slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
An Introduction to CRYPTOCard Date PowerPoint Presentation
Download Presentation
An Introduction to CRYPTOCard Date

Loading in 2 Seconds...

play fullscreen
1 / 22

An Introduction to CRYPTOCard Date - PowerPoint PPT Presentation


  • 138 Views
  • Uploaded on

An Introduction to CRYPTOCard Date. Presented by:- A Sales person. At a glance. CRYPTOCard delivers Authentication to secure digital identities We deliver via traditional server & unique SaaS models Broad industry use and dominant in key sectors

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'An Introduction to CRYPTOCard Date' - tallys


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

An Introduction to CRYPTOCard

Date

Presented by:- A Sales person

at a glance
At a glance
  • CRYPTOCard delivers Authentication to secure digital identities
  • We deliver via traditional server & unique SaaS models
  • Broad industry use and dominant in key sectors
    • In the UK we have 24% share in Local Government
  • B2B focussed
    • Our biggest customers have 50,000 – 150,000 seats
  • Our points of difference are:
    • SaaS model
    • Focus on automation of provisioning and integration
    • Token quality and range
    • Low TCO

CRYPTOCard – The Authority in Securing Digital Identities

cryptocard a history of innovation
CRYPTOCard: A history of innovation

4

KT-1Key chain introduced

Company

founded

BlackShield IDintroduced

CRYPTO-MASintroduced

KT-4 Key chain introduced

SMS Tokenintroduced

Java

Token

launched

Blackberrytoken introduced

RB-1 token introduced

Grid

Token

launched

SC-1 Smart

Card introduced

UB-1 USB Token introduced

AuthEngineintroduced

InnovativeProduct of 2008

Best of Show MacWorld

Linux version introduced

Harrodsbecame customer

Bombardierbecame customer

Applebecame customer

NASA - our first major customer

BMW became customer

CMS-CMSKbecame a customer

Comic Reliefbecame a customer

Yorkshire Building Society became a Customer

Isle of Wightbecame a Customer

World’s first Mac authentication solution introduced

our geographic spread
Our Geographic Spread

Coverage and sales in over 70 countries for thousands of companies

North America

EMEA

R o W

A competitive market in which we have established our largest customers

KEY FACTS:-

Locations: Ottawa

Focus:- Engineering, Operations, Support, Finance,

Strong growth over past 2 years and massive potential for the future

KEY FACTS:-

Locations: Bristol, Bracknell, Eindhoven

Focus:- Sales, Marketing, Support

A tactical market for the next 2 years

KEY FACTS:-

Continuous production facility in China

the problem with passwords

Written down

Easy to crack

Easy to guess

Difficult to audit

Hard to remember

Easy to steal

Expensive to manage

The problem with passwords

Passwords are the weakest link in the security chain:Nearly every successful Hacking, Phishing or ID theft attempt involves obtaining a password

the password gremlins
The password gremlins

Many customers have secured their internal network, using managed services to deliver Anti-virus, Firewalls, Content Filtering, Anti-Spam, Anti-Spyware... BUT.........

Workstations

Branch Offices

Your people

PDA Users

Database server

DMZ

Access Router

Firewall

PBX / Phone System

Network Server

Mobile Staff

Your customers

Wireless

Workstations

Remote Users

3rd Party Access

....... very few businesses realise that their cloud-based services and remote access networks are a risk – because they are only secured by a static password

market opportunity for authentication
Market opportunity for Authentication

Increasing take-up of cloud based services and desire for on-line collaboration tools increase the need for password replacement solutions

Longer term:-

Authentication as part of an integrated workflow

Move to federated ID world using SAML and other open standards

Rate of Deployment

Banking Customer Access

Consumers

Partners

Cloud based and on-line services,

web based collaboration solutions

Market Penetration

Suppliers

Continued drive for remote access security and the on-going drive for regulatory compliance continue to drive take up in new segments

Increasing numbers of existing users of two-factor are realising that management overheads and high product costs dictate a strategy review

Enterprise Network Access

Flexible working withRemote Access

Employees

Rate of Adoption

Management

Enterprise

Corporate

SMB

SoHo

Consumer

Traditional Authentication market

Market opportunity

passwords are easy to hack
Passwords are easy to hack

"If your company suffered a malicious attack from a fraudster who stole important data or brought down critical business systems what would be the full cost to the business?“

Jason Hart Senior VP, CRYPTOCard

the solution is simple
The solution is simple

Something that you know

Something that you have

plus

3468

PIN:

Token with a One-Time Passcode

You already use it – its called an ATM card

our products and services
Our products and services

Hardware

On-demand

Hybrid

Multi-Platform

UB-3

USB token

CD-1

Credit Card sized token

KT-1

Rugged Steel Key chain token

KT-4

Robust Key chain token

Laptop

BlackBerry

Windows Mobile

Java phones

SafeStick

USB device

SMS-1

SMS token

RB-1

Calculator style

KT-2

Polycarbonate Key chain token

SC-1

SmartCard token

Ironkey

Ultra-Secure Token

GrIDsure

Database Server products

Network Server products

CRYPTO-MAS Managed Service

crypto mas simple implementation tools
CRYPTO-MAS: Simple implementation tools

VPN

Citrix

Firewall

JAVA

Tokens

Outlook

SSL

SMS

Tokens

BlackBerry

Tokens

Remote Web

Workplace

VPN

Terminal Services

Citrix CAG,

WI, AAC

Web Apps

Unix Logon

IIS

Key Chain

Tokens

Software

Tokens

NPS/IAS

Active Directory

Synchronization

Apache

Linux/Unix

significant points of difference
Significant points of difference

Designed as a service

Simple to use portal

Wide token range

Simple integrationtools

Migration Agent

LDAP Agent

Integration Agents

Six primary innovations of CRYPTO-MAS combine to deliver significant benefits

Cloud based architecture

Standard

Reports included

crypto mas simple to adopt and deploy
CRYPTO-MAS: Simple to adopt and deploy

Easily integrated and distributed within hours, not days –reducing overheads

SUBSCRIBER COMPANY

Applications

Administrator

Active Directory

Set-up the customer company

MAS

1

2

4

Set-up the customer administrator

2

Access device

Add the Access device to the network

3

5

3

Upload User information

4

TOKENS &

USERS

5

Add tokens

Distribute tokens to users

SERVICE PROVIDER

6

6

1

= Customer

= Service Provider

blackshield id
BlackShield ID

Knowledge, Simplicity, Choice

Total Authentication, Made Simple

blackshield id simple implementation tools
BlackShield ID: Simple implementation tools

VPN

Citrix

Firewall

Outlook

USB

Devices

JAVA

Tokens

SSL

Remote Web

Workplace

VPN

GRID

SMS

Tokens

Citrix CAG,

WI, AAC

Terminal Services

BlackBerry

Tokens

Web Apps

IIS 6 / 7

Unix Logon

BlackShield ID

NPS/IAS

Software

Tokens

Key Chain

Tokens

iPhone

Token

Active Directory

Synchronization

Windows LogonXP/Vista/Win7

Apache

Linux/Unix

market leading feature set

LAN, Web & Access protection

  • Work Flow Connectors
  • Rule based provisioning
  • Self enrolment
  • LDAP pre-Auth
  • Compliance based reporting
  • Audit trail reports
  • Database encryption
  • Automated alerts
  • Encrypted data links
  • Database copy protection
Market leading feature set
  • Integration
  • Security & Compliance
  • Non-expiring licences
  • Automation of reporting
  • Automation of deployment processes
  • Agents included
  • Tokens
  • TCO
  • Key-chain, USB, Grid, S/W and Tokenless
  • Customer programmable
  • Non-expiring
  • High levels of security
blackshield id technology brings advantages
BlackShield ID: Technology brings advantages

Greatly reduced total cost of ownership

Best-in-class security

Simpler, quicker System administration

Straightforward, rapid deployment and integration

Industry-leading performance

Unrivalled end-user experience

All inclusive s/w, Token longevity, Self-enrolment, Self service portal

Security policy support, Secure user deployment, Token initialisation

Browser basedi/f, Real-time systems reporting, Management by exception, Workflow Automation

Multiple LDAP integration, Agents included, Fast authentication

.NET based, Fast user look-up, High availability and resilience

Token lifecycle management, Great token range, self service portal, Self enrolment

when would you deploy cryptocard
When would you deploy CRYPTOCard?

Anywhere you use a password!

some sample customers
Some sample customers
  • Our biggest sectors are Finance and Government
    • In the UK we have 24% share in Local Government
    • Compliance is increasing penetration in other sectors (Retail, Legal)
  • B2B focussed
    • Our customers range from 10 seats to 150,000 seats
example stroud swindon
Example: Stroud & Swindon

Who they are

Based in Swindon, UK

One of 50 UK building societies

Head office with 400 people plus 20 offices and 20 agencies in south-west England

What they have

Over 60 remote workers

Financial consultants

SSL/VPN remote access network

What problem they solved

Secure access for confidential client reviews

Key features used

CRYPTO-MAS

Soft tokens

Compliance and audit support

FSA regulations

Secure access from any broadband connection

Ad-hoc home working

Returning parents

Emergency working

Lower cost than installing a server

Outsourced IT headache

Token portability

Key benefits

“We tend to outsource those elements of infrastructure services that requires specialist knowledge. Authentication isn’t the kind of thing you’d have to do day-in-day-out, so any skills tend to be lost and the cost of employing key specialists in-house doesn’t make sense any more.”

Colin CampbellIT Services Manager, Stroud & Swindon

example ttt moneycorp
Example: TTT Moneycorp

Who they are

Based in London, UK

Private and corporate money exchange

Over 600 employees around the world

What they have

Secured web and telephone access by corporate customers

RB-1 tokens

What problem they solved

Secure access for monetary transfers

Key features used

CRYPTO-MAS

Security with AES256 and Base 32

Flexible payment options

Freedom of access

Phone or web

Highest levels of security

Speed and ease of install

Completed in minutes

Low total cost of ownership

Outsourced overheads

No upfront investments

Key benefits

“CRYPTO-MAS provided an instant, resilient authentication service. The development and installation took minutes as opposed to days, which is impressive given our stringent standards.”

Thomas KadriDirector of Support ServicesTTT Moneycorp

points of difference
Points of difference

The first/only major Authentication vendor to deliver a SaaS model

Total Cost of Ownership over 5 years CRYPTOCard will be over 50% less expensive than other platforms.

CRYPTOCard prides itself on delivering authentication solutions that are easy to use and fast to integrate

CRYPTOCard boasts a high level of automation options for user and token management and administration

CRYPTOCard has a broad and innovative token technology

CRYPTOCard is a pure-play authentication company, has been innovating for more than 20 years and will continue to lead the market.

Cloud

Based

Affordable

Easy to Integrate

Simple to Manage

Innovative

Focused