SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Biometric Secure Single Sign-On (SSO) Software
for Banks and the Financial Services Industry
Eliminate Passwords and Increase Security in your Bank
The increasing number of enterprise security data security breaches combined with the pressure on
the financial services industry to implement methods of password management, identity
management, data and network security, and two factor authentication has never been stronger.
The sharing or theft of user passwords still remains the number one reason that corporate data is
compromised. We help to solve this problem by allowing the financial services industry the ability to
implement a centralized password management repository for single sign-on and secure access to
internal applications.
What is Single Sign-On?
A cost-effective, server-based back-end that offers enterprise-wide identity and password
management as well as data protection that is easily deployed and managed by your IT department.
With a single solution that supports strong authentication techniques, banks can protect corporate
and personal data while ensuring industry mandated compliance with governmental regulations.
www.m2sys.com© 2014
What Data Breaches Really Cost
Money motivates most cyber crooks and the most popular way to access it is through penetration of internal bank and
financial service networks looking for information to sell or exploit. Consider these facts about banking and financial
service data breaches:
– Average data breach cost is $3.5m. Trend: costs going up.
– Average detection and escalation costs are between $0.3m – $1.3m per breach.
– Average notification costs are between $0.02m – $0.5m per breach.
– Average post data breach expenses are between $0.4m – $1.6m per breach.
– Average business costs losses are between $0.25m – $3.3m per breach.
– Average number of breached records: 18,600 – 20,100 (rounded)
– Indirect costs account for between 40% and 67% of post data breach costs
We just passed the first half of 2014, and already we have witnessed many high profile data breaches in the U.S.:
ITRC Breach ID Bank or Organization State Breach Category Records Exposed?
ITRC20140702-02 Stanford Federal Credit Union CA Banking/Credit/Financial Yes - Published
ITRC20140609-03 Bluegrass Community Federal Credit Union KY Banking/Credit/Financial Yes - Unknown
ITRC20140604-01 American Express NY Banking/Credit/Financial Yes - Published
ITRC20140408-01 Cole Taylor (Bank) Mortgage OR Banking/Credit/Financial Yes - Unknown
ITRC20140327-03 TD Bank NJ Banking/Credit/Financial Yes - Unknown
ITRC20140311-02 Timken Company OH Banking/Credit/Financial Yes - Published
ITRC20140225-09 TD Bank / University of New Hampshire NH Banking/Credit/Financial Yes - Unknown
ITRC20140210-04 Bank of the West CA Banking/Credit/Financial Yes - Unknown
ITRC20140107-08 Branch Banking & Trust Co. NC Banking/Credit/Financial Yes - Unknown
Source: ITRC Surveys & Studies (http://www.idtheftcenter.org/images/breach/ITRC_Breach_Report_2014.pdf)
www.m2sys.com© 2014
True Cost of Data Breaches (a 2013-14 Study)
36%
30%
24%
10%
Reported Data Breaches (by Type)
Unauthorized
Access
Accidental
Disclosure
Theft
Loss
5.4
5.09
3.97
3.4
0
2.4
2.52
2.19
1.18
1
5.85
4.74
4.19
3.68
3.12
2.69
2.59
2.36
1.61
1.37
0 2 4 6 8
US
DE
FR
UK
AB
IT
AU
JP
BZ
ID
2014 2013
Cost of Data Breach in 2013-14 by Country
(Measured in Billion US$)
www.m2sys.com© 2014
Why should banks use SSO?
Biometric SSO: A Critical Part of a Security Strategy
Password Management
Identity Management
Data and Network Security
Encryption
Authentication
Replace insecure
passwords with
biometric identifier
Reduce Help Desk calls
Protect corporate data
from unauthorized
access and insider
threats
Featured Benefits
Malicious or
Criminal
Attack 36.5%
System Glitch
28.5%
Human
Factor 35%
www.m2sys.com© 2014
How Does Biometric SSO Work?
Establish a Secure Authentication Framework
•Website &
application support
•Enterprise class SSO
•Remote
management for IT
Password
Protection
•Windows logon
protection
•Secure Email
delivery
•VPN lockdown
Network
Security
•Strong file & folder
protection
•Uses MS CAPI for
encryption
•Portable, sharable
data protection
Encryption
•Authenticated user
logon
•Compatible with
most M2SYS
fingerprint readers,
and finger vein tech
Biometrics
•Token
authentication
•Full PKI support
•CMS integration
Smart Card
•Device
authentication
•Client access control
•Encrypted
communication
TPM
www.m2sys.com© 2014
How Does Biometric SSO Help Increase Security?
Biometric secure Single Sign-On (SSO) software allows you to increase security and reduce the
expense of password management at your bank. Our enterprise password management and
network security software is an ideal solution for banks and financial organizations who are
looking to secure their networks against risky password practices among users as well as lowering
support costs for resetting passwords and dealing with unauthorized access.
Key Benefits
 Replace insecure passwords that are used to protect data, emails, login, etc. with biometrics
 Easily scale from one to thousands of users with multiple types of authentication devices
 Protect corporate data from unauthorized access and insider threats
 Generate real-time reports showing which users are accessing specific PC’s, networks, and
applications
 Reduce help desk calls
 Fast return on investment (ROI)
www.m2sys.com© 2014
Enterprise Password Management & Network Security Software
Features and Benefits:
• Enterprise Login : To computers (desktops/laptops), core software, banking apps, web
servers & websites
• Biometric Single Sign-On (SSO): Secure one-touch login to any application
• Centralized User Management: Centralized management of user’s rights, policies and
credentials right from active directory users and computers
• Strong Multifactor Authentication: Fingerprints, finger vein, palm vein, smart cards,
passwords or any combination of these credentials
• Authentication in core banking software: Integratable with any CRM and product lifecycle
management software platform that powers core banking operations
• Wide Range of supported Hardware: Use either M2-FuseID™ (multimodal reader), M2-
FingerVein™ or any M2SYS fingerprint reader
• Database compatibility: Supports any SQL compliant database, including MS SQL Server,
Access, MySQL, Oracle 9i, DB2, Informix
www.m2sys.com© 2014
How Does Biometric SSO Help Increase Security?
Corporate Headquarters:
1050 Crown Pointe Pkwy.
Suite 850
Atlanta, GA 30338
USA
Asia Office:
House-279, Road-19,
Mohakhali DOHS,
Dhaka 1216
Bangladesh
E-mail: info@m2sys.com
Phone: +1 (770) 393 0986
Website: www.m2sys.com
Get Social:
Facebook: https://www.facebook.com/m2sys
Twitter: @M2SYS
LinkedIn: http://www.linkedin.com/company/m2sys-technology
Blog: blog.m2sys.com
YouTube: http://www.youtube.com/m2sys
Google+: https://plus.google.com/M2SYS
Contact Us
www.m2sys.com© 2014

Mais conteúdo relacionado

Mais de M2SYS Technology

Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Mais de M2SYS Technology (10)

Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Healthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast SummaryHealthcare Data Integrity and Interoperability Standards Podcast Summary
Healthcare Data Integrity and Interoperability Standards Podcast Summary
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Enterprise Password Management and Network Security Software - Single Sign-On (SSO)

  • 1.
  • 2. Biometric Secure Single Sign-On (SSO) Software for Banks and the Financial Services Industry Eliminate Passwords and Increase Security in your Bank The increasing number of enterprise security data security breaches combined with the pressure on the financial services industry to implement methods of password management, identity management, data and network security, and two factor authentication has never been stronger. The sharing or theft of user passwords still remains the number one reason that corporate data is compromised. We help to solve this problem by allowing the financial services industry the ability to implement a centralized password management repository for single sign-on and secure access to internal applications. What is Single Sign-On? A cost-effective, server-based back-end that offers enterprise-wide identity and password management as well as data protection that is easily deployed and managed by your IT department. With a single solution that supports strong authentication techniques, banks can protect corporate and personal data while ensuring industry mandated compliance with governmental regulations. www.m2sys.com© 2014
  • 3. What Data Breaches Really Cost Money motivates most cyber crooks and the most popular way to access it is through penetration of internal bank and financial service networks looking for information to sell or exploit. Consider these facts about banking and financial service data breaches: – Average data breach cost is $3.5m. Trend: costs going up. – Average detection and escalation costs are between $0.3m – $1.3m per breach. – Average notification costs are between $0.02m – $0.5m per breach. – Average post data breach expenses are between $0.4m – $1.6m per breach. – Average business costs losses are between $0.25m – $3.3m per breach. – Average number of breached records: 18,600 – 20,100 (rounded) – Indirect costs account for between 40% and 67% of post data breach costs We just passed the first half of 2014, and already we have witnessed many high profile data breaches in the U.S.: ITRC Breach ID Bank or Organization State Breach Category Records Exposed? ITRC20140702-02 Stanford Federal Credit Union CA Banking/Credit/Financial Yes - Published ITRC20140609-03 Bluegrass Community Federal Credit Union KY Banking/Credit/Financial Yes - Unknown ITRC20140604-01 American Express NY Banking/Credit/Financial Yes - Published ITRC20140408-01 Cole Taylor (Bank) Mortgage OR Banking/Credit/Financial Yes - Unknown ITRC20140327-03 TD Bank NJ Banking/Credit/Financial Yes - Unknown ITRC20140311-02 Timken Company OH Banking/Credit/Financial Yes - Published ITRC20140225-09 TD Bank / University of New Hampshire NH Banking/Credit/Financial Yes - Unknown ITRC20140210-04 Bank of the West CA Banking/Credit/Financial Yes - Unknown ITRC20140107-08 Branch Banking & Trust Co. NC Banking/Credit/Financial Yes - Unknown Source: ITRC Surveys & Studies (http://www.idtheftcenter.org/images/breach/ITRC_Breach_Report_2014.pdf) www.m2sys.com© 2014
  • 4. True Cost of Data Breaches (a 2013-14 Study) 36% 30% 24% 10% Reported Data Breaches (by Type) Unauthorized Access Accidental Disclosure Theft Loss 5.4 5.09 3.97 3.4 0 2.4 2.52 2.19 1.18 1 5.85 4.74 4.19 3.68 3.12 2.69 2.59 2.36 1.61 1.37 0 2 4 6 8 US DE FR UK AB IT AU JP BZ ID 2014 2013 Cost of Data Breach in 2013-14 by Country (Measured in Billion US$) www.m2sys.com© 2014
  • 5. Why should banks use SSO? Biometric SSO: A Critical Part of a Security Strategy Password Management Identity Management Data and Network Security Encryption Authentication Replace insecure passwords with biometric identifier Reduce Help Desk calls Protect corporate data from unauthorized access and insider threats Featured Benefits Malicious or Criminal Attack 36.5% System Glitch 28.5% Human Factor 35% www.m2sys.com© 2014
  • 6. How Does Biometric SSO Work? Establish a Secure Authentication Framework •Website & application support •Enterprise class SSO •Remote management for IT Password Protection •Windows logon protection •Secure Email delivery •VPN lockdown Network Security •Strong file & folder protection •Uses MS CAPI for encryption •Portable, sharable data protection Encryption •Authenticated user logon •Compatible with most M2SYS fingerprint readers, and finger vein tech Biometrics •Token authentication •Full PKI support •CMS integration Smart Card •Device authentication •Client access control •Encrypted communication TPM www.m2sys.com© 2014
  • 7. How Does Biometric SSO Help Increase Security? Biometric secure Single Sign-On (SSO) software allows you to increase security and reduce the expense of password management at your bank. Our enterprise password management and network security software is an ideal solution for banks and financial organizations who are looking to secure their networks against risky password practices among users as well as lowering support costs for resetting passwords and dealing with unauthorized access. Key Benefits  Replace insecure passwords that are used to protect data, emails, login, etc. with biometrics  Easily scale from one to thousands of users with multiple types of authentication devices  Protect corporate data from unauthorized access and insider threats  Generate real-time reports showing which users are accessing specific PC’s, networks, and applications  Reduce help desk calls  Fast return on investment (ROI) www.m2sys.com© 2014 Enterprise Password Management & Network Security Software
  • 8. Features and Benefits: • Enterprise Login : To computers (desktops/laptops), core software, banking apps, web servers & websites • Biometric Single Sign-On (SSO): Secure one-touch login to any application • Centralized User Management: Centralized management of user’s rights, policies and credentials right from active directory users and computers • Strong Multifactor Authentication: Fingerprints, finger vein, palm vein, smart cards, passwords or any combination of these credentials • Authentication in core banking software: Integratable with any CRM and product lifecycle management software platform that powers core banking operations • Wide Range of supported Hardware: Use either M2-FuseID™ (multimodal reader), M2- FingerVein™ or any M2SYS fingerprint reader • Database compatibility: Supports any SQL compliant database, including MS SQL Server, Access, MySQL, Oracle 9i, DB2, Informix www.m2sys.com© 2014 How Does Biometric SSO Help Increase Security?
  • 9. Corporate Headquarters: 1050 Crown Pointe Pkwy. Suite 850 Atlanta, GA 30338 USA Asia Office: House-279, Road-19, Mohakhali DOHS, Dhaka 1216 Bangladesh E-mail: info@m2sys.com Phone: +1 (770) 393 0986 Website: www.m2sys.com Get Social: Facebook: https://www.facebook.com/m2sys Twitter: @M2SYS LinkedIn: http://www.linkedin.com/company/m2sys-technology Blog: blog.m2sys.com YouTube: http://www.youtube.com/m2sys Google+: https://plus.google.com/M2SYS Contact Us www.m2sys.com© 2014