SlideShare uma empresa Scribd logo
1 de 17
Proven. Trusted.
ESET Secure Authentication
ESET Secure Authentication




                             ESET Secure Authentication
                             provides powerful authentication to make remote access to
                             the company network and sensitive data safe, but hassle-
                             free.


                             It is a mobile-based solution
                             that uses two-factor, one time password (2FA OTP)
                             authentication for accessing the company’s VPN and OWA
                             (Outlook Web App). The advantage of one-time passwords
                             (OTPs) is that they are randomly generated and can’t be
                             predicted or reused.
ESET Secure Authentication




                   How does ESET Secure Authentication work?

                  Employees, upon remotely accessing the company network using VPN or
                  OWA, receive a one-time password on their mobile phones. This password is then
                  used to complement and strengthen the usual authentication process.
ESET Secure Authentication




                             Two-factor Authentication (2FA)
                             explained
                             As opposed to the standard password
                             authentication, 2FA OTP uses two elements. These are
                             “something that user knows”, such as a password or a
                             PIN code, and “something that user has”, typically a
                             mobile phone or hardware token.

                             Used in combination, they provide greatly
                             enhanced security for data access.
ESET Secure Authentication




                  Solves the problem of:

                     Static passwords that can be intercepted

                     User-created passwords that are not a random combination of characters
                      and can be easily guessed

                     Re-use of passwords intended for access to company assets for private accounts

                     Passwords containing user-specific data – e.g. a name, a date of birth

                     Simple patterns to derive new passwords, such as “peter1”, “peter2”, etc.
ESET Secure Authentication




                  Business benefits

                  Helps prevent the risk of breaches with unique passwords for each access

                  Protects from poor password practices

                     Saves costs – no additional hardware needed

                     Easy to migrate to and use

                     Global technical support in local languages
ESET Secure Authentication




                  IT benefits

                     Out-of-the-box solution                           iOS 4.2.1 or higher (iPhone)


                     Delivery of OTP via client app or SMS             Android 2.1 or higher


                     App works without internet connection             Windows Phone 7 or newer

                      (once installed)                                  Windows Mobile 6

                     Works with most VPN appliances                    BlackBerry 4.3 to 7.1

                     Supports most types of mobile operating systems   Symbian – all supporting J2ME

                     Global technical support in local languages       All J2ME enabled phones
ESET Secure Authentication




                 Installation and Initialization

                     To distribute the ESET Secure Authentication app on mobile phones, all you need to know
                      is the employee phone number. ESET Secure Authentication will send the user an SMS
                      with an activation link. Clicking on the link automatically downloads
                      an installer for that mobile platform.
ESET Secure Authentication




                 A closer look

                     The architecture of ESET Secure Authentication is designed to only use your existing
                      company infrastructure. In addition to the ESET Secure Authentication app on employee
                      mobiles – the client side – it contains a server application that seamlessly integrates with
                      the familiar network administrator environment of the MMC (Microsoft Management
                      Console) and ADUC (Active Directory Users & Computers).

                     Access to the app is PIN-protected to prevent any unauthorized manipulation.
Comprehensive list
of features and benefits


     Two-factor Authentication

     Client Side (mobile app)

     Server Side

     Remote Management
ESET Secure Authentication




                       Two-factor Authentication

                     Mobile-based, two-factor (2FA) one-time password (OTP) authentication
                      for a higher level of security

                     Native protection of Outlook Web App (OWA), VPNs and all
                      RADIUS-based services

                     Software only solution – no need to carry additional device or token

                     Convenient for the mobile workforce
ESET Secure Authentication




                       Client Side (mobile app)

                     One-tap installation, simple and effective user interface

                     Delivery of OTP via client application or SMS

                     OTP generating works independent of the availability of internet connection

                     Compatible with any mobile phone supporting SMS messaging

                     Supports broad range of mobile operating systems

                     PIN-protected access to prevent fraud in case of device theft or lost

                     Serves multiple OTP zones, e.g. OWA access, VPN access, and others
ESET Secure Authentication




                       Server Side

                     Out-of-the-box solution

                     Easy double-click installation and setup

                     The installer automatically recognizes OS and selects all suitable components
ESET Secure Authentication




                       Remote Management

                     Supports Microsoft Management Console (MMC)

                     Active Directory integration

                     ESET Secure Authentication extends Active Directory Users & Computers (ADUC
                      plugin) with additional features to enable managing the users’ two-factor authentication
                      settings
ESET Secure Authentication




                 System Requirements
                 Server Side                               Client Side

                 32&64-bit versions of Microsoft Windows   iOS 4.2.1 or higher (iPhone)
                 Server 2003, 2003 R2, 2008,               Android 2.1 or higher
                 2008 R2, 2012                             Windows Phone 7 or newer
                                                           Windows Mobile 6
                                                           BlackBerry 4.3 to 7.1
                                                           Symbian – all supporting J2ME
                                                           All J2ME enabled phones
COPYRIGHT © 1992 – 2013 ESET, SPOL. S R. O. ESET, LOGO ESET, NOD32, THREATSENSE, THREATSENSE.NET AND/OR OTHER MENTIONED PRODUCTS OF ESET, SPOL. S R. O., ARE REGISTERED TRADEMARKS OF
ESET, SPOL. S R. O. WINDOWS® IS A TRADEMARK OF THE MICROSOFT GROUP OF COMPANIES. OTHER HERE MENTIONED COMPANIES OR PRODUCTS MIGHT BE REGISTERED TRADEMARKS OF THEIR PROPRIETORS. PRODUCED
ACCORDING TO QUALITY STANDARDS OF ISO 9001:2000.

Mais conteúdo relacionado

Mais procurados

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and securityPRIYANKA944
 
Bezpieczeństwo w sieci
Bezpieczeństwo w sieciBezpieczeństwo w sieci
Bezpieczeństwo w sieciAnna Sz.
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkDigital Shadows
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Fiducial In PCB
Fiducial In PCBFiducial In PCB
Fiducial In PCBAjitNawale
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 

Mais procurados (20)

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Guangzhou DSPPA Audio Co., Ltd.
Guangzhou DSPPA Audio Co., Ltd.Guangzhou DSPPA Audio Co., Ltd.
Guangzhou DSPPA Audio Co., Ltd.
 
Vermeer case upload
Vermeer case uploadVermeer case upload
Vermeer case upload
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
Bezpieczeństwo w sieci
Bezpieczeństwo w sieciBezpieczeństwo w sieci
Bezpieczeństwo w sieci
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Ipad
IpadIpad
Ipad
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Fiducial In PCB
Fiducial In PCBFiducial In PCB
Fiducial In PCB
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 

Destaque

Top Ten Technology Trends that will dominate 2012
Top Ten Technology Trends that will dominate 2012Top Ten Technology Trends that will dominate 2012
Top Ten Technology Trends that will dominate 2012ThoughtWorks
 
Simple Two Factor Authentication
Simple Two Factor AuthenticationSimple Two Factor Authentication
Simple Two Factor AuthenticationJohn Congdon
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?Rambus Inc
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreStormpath
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java ApplicationsStormpath
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 

Destaque (8)

Top Ten Technology Trends that will dominate 2012
Top Ten Technology Trends that will dominate 2012Top Ten Technology Trends that will dominate 2012
Top Ten Technology Trends that will dominate 2012
 
Simple Two Factor Authentication
Simple Two Factor AuthenticationSimple Two Factor Authentication
Simple Two Factor Authentication
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Semelhante a ESET is introducing its brand new product ESET Secure Authentication

Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaBipeen Sinha
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Semelhante a ESET is introducing its brand new product ESET Secure Authentication (20)

Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
ESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEETESET_SECURE_ENTERPRISE_DATASHEET
ESET_SECURE_ENTERPRISE_DATASHEET
 
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEETESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
ESET_ENDPOINT_PROTECTION_ADVANCED_DATASHEET
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEETESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
ESET_ENDPOINT_PROTECTION_STANDARD_DATASHEET
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Mais de ESET

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity studentsESET
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity trainingESET
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?ESET
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...ESET
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear DenESET
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...ESET
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinESET
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015ESET
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent ThreatsESET
 
Shopping Online
Shopping OnlineShopping Online
Shopping OnlineESET
 
Banking Online
Banking OnlineBanking Online
Banking OnlineESET
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?ESET
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? ESET
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresESET
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESETESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat ReviewESET
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsESET
 

Mais de ESET (20)

ESET Cybersecurity students
ESET Cybersecurity studentsESET Cybersecurity students
ESET Cybersecurity students
 
ESET Cybersecurity training
ESET Cybersecurity trainingESET Cybersecurity training
ESET Cybersecurity training
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
 
Visiting the Bear Den
Visiting the Bear DenVisiting the Bear Den
Visiting the Bear Den
 
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
AVAR Sydney 2014: Lemming Aid and Kool Aid: Helping the Community to Help Its...
 
ESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection RegulationESET Quick Guide to the EU General Data Protection Regulation
ESET Quick Guide to the EU General Data Protection Regulation
 
Bootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus BulletinBootkits: Past, Present & Future - Virus Bulletin
Bootkits: Past, Present & Future - Virus Bulletin
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Shopping Online
Shopping OnlineShopping Online
Shopping Online
 
Banking Online
Banking OnlineBanking Online
Banking Online
 
Is Anti-Virus Dead?
Is Anti-Virus Dead?Is Anti-Virus Dead?
Is Anti-Virus Dead?
 
Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct? Is Linux/Moose endangered or extinct?
Is Linux/Moose endangered or extinct?
 
Unpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasuresUnpack your troubles*: .NET packer tricks and countermeasures
Unpack your troubles*: .NET packer tricks and countermeasures
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
#DoMore with ESET
#DoMore with ESET#DoMore with ESET
#DoMore with ESET
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Learn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platformsLearn more about ESET and our soulutions for mobile platforms
Learn more about ESET and our soulutions for mobile platforms
 

Último

A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Último (20)

A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

ESET is introducing its brand new product ESET Secure Authentication

  • 3. ESET Secure Authentication ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle- free. It is a mobile-based solution that uses two-factor, one time password (2FA OTP) authentication for accessing the company’s VPN and OWA (Outlook Web App). The advantage of one-time passwords (OTPs) is that they are randomly generated and can’t be predicted or reused.
  • 4. ESET Secure Authentication How does ESET Secure Authentication work? Employees, upon remotely accessing the company network using VPN or OWA, receive a one-time password on their mobile phones. This password is then used to complement and strengthen the usual authentication process.
  • 5. ESET Secure Authentication Two-factor Authentication (2FA) explained As opposed to the standard password authentication, 2FA OTP uses two elements. These are “something that user knows”, such as a password or a PIN code, and “something that user has”, typically a mobile phone or hardware token. Used in combination, they provide greatly enhanced security for data access.
  • 6. ESET Secure Authentication Solves the problem of:  Static passwords that can be intercepted  User-created passwords that are not a random combination of characters and can be easily guessed  Re-use of passwords intended for access to company assets for private accounts  Passwords containing user-specific data – e.g. a name, a date of birth  Simple patterns to derive new passwords, such as “peter1”, “peter2”, etc.
  • 7. ESET Secure Authentication Business benefits  Helps prevent the risk of breaches with unique passwords for each access  Protects from poor password practices  Saves costs – no additional hardware needed  Easy to migrate to and use  Global technical support in local languages
  • 8. ESET Secure Authentication IT benefits  Out-of-the-box solution iOS 4.2.1 or higher (iPhone)  Delivery of OTP via client app or SMS Android 2.1 or higher  App works without internet connection Windows Phone 7 or newer (once installed) Windows Mobile 6  Works with most VPN appliances BlackBerry 4.3 to 7.1  Supports most types of mobile operating systems Symbian – all supporting J2ME  Global technical support in local languages All J2ME enabled phones
  • 9. ESET Secure Authentication Installation and Initialization  To distribute the ESET Secure Authentication app on mobile phones, all you need to know is the employee phone number. ESET Secure Authentication will send the user an SMS with an activation link. Clicking on the link automatically downloads an installer for that mobile platform.
  • 10. ESET Secure Authentication A closer look  The architecture of ESET Secure Authentication is designed to only use your existing company infrastructure. In addition to the ESET Secure Authentication app on employee mobiles – the client side – it contains a server application that seamlessly integrates with the familiar network administrator environment of the MMC (Microsoft Management Console) and ADUC (Active Directory Users & Computers).  Access to the app is PIN-protected to prevent any unauthorized manipulation.
  • 11. Comprehensive list of features and benefits Two-factor Authentication Client Side (mobile app) Server Side Remote Management
  • 12. ESET Secure Authentication Two-factor Authentication  Mobile-based, two-factor (2FA) one-time password (OTP) authentication for a higher level of security  Native protection of Outlook Web App (OWA), VPNs and all RADIUS-based services  Software only solution – no need to carry additional device or token  Convenient for the mobile workforce
  • 13. ESET Secure Authentication Client Side (mobile app)  One-tap installation, simple and effective user interface  Delivery of OTP via client application or SMS  OTP generating works independent of the availability of internet connection  Compatible with any mobile phone supporting SMS messaging  Supports broad range of mobile operating systems  PIN-protected access to prevent fraud in case of device theft or lost  Serves multiple OTP zones, e.g. OWA access, VPN access, and others
  • 14. ESET Secure Authentication Server Side  Out-of-the-box solution  Easy double-click installation and setup  The installer automatically recognizes OS and selects all suitable components
  • 15. ESET Secure Authentication Remote Management  Supports Microsoft Management Console (MMC)  Active Directory integration  ESET Secure Authentication extends Active Directory Users & Computers (ADUC plugin) with additional features to enable managing the users’ two-factor authentication settings
  • 16. ESET Secure Authentication System Requirements Server Side Client Side 32&64-bit versions of Microsoft Windows iOS 4.2.1 or higher (iPhone) Server 2003, 2003 R2, 2008, Android 2.1 or higher 2008 R2, 2012 Windows Phone 7 or newer Windows Mobile 6 BlackBerry 4.3 to 7.1 Symbian – all supporting J2ME All J2ME enabled phones
  • 17. COPYRIGHT © 1992 – 2013 ESET, SPOL. S R. O. ESET, LOGO ESET, NOD32, THREATSENSE, THREATSENSE.NET AND/OR OTHER MENTIONED PRODUCTS OF ESET, SPOL. S R. O., ARE REGISTERED TRADEMARKS OF ESET, SPOL. S R. O. WINDOWS® IS A TRADEMARK OF THE MICROSOFT GROUP OF COMPANIES. OTHER HERE MENTIONED COMPANIES OR PRODUCTS MIGHT BE REGISTERED TRADEMARKS OF THEIR PROPRIETORS. PRODUCED ACCORDING TO QUALITY STANDARDS OF ISO 9001:2000.