1 / 15

Sentinel Authentication

Sentinel Authentication. Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes.

yestin
Download Presentation

Sentinel Authentication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sentinel Authentication Fast, Friendly, Secure Authentication

  2. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes. By John Fontana for Identity Matters | April 24, 2013 -- 13:52 GMT (06:52 PDT) The average cost to a business for a data breach, not including soft, yet very real costs (e.g. customer confidence/loyalty, brand/reputation, etc.) in 2010 was $7.2 million, or $214 per compromised record. The Problem “It’s not a matter of “if” when it comes to these attacks; it’s just a matter of when.” Barry Rich – CFO CapitalMark Bank & Trust.

  3. Enterprise Sentinel is an extremely secure yet user friendly corporate authentication solution that can be cost effectively utilized on most platforms and end points. Enterprise Sentinel® utilizes the Passrules®authentication process to allow users to quickly and easily create one-time passcodes that are extremely resistant to today’s forms of hacking. The Solution

  4. The Passrules®authentication process has been patented in the U.S., Canada, China and is pending throughout most of the world. Enterprise Sentinel® is completelysoftware based which means it can be used to secure almost any device or platform including corporate servers, mobile devices, banking machines, personal computers, and many more. The Solution

  5. There is a fast growing movement driven by many top CISO’s to eliminate our reliance on passwords and to adopt more secure yet user friendly methods of authentication. Gartner Research estimated the size of the authentication market in 2012 to over $2 Billion U.S. with an anticipated 30% annual growth rate. Market Opportunity

  6. Our go to market strategy incorporates four major streams. - Targeting innovative and agile SMB’s. - Partnering with other security providers to create a range of products. - Working with industry players (Gartner, FIDO, etc.) to gain exposure & credibility. Go to Market - Drive by opportunities with big, profile customers.

  7. Enterprise Sentinel® provides entities with cost effective strong authentication alternative to legacy passwords and expensive and non-user friendly 2 factor systems. Enterprise Sentinel® software is ready for market and operates on most Microsoft operating systems. Our Technology To date we have 2 pilot installations, a health care provider and a technology company.

  8. The market channels we will focus on are: - Independent consultants that recommend IT to services to SMB’s. - Strategic partner’s existing client bases and joint prospects - Direct sales through leveraging alliance partner and industry contacts. - Developing a cloud based ID as a Service capability to reduce installation costs and to make it easier for SMB’s to acquire and use our technology. Sales Channels - Enterprise Sentinel® is sold on an initial installation and on-going annual license fees basis.

  9. We will position our products in the relatively uncontested market space that exists between legacy passwords and 2 factor authentication systems. There are a few solution providers targeting this market including SecureMatrix, Syferlock, SafeNet and RSA. Market Positioning Our strategy to lead this market is to leverage our superior technology product and to focus our main sales efforts on more agile and innovative entities.

  10. The Numbers

  11. The management team collectively - Has over 50 years of experience in bringing concepts to market successfully - Is familiar with the challenges at the various stages of growth - Has extensive experience in leading organizations to successful outcomes - Has a broad network of resources at their disposal Independent board has not yet been established. “Friends” include: - Lon Hoffman – Partner - Accenture - General Harry Ruduege (ret) – Head of Cyber Security - Deloitte - Rajesh Ahuja – Information Security, Authorization Controls - Boeing The People

  12. So far we have: - Completed our Microsoft based applications plus Android & iPhone apps - Defined our go to market strategy - Performed external testing on the strength and usability - Patented and Trade-Marked - Won awards for innovation, security and interoperability. Important Steps Key elements required: - Greater market profile - Marque client/partner - Additional capital

  13. We are looking to connect with strategic to accelerate our market entry and capitalize on the growing trend to replace passwords. • Future initiatives include: • enhancing our direct sales capabilities • building our VAR/Partner network globally • further programming enhancements • developing of a cloud based identification (IDaaS) service • developing of “password broker” technology Financial Resources

  14. Most business successes are the result of having a product or service available to meet the demands caused by changes in the external environment. Our game changing technology is extremely well positioned to meet demand for enhanced authentication security as the market continues to adopt and employ better alternatives to passwords. Why we will win Enterprise Sentinel® delivers the best characteristics of legacy technologies while eliminating the weaknesses that are making them obsolete.

  15. Resistant to all forms of authentication hacking Cost effective Fast and Easy to use System Benefits Can be used on multiple platforms and devices More secure

More Related