Enviar pesquisa
Carregar
Convenience and Security for banking customers with CA Advanced Authentication
•
1 gostou
•
968 visualizações
CA Technologies
Seguir
Convenience and Security for banking customers with CA Advanced Authentication
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 20
Baixar agora
Baixar para ler offline
Recomendados
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
CA Technologies
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
CA Technologies
Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity Model
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Recomendados
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
CA Technologies
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
CA Technologies
Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity Model
CA Technologies
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
CA Technologies
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Introducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
CA Technologies
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
CA Technologies
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
CA Technologies
Agile Management Opening Keynote
Agile Management Opening Keynote
CA Technologies
Managing Financial Technology Is It An Art Or Science
Managing Financial Technology Is It An Art Or Science
ANZ
Mais conteúdo relacionado
Mais procurados
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
CA Technologies
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Introducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
CA Technologies
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
CA Technologies
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
CA Technologies
Mais procurados
(20)
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Introducing New Identity as a Service
Introducing New Identity as a Service
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
Destaque
Agile Management Opening Keynote
Agile Management Opening Keynote
CA Technologies
Managing Financial Technology Is It An Art Or Science
Managing Financial Technology Is It An Art Or Science
ANZ
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
CA Technologies
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
CA Technologies
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
CA Technologies
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
CA Technologies
CA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
CA Technologies
ANZ- CV
ANZ- CV
Ahmed Zafar
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
CA Technologies
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
CA Technologies
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
CA Technologies
CA IDMS Buffer Tuning
CA IDMS Buffer Tuning
CA Technologies
What’s new in CA Datacom
What’s new in CA Datacom
CA Technologies
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
CA Technologies
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
CA Technologies
CA IDMS Performance and Tuning
CA IDMS Performance and Tuning
CA Technologies
CA IDMS Database Navigation
CA IDMS Database Navigation
CA Technologies
Destaque
(19)
Agile Management Opening Keynote
Agile Management Opening Keynote
Managing Financial Technology Is It An Art Or Science
Managing Financial Technology Is It An Art Or Science
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
CA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
ANZ- CV
ANZ- CV
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
CA IDMS Buffer Tuning
CA IDMS Buffer Tuning
What’s new in CA Datacom
What’s new in CA Datacom
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
CA IDMS Performance and Tuning
CA IDMS Performance and Tuning
CA IDMS Database Navigation
CA IDMS Database Navigation
Semelhante a Convenience and Security for banking customers with CA Advanced Authentication
Applying Data Science to Your Business Problem
Applying Data Science to Your Business Problem
CA Technologies
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
CA Technologies
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
CA Technologies
Securing your API Portfolio with API Management
Securing your API Portfolio with API Management
CA Technologies
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
Benjamin Wyrick
MTBiz May-June 2019
MTBiz May-June 2019
Mutual Trust Bank Ltd.
We Authenticate the World
We Authenticate the World
VASCO Data Security
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
Guardian Analytics
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
CA Technologies
Accenture Market Pulse Survey 2020 | Insurance in Luxembourg
Accenture Market Pulse Survey 2020 | Insurance in Luxembourg
Accenture BeLux
Secure Online Banking
Secure Online Banking
VASCO Data Security
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
Glenn Peake
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
CA Technologies
The four trends driving the insurance industry
The four trends driving the insurance industry
mohamed hanini
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit123
When does a company need to be PCI compliant
When does a company need to be PCI compliant
Divya Kothari
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
CA Technologies
Semelhante a Convenience and Security for banking customers with CA Advanced Authentication
(20)
Applying Data Science to Your Business Problem
Applying Data Science to Your Business Problem
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Securing your API Portfolio with API Management
Securing your API Portfolio with API Management
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
MTBiz May-June 2019
MTBiz May-June 2019
We Authenticate the World
We Authenticate the World
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
Accenture Market Pulse Survey 2020 | Insurance in Luxembourg
Accenture Market Pulse Survey 2020 | Insurance in Luxembourg
Secure Online Banking
Secure Online Banking
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
The four trends driving the insurance industry
The four trends driving the insurance industry
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
When does a company need to be PCI compliant
When does a company need to be PCI compliant
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
Mais de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Mais de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Último
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Último
(20)
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Convenience and Security for banking customers with CA Advanced Authentication
1.
World® ’16 Convenience and Security for Banking Customers Andrew Steadman - Product Director-Agiliti -
Fiserv SCX50S SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Securing their channels, both digital and staffed, is key for a bank but that often comes at the price of convenience for the bank’s customer. Applying the appropriate level of security at the appropriate time will be both convenient for the customer and secure for the bank, satisfying the needs of both. We will discuss how CA Advanced Authentication and the Fiserv Financial Crime and Risk Management solution, Agiliti, allows banks to apply real time risk assessment to determine the right level of security challenge to ensure the customer and bank are protected. Andrew Steadman Fiserv Product Director, Agiliti
4.
Balancing Security and Convenience in Banking
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What problem were we seeking to solve? • Financial Institution Customers interact across multiple channels •
Securely identifying customers has placed an onerous burden on customers • ‘Agiliti’ wanted to simplify this for customers • Ever increasing compliance and onus on the Financial Institution to protect • PSD2 is going to add broad access requirements
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Making a ‘Faster Payments’ transaction ?
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Making a ‘Faster Payments’ transaction - 2
Ways They are different!! Security Code Pay a new Beneficiary £250 Limit for 1st Payment No Limit for 2nd Payment User ID, Password and PIN Pay a new Beneficiary No Limit for 1st Payment Authorised by Card Device
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How ‘Agiliti’ Solves that problem • A combination of components built to a single solution •
Services published via a service bus enables all channels • Real time assessment of risk determines the level of credential required by the customer • User ID + Password • Temporary PIN • One Time PIN delivered via SMS • Cherished Questions
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Assembling the Pieces Fiserv Communicator Advantage Fiserv Financial Crime Risk Management Platform (FCRM) CA Advanced Authentication (CA AA) Authentication Services
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Device Signatures • Every call to the Authentication Services carries a device signature •
Generated by CA client side libraries within Apps • Generated by javascript in browser • Value is not store on the device • Trusted Devices are identified by an Arcot generated ID which is stored on the device
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Typical Process Logon ••User ID ••Static Password ••Temporary PIN ••Risk Analysis – SMS OTP OTP required if high risk ••Sent to mobile device known to be customers ••Dual factor authentication applied Customer executes a transaction ••Pre defined to have permanent PIN required ••User for ‘high risk’ transactions Transaction pattern is not ‘normal’ for customer ••CA AA OTP issued after FCRM identifies an out of character transaction ••Holistic risk assessment
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Advanced Authentication
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Financial Crime Risk Management Platform • Leverages organisational knowledge is assessing risk •
Assesses in real time to determine risk • Creates a Customer Risk Score • Delivers an Holistic View of Fraud
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Which Channels are using it in Agiliti? • Branch and Call Centre platform •
Validates some numbers from PIN • Neither password nor PIN require to be fully disclosed • Uses cherished questions over password • Allows input of OTP received by customer via SMS • Web, Tablet, Mobile and Apps • All 4 digital channels are using the same credentials • Use of credentials is minimised for a better user experience
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Where are we now? • Solution is live to the public with a number of institutions •
It is supporting institutions with a new digital experience • Customer and Member reaction has been very positive
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What does it mean for customers? • One set of credentials to remember •
Only asked for minimal credentials based upon assessed risk • Known devices allow data display without any input • Remove typical approach of lowest common denominator security model
17.
Thank you Andrew.Steadman@Fiserv.com www.agiliti-fiserv.com www.fiserv.com
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD18
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Baixar agora