Legitim i. Your Digital DNA. Technologies for the Prevention of Cyber Fraud and Identity Theft. Legitimi. Synertech's Legitimi technology is the industry's latest and most advanced online security innovation.
Your Digital DNA
Technologies for the Prevention
of Cyber Fraud and Identity Theft
Synertech's Legitimi technology is the industry's latest and most advanced online security innovation.
Legitimi delivers extremely reliable two-factor authentication that even exceeds FFIEC requirements for online banking, the most demanding of criteria for cyber security technologies.
Legitimi is simply the most user-friendly, yet highest level of cyber security attainable, and at a fraction of the costs associated with two-factor authentication.
* OurAutomatos IT Software and Management Services Clients
- In 2004, 9.9 million Americans were victims of identity theft
- Consumers suffered a $5 billion economic loss
over $2.6 billion in 2005
restricts global expansion for
- Nearly 2 million consumers were
victims of online banking fraud
- 55 million people will bank online
- In 2004, 2 million people were victims of stolen IDs
and personal information resulting in devastating losses
- Cyber fraud costs U.S. Banks almost $2 Billion in 2004
Example of a Phishing Email Requesting Personal Information
Regions Bank: Special Announce [Tue, 01 Mar 2005 10:51:07 0300]
REGIONS AND UNION PLANTERS [email@example.com]
THIS NOTICE IS TAKEN DIRECTLY FROM THE REGIONS WEBSITE:
Regions does not contact customers via e-mail to verify or request security information. However, some customers -- and non-customers -- have received fraudulent or what is now called either "spoofing" or "phishing" e-mails that have illegally used the Regions name, logo, Web site design and/or graphics. The purpose of these fraudulent e-mails is to get you to divulge personal information in order to commit identity theft or to take money from your accounts. In most cases, these fraudulent e-mails either request the recipient to send personal information back to the sender via e-mail; in other cases,they include a link to a Web site, which will then request the visitor to enter their private information AS NOTED IN THE EXAMPLE ON THE NEXT SLIDE.
Example of a Fraudulent Site Requesting Personal Information
This site looks very official, but it is fraudulent. The link provided on the phishing email produced this site. As noted on the previous slide, banks do NOT contact customers to
obtain or re-verify information. Anyone that enters information on this site will be a victim
of identity theft. Most of these sites are very sophisticated and include all the proper
logos, disclaimers, etc. as in the example above.
financially damaging cyber security
threat to corporate America
sustained losses of over $70 billion
from theft of their proprietary
the leading cause of dollar loss in the CSI/FBI Computer Crime Survey
(3 times the losses associated with viruses and worms)
Regulatory Non-ComplianceCan Be Costly
Accountability Act (HIPAA)
What are the solutions?
Commonly used measures to control cyber fraud
and identity theft:
What if you could substantially
increase your level of security?
BUILDS customer confidence and security,
REDUCES recurring fraud losses,
PREVENTS identity theft and
PROTECTS critical IT assets!
Legitimi Digital DNA database
Joe accesses your company
online and authenticates his
computer – PC “1”
Jane steals Joe’s ID and
password and attempts to
access his account with
Transaction denied. Digital DNA does not match Joe’s. PC “2” stored as fraudulent
Transaction denied. Joe reported his computer stolen. Sam can’t answer additional questions. PC “1” stored as fraudulent
Sam steals Joe’s computer
at the airport and attempts
to access Joe’s account
with your company
Joe accesses your company
online and authenticates
his new computer – PC “3”
1Employees access your network and the web browser connects to the Legitimi Client
- Jim is granted access and can access all levels of information
- Carol is granted access and can access H.R. and payroll only
- Pete is granted access from a company issued laptop, and while he is traveling,
can access sales and product information only
- Carol is denied access from her untrusted home laptop
2 Legitimi Client creates the digital DNA of the device and sends it to the Legitimi
3 Server compares it against the DNA associated with user ID stored in the data base
(secure services server) and determines who is authorized to access
group of devices, no other devices will
be allowed into the group
re-open and close the group of trusted
Customers can manage their accounts from anywhere in the world
No IT staff or additional hardware is necessary to implement
The software is cached on the customer’s computer
No customer data is collected while it creates the encrypted digital DNA
Ease of Use
User friendly, accessible from anywhere in the world
Changes in hardware components or reinstallation of operating system does not necessarily change the digital DNA
Multi-user computers can associate the digital DNA with more than one bank account or credit card number for ecommerce
Customers for ecommerce may access the administration interface to include or delete authorized devices
Economical and Scalable
Cost only a fraction compared to other available technologiesUnique Features ofLegitimi
Hard tokens are physical objects the user possesses such as a key, smart card or other devices especially designed for the safekeeping and use of private key data
Software that emulates hard tokens (software kernel incorporated in the device)
The identification of a user based on a
physical characteristic, such as a fingerprint, iris, face, voice or hand-writing (signature)
A digital certificate is an electronic “identification card" that establishes your credentials when conducting business or other transactions
SIM Cards / USB Tokens:
Uses a combination of physical device plus a digital certificate is loaded on the device.
Cons:Very expensive. Distribution problems. High administrative overhead.
Cons: Expensive. Less secure.
Cons: Requires very expensive hardware and supporting components. Difficult to implement and manage.
Cons: Distribution and maintenance of certificates are difficult. Not user friendly.
Cons: Expensive with high administration.
Physical Strong Authentication devices must be physically available with the user and/or installed on the machine when the end user wishes to authenticate.
Smart Cards and USB tokens are both inserted into computers so that their digital certification can be read and used as part of the authentication process. These cost normally between $5 and $20 per card / token.
Fingerprint readers identify the user by the users fingerprint, although they are normally deployed as a finger print replacement not bringing strong authentication. These normally cost $15 - $30 per reader.
KEYFOB Token with 4 year 6 digit entry changing every 60 seconds.
Very expensive, this normally cost $20 - $40 per Fob.
* Biometric technology reader examples: fingerprints, retina, palm, and hand-writing recognition, etc.
Legitimi is ideally suited for the following industries:
The most advanced cyber fraud and identity theft prevention technology
by associations and agencies
Put a stop to cyber fraud! InstallLegitimitoday!
Your Digital DNA
Technologies for the Prevention of
Cyber Fraud and Identity Theft