Research Note “Its time to get smart about smartcards. October 2001. * With Turn Over greater than $500m

  10. Cost Effective & Fully Mobile

  11. Cost Effective & Fully Mobile • eToken; the ultimate authentication solutions! • Simple to use and administrate. • Only1 password to remember. • Changes to network topology or addition off an additional authentication server are not mandatory. • No battery required. • Fully portable. • Highly secure.

  12. * eToken is also available in a traditional Smartcard form-factor. Cost Effective & Fully Mobile No USB port in front? Use a simple extension cable Versatile & Mobile: Connect from any PC • Simply chose your preferred form-factor or mix and match!

  13. Cost Effective & Fully Mobile eToken - Simple Sign On (SiSO) compared to Standard SSO Identity management technologies such as PKI and SSO will win a significant chunk of IT security spending. 17% of European firms plan to implement PKI, and 14 percent plan to implement SSO in the next 12 to 36 months. (IDC, 26 Nov 2002)

  14. Solutions & Technical Information eToken Secures Your Business Increase your business New services to your customers! Secure your network Protect your corporate network and employees!

  15. Authenticate Digitally Sign With eToken You Can! Solutions & Technical Information • Strongly authenticate users • Enable access only to authorized users. • Digitally sign business transactions • Prove non-repudiation. • Ensure integrity of transactions and information.

  16. eToken Solutions Solutions & Technical Information eToken Enterprise • PKI Solutions • Network Logon • WSO eToken SDK • Development APIs. • Win 32, 16 Bit PCSC, CAPI, PKCS11, Linux, FreeBSD

  17. eToken For Network Logon eToken For PKI Solutions eToken for WSO Solutions eToken Simple Sign On (Coming Soon) eToken Enterprise Solutions Solutions & Technical Information

  18. eToken PRO Specs Solutions & Technical Information • Advanced Smartcard chip technology, with on-board crypto processing RSA 1024, 3xDES, SHA-1. • Secure on-board key generation and storage of PKI keys and certificates. Private keys never leave the eToken. • Enforceable password retry counter, 3 to15. • Password quality check and enforcement. • 16 & 32 KB memory models with protected Serial ID. • Tamper evident & water resistant shell and tamper proof chip. • 10 year memory data retention. • Standard support for security APIs: CAPI, PKCS#11 and Siemens-Infineon APDU. • Infineon SLE66 Chip certified ITSEC-LE4 • Siemens CardOS M4- certified ITSEC LE4 • FIPS 140 1 (2&3) compliancy

  19. Customers & References

  20. Press Coverage & Awards 2001 & 2002 Coverage

  21. Press Coverage & Awards Winners, Best Security Device 2 Years Running 2001, 2002 “eToken’s portability and security provide not only a method to ensure powerful data integrity, authentication and encryption, but also a convenient way of gaining peace of mind by carrying your digital identity with you.” “Aladdin’s eToken provides powerful network & e-business security through a convenient USB token that can be carried on a key chain…” “eToken’s fully portable USB device offers a cost-effective method for authenticating users when accessing a network, and for securing electronic business applications.” Paul Robinson, SC Magazine

More Related