Sie sind auf Seite 1von 3

EzIdentity Platform

Next Generation Identity Protection

Future Proof Strong Authentication (2FA)


For organizations seeking to protect the confidentiality and Man-In-The-Middle attacks:
integrity of sensitive data, communications and transactions,
“This is a common and predictable
EZMCOM offers solutions that increase the security of
attack. As an industry, we need to
authentication with a layered approach consisting of 2nd factor accept that solutions not incorporating
tokens, a Mutual Authentication layer & transaction signing for strong client and server authentication
guarding Man-In-The-Middle, Pharming, Man-In-The-Browser, cannot survive the Internet. Ten years
Script-In-The-Middle attacks that otherwise render 2FA tokens ago, this was evident with the advent
vulnerable. of key SSL mechanisms. It‟s time to
put them to work.”
Eric Greenberg, Former leader of
The Problem: Netscape’s security group, which
Regulatory authorities across the originally created SSL
What are micro-caps? Also known
globe have acknowledged the
as penny stocks these are thinly
threat of Phishing to financial
traded stocks.
institutions and called for stronger “All the kit-using criminal has to do is
authorization and authentication register a phony domain name, then
What the hackers do is by buying plug that and the URL of the real Web
for their online customers. In the
shares of that micro-cap with your site into the software‟s administrative
U.S., Securities and Exchange
money he drives up the price for control panel. The kit then
Commission has warned users of
the particular share. Once the price communicates in real time with the
keystroke-logging software,
is quite high he sells his own target IP address and uses a proxy to
phishing scams and traditional
holdings at a considerable profit. redirect content from the legitimate
snoops as ways fraudsters could
The money is then wired to an site to the bogus URL; thus the user
obtain access to online brokerage
account in a different country or a interacts with actual content from, say,
accounts and steal money.
series of straw men and dummy his own bank, adding to the deception.
corporations are used to transfer it The fake URL squats between the
As more and more people trade consumer and the target -- that‟s
to their account. As online trading
online, there has been also a rise in where the “Man in the Middle” phrase
get increasingly easy many
the number of hack attacks where comes from -- and captures all data
investors drop their guard.
your resources are used by hackers from user to bank or bank to user.”
Financial institutions just cannot
to make profits for themselves. Gregg Keizer, InformationWeek
take it easy on the net and need to
These attacks are often carried out New Phishing Toolkit Poses Danger to
implement minimum
by stealing your identity and then Consumers
authentication security to address
accessing your online account with
this challenge to the online trading
an online trading firm. Let us first
industry. “Two-factor authentication is not
understand how these hackers
work. useless. It works for local log-in, and it
Phishing still remains the main works within some corporate
method that fraudsters use to networks. But it won't work for remote
The first thing the hacker needs to
attack financial institutions; though authentication over the Internet. I
do is to steal your username and
simple and cost-effective, it yields predict that banks and other financial
password. There are numerous
lucrative results. However, as institutions will spend millions
ways in which they can do this.
financial institutions across the outfitting their users with two-factor
And new ways are being authentication tokens. Early adopters
globe continue to deploy strong
developed all the time. Once they of this technology may very well
authentication, fraudsters are also
have your user name and experience a significant drop in fraud
finding more sophisticated ways to
password they can easily access for a while as attackers move to easier
launch attacks. As the fraud
your account and buy or sell targets, but in the end there will be a
landscape evolves, financial
whatever they want to. Exactly the negligible drop in the amount of fraud
institutions will come to face more
way you do. So this hacker is most and identity theft
advanced threats, specifically Man-
likely to sell all the shares that you Bruce Schneier, April issue of
in-the-middle and Trojan
have accumulated, and with the Communications of the ACM
(malware) attacks.
money he thus receives will but
shares on micro-caps.
EzIdentity Platform
Layered Defense, Future Proof

Layer-1: Second Factor Authentication (2FA)


The first layer of defense – a One-Time Password (OTP) easily eliminates a wide spectrum of
Phishing attacks. The OTP is available for the user in the form of Hardware or Software Token
allowing the implementation of Layer-1 in a significantly cost effective way by harnessing the
power of Software based approach.

Layer-2: Mutual Authentication


The use of only one-way SSL security (only the website has an SSL certificate instead of two-way,
which is the way SSL was designed to be used), reliance on easily intercepted „shared secrets‟, or
easily spoofed information such as timezone, IP geolocation are primary reasons for failure of
existing authentication measures. Moreover, the overall cost & complexity in implementing a 2-
way SSL solution with the end-user education or the provisioning of a pure out-of-band
authentication & authorization solution using SMS or voice-calls or even deploying specialized
hardware tokens capable of transaction signing pose many other business related challenges to
enterprises that need a strong yet easy to use solution.

EzIdentity provides a one-stop multi-layer, multi-token authentication platform that becomes a


single gateway to a host of software and hardware based authentication solution that balance our
usability, security & features with its patent pending algorithms to bootstraps 2FA (software or
hardware) with added layers of security transparent to end-users using strength of digital
signatures to provide mutual authentication similar to a 2-way SSL & transaction signing working
in a virtual out-of-band channel.
EzIdentity
Platform features and benefits

EzIdentity Protection

EzIdentity Benefits
Ease of use: End-users simply use the OTP Enhanced security: Strong authentication through
generated by token (software or hardware) and type enforcement of two-factor authentication:
their PIN code to get the two-factor capabilities. something the user has (the token) and something
Enhancement of 2FA tokens with Mutual the user knows (the PIN code). In addition,
Authentication is provided in a transparent way to Mutual Authentication: something that you are (a
the user without changing customer or 2FA token digital finger print) guards against Man-In-The-
behavior. Middle (MITM) phishing attacks.

Compelling ROI: Maximize ROI on existing 2FA One Stop Solution: Allows multiple applications to
tokens by enhancing their security. Minimal IT integrate and implement various configurations of
enablement required. security as deemed necessary by the application. A
centrally managed solution that can provide
Standards-based: Implements Open standards of software tokens, hardware tokens to PKI Based
Cryptography and FIPS compliant algorithms. RSA, tokens and multiple layers of security.
PKCS, EMV Cap v2, OATH compliant standards
Future-ready: Future-proof investment through
Compliance: Standards and regulatory compliance extensible platform capable of plug-and-play
for identity, privacy, policy enforcement, audit and support of an increasing family of EzIdentity
authentication services (Sarbanes-Oxley, Basel II, tokens as well as support for a broad range of 3rd
GLBA, HIPAA, FFIEC and more). party tokens.

Das könnte Ihnen auch gefallen