Beruflich Dokumente
Kultur Dokumente
AND AUTHENTICATION
The threats from within are increasing on a
daily basis. 78% of all information security
breaches happen internally
ABOUT US
CONTD.
Copyrighted Products
Intelinks
Cyber
AGENDA
Why do we need Two Factor Authentication?
What is Two Factor Authentication?
Different Tokens with their architecture
Different Applications
Email Servers
Database
Servers
INDIVIDUAL INFORMATION
SECURITY - CURRENT
Anti Virus
Firewalls
FOR
COMPREHENSIVE
IPS
Point of Attack
Authentication Response
IDENTITY THEFT
Fastest
Hours
POINT OF ATTACK
Individual Ministry officers
METHODS OF ATTACK
Viruses
Targeted Phishing
Worms
Trojans
Map
Identify
Something
E-Token
Hard Token
SMS
HARD TOKEN
User Name
OTP Verification
True Authentication
True Authentication
Authshield Server
BES
1). User accesses the token generation
application on his BB device
IAS & AD
IAS
6). Access
Application
UN+PWD+TOKEN
AUTHSHIELD - E-TOKEN
Passwords
Digital Signatures
Certifcate Store
Online Subscription
credentials
APPLICATIONS
Continuous Polling to
ensure Session Timeout
Disk Encryption No
decryption without Token
Encrypted Mails, Messages
Access to Critical
Applications and IT
Infrastructure
FEATURES
MANAGEMENT PANEL
Management Portal to
Add
/ Delete users
Associate a Token with a User
De-associate a Token with a User
Lock a lost Token
Transfer a Token to another User
CASE STUDIES
Mail Solutions
Windows LogOn
with / without
Domain
Wireless
Web Enabled
Applications
Integration with
LDAP / MS Active
Servers
Web
PROCESS
User Name, Pwd, OTP
True Authentication
True Authentication
Access
PROCESS
User Name, Pwd
Active Directory
True Authentication
AuthShield Server
True Authentication
PROCESS
User Name, Pwd Authenticated by LDAP
User Name, Pwd, OTP
Private and Confdential -INNEFU LABS
True Authentication
PROCESS
User Name, Pwd
Active Directory
True Authentication
AuthShield Server
True Authentication
ADVANTAGES
The
User Gets
No
CONTD.
The
organization gets
user administration.
Seamless Integration with current setup
Simple price set up
Better use of the IT systems already in place
100% control of 'who can access the system'.
Zero maintenance on Identity theft
Zero
WHAT WE OFFER
Indigenous Technology
Unparalleled Support
Competitive Advantage
PREVENT IDENTITY
THEFT!!
COUNT ON
QUESTIONS WELCOME
INNEFU LABS PVT. LTD
www.innefu.com
+91-11-47065864 / 66
contact@innefu.com, info@innefu.com
THANK YOU