Marketing Overview
1 / 30

- PowerPoint PPT Presentation

  • Uploaded on

Marketing Overview . The only SAP ® -certified fingerprint authentication, identity and risk management for SAP ® systems. Bulletproof SAP ® security at your fingertips! . © 2011 realtime North America Inc., Tampa, FL. All Rights Reserved. Who is realtime ?.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about '' - Thomas

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Biolock presentation

Marketing Overview

The only SAP®-certified fingerprint authentication, identity and risk management for SAP® systems

Bulletproof SAP® security at your fingertips!

© 2011 realtimeNorth America Inc., Tampa, FL. All Rights Reserved.

Biolock presentation

Who is realtime?

Founded in 1986 by former SAP® managers

Certified software, services & special expertise partner

Specializing in governance, risk and compliance (GRC)

Serving many industry sectors including food,

pharmaceutical, chemical, automotive, aerospace,

defense, engineering, government and more

Flagship software product, certified by SAP® since 2002 is

Bulletproof SAP® security at your fingertips!

Biolock presentation

Selected realtime clients

3M, AIRBUS, Alcan, BASF IT Services B.V., Bayer, Bayer CropScience, Brevard County Government, California State University, Campbell's, GlaxoSmithKline, Harman Kardon Music Group, Krupp Bilstein, Linde, Loewe Opta, Marathon Oil, Océ Document Technologies, Polk County School District, Purdue Pharma, Siemens, ThyssenKrupp Michigan, Toyota, United States Army…

  • Over 200 global clients served!

Biolock presentation

What were these users looking for?

was developed to provide these benefits demanded by users:

Dramatically increase SAP® security capabilities

Manage user identities via indisputable biometrics

Control access to functions down to the field level

Enforce true Segregation of Duties (SoD)

Ensure meaningful compliance with: Sarbanes-Oxley, HIPAA, ITAR and more

Biolock presentation

Standard Version

Standard Protection

Bulletproof Version

Bulletproof Protection


Is your system bulletproof?

Biolock presentation

#1 Risk: Fraud is a growth industry

  • According to the ACFE’s 2010Report to the Nations on Occupational Fraud and Abuse , based on global data, organizations lose about 5% of annual revenue to fraud.

  • Schemes can go undetected for years and frequently involve first-time offenders.

  • Association of Certified Fraud Examiners

Biolock presentation

Are you concerned about…

  • Risk of Financial Fraud?

  • HIPAA Compliance?

  • Sarbanes-Oxley (Section 404)?

  • ITAR?

  • Industrial Espionage?

  • Other regulations?

Biolock presentation

How would an incident affect you?

  • Financial loss?

  • Negative publicity?

  • Lawsuits?

  • Loss of intellectual property?

  • Decline in stock price?

Biolock presentation

Are you still relying on this?

  • Traditional SAP® log-on process uses passwords

User password

SAP® Software

Passwords are written down, borrowed, stolen, misused

Provides “perimeter” security but no additional layers!

Biolock presentation

Fingerprint Scan = Maximum Security

Biometric technology offers the highest security

Biolock presentation

User’s fingerprint

Encrypted scan

SAP® Software

How to Bulletproof your system:


SAP® log-on profiles are enhanced with fingerprint interface

User is prompted via bioLock software as shown above

Various hardware devices can be used to securely scan

fingerprints - while protecting users’ privacy!

Biolock presentation


Plus one of these… (optional)

Potential Future Development

What devices can verify user identity?

Biolock presentation

Leading Laptops

23% have Swipe Sensors

UPEK Eikon

Low-cost Device

Cherry Keyboard

Smart Card Option

Cherry ID Mouse

Convenient Touch Sensor

bioLock ID Mouse

Powered by Secugen

Secugen Hamster

FIPS 201 Compliant

Zvetco P5000

High End Device

is hardware independent

bioLock is compatible with over 80 laptops (with built-in fingerprint sensor) and over 50 independent devices like mice, keyboards, or PCMCIA Cards.

Biolock presentation

Logon authorized

Logon blocked

bioLock prompts you for fingerprint

Fingerprint comparison with table

bioLock checks

authentication rules







bioLock identifies unique points (minutiae) within a fingerprint and creates an encrypted, digital template

– no images of fingerprints are ever stored!

SAP® log-on & system access with


Biolock presentation

  • Bulletproofing” with

  • Authenticate user log-on based on fingerprint

  • Lock down any transaction (e.g. SE38 or ME21N)

  • III) Protect “infotypes”, fields, buttons according to customizable profiles (e.g. HR infotype 167)

  • IV) Require authentication if a field value exceeds a trigger amount (e.g. a transfer > $10,000)

  • V) Require dual user authentication for critical SAP® functions, viewing sensitive data or intellectual property

5 Extra Levels of Security

Existing SAP® Security

Consists of Password Log-On

Biolock presentation

Perimeter Security - Level I

Transactions – Level II

Fields - Level III

Any Field

Financial Limits – Level IV

Dual Approval – Level V

All levels can be controlled using fingerprint scan!

Bulletproof Security requires 5 Levels

System Log-on


Biolock presentation

Example –

Masking Field Data:

Multiple Control Points per User

  • Log-on to a Profile (e.g. Admin)

  • Transactions (e.g. HR / PO / Finance)

  • Infotypes (e.g. 008/167 etc.)

  • Buttons (e.g. Print / Export / Execute)

  • Display (e.g. Balance Sheet)

  • Execute (e.g. prevent execution of anything…)

  • Tables within SE16/SE16N

  • Programs within SE38

  • Values (e.g. wire transfer of a certain amount)

  • Screens (e.g. export control / ITAR )

  • Dual Authentication

  • Mask Fields (e.g. make data invisible)

Biolock presentation

Fast User Switching

  • Sometimes multiple users share workstations, for example: Hospitals, Warehouses, Financial Institutions, etc.

  • Due to time constraints, logging on/off is impractical, but re-authentication via fingerprint scan is practical.

  • bioLock allows all users to authenticate on all workstations at the beginning of a work session, using only fingerprint authentication after the initial verification.

bioLock will always identify and log the uniquely authenticated, actual users – independent of their SAP User profiles

Biolock presentation

Example: Who Has Access?

6,000 Named SAP Users

Fraud is mostly committed by stealing or cracking a password to access profiles with critical, extended authorizations

2,000 Users with potential access to critical data

The threat comes from the inside and outside!

1,000 Users with restricted roles to critical functions

External Employees


VIP Only:

500 Permitted bioLock

Users for most critical functions

Former Employees


Bulletproof Data Protection



Biolock presentation

Bulletproof bioLock Security

- Seamless Integration

  • Unaffected by SAP® versions or upgrades

  • Existing SAP® passwords and authorizations are unchanged

  • Compatible with all SAP® versions from 4.x onward

  • Profiles are 100% customizable on a user-by-user basis

    You decide what aspect of your system needs to be protected and how stringently!

Biolock presentation

What is the impact on users?

  • Only a minority of users are enrolled, depending on their security risk profile and management’s policies

  • One-time user enrollment takes only a few minutes

  • Use is very intuitive, no training required

  • Ongoing use consists of occasionally providing a fingerprint scan – each user profile can be unique

  • Fingerprint images are never stored – privacy is protected

Biolock presentation

User is prompted for a fingerprint scan to complete log-on (Security Level I)

Example – what a user sees…

User logs on using their SAP User Profile and password

Biolock presentation

User is prompted for a fingerprint scan to complete the activity (Security Level II)

Example – what a user sees…

User selects the transaction “ME21N” to create a purchase order

NOTE: This could be virtually any R/3 transaction such as SE16 or SE38

Biolock presentation

Infotype 167 (field level) is protected for HIPAA compliance, so user is prompted for fingerprint scan (Security Level III)

Example – what a user sees…

User attempts to look up Health Plan information under Infotype 167

Biolock presentation

- What is the impact on IT? compliance, so user is prompted for fingerprint scan (Security Level III)

  • Installation is done by simply downloading bioLock transports into its own /realtime namespace within SAP®.

  • bioLock is compatible with SAP® 4.x and higher, and is unaffected by version upgrades.

  • Configuration and training is done in several days with the support of realtime consultants or partners.

  • Roll-out to selected users can be done quickly, slowly or in phases as desired, or even by automated installation.

  • As users are activated, a fingerprint scanning device is installed at their work station. A robust audit trail is automatically generated within SAP®.

Biolock presentation

SAP USER compliance, so user is prompted for fingerprint scan (Security Level III)user profile…


Unauthorized attempt to log on with another user’s Password

Log File

Enhanced activity logging

…and the REAL USER as identified by fingerprint

Sorted by error / threat category

  • Audit trail is greatly enhanced

Biolock presentation

Sample Success Stories - compliance, so user is prompted for fingerprint scan (Security Level III)

  • Achieve compliance with HIPAA by protecting private employee / HR information

  • Ensure proper approvals for purchasing by automating workflow with external browser access for senior executives

  • International bank prevents fraud with dual authentication and strong financial controls, masking data from unauthorized viewing

  • School Board prevents payroll and personal expense fraud which went undetected for years

  • European power plant protects all purchase orders and workflow for several thousand users

Biolock presentation

Benefits of compliance, so user is prompted for fingerprint scan (Security Level III)

  • The entire installation and configuration of bioLock can be done quite rapidly. Only minimal training is required, and the impact on both users and IT support staff is minimal, both during installation and in use.

  • Since bioLock is certified by SAP®, ongoing compatibility with different versions is assured.

  • In a very short time, you can start enjoying benefits such as:

    • Dramatically increased SAP® security capabilities

    • Manage users’ identities via indisputable biometrics

    • Control access to functions down to the field level

    • Enforce true Segregation of Duties (SoD)

    • Attain meaningful compliance with SOX, HIPAA & ITAR

  • Statistically, a starter package could cost less than a single fraud incident.

  • Biolock presentation

    - SAP compliance, so user is prompted for fingerprint scan (Security Level III)® certified since 2002

    bioLock is SAP certified

    Biolock presentation

    Please contact us for a demonstration or pilot installation: compliance, so user is prompted for fingerprint scan (Security Level III)


    realtime North America, Inc.


    1101 Channelside Drive, Tampa, FL 33602

    T: 813-283-0070 F: 813-283-0071 Email:


    Martin Lum

    Director of Business Development, Northeast