SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Smart Card Forum – Prague
IIIII
        Secured Access for entreprise


                   Jérôme Soufflot
                   Bus dev EMEA Channel Manager
                   May 20 , 2010
Agenda

           Gemalto Presentation


        Overview Gemalto IAM offer


Update on Smart Card & components technology


        Share expertise with Use cases




                                               2
Gemalto key figures
 € 1.65 billion revenue 2009

 Innovation:
       11 R&D centers worldwide
       1,400 engineers
       103 inventions first filed in 2009
       Over 4,500 patents/applications

 Global footprint:                                           Regional revenue
     18 production centers
     30 personalization facilities
     77 sales & marketing offices           North & South           Europe,            Asia
                                             America                 Middle East,       € 331m
                                             € 394m                  Africa             20% of

 Experienced team:                          24% of revenue          € 929m
                                                                                        revenue

                                                                     56% of revenue
     10,000 employees
     90 nationalities
     42 countries                                                          % of FY ’09 revenue



                      March 2010                                                                  3
Gemalto’s secure personal devices are in the
hands of billions of individuals
 Producing and securely personalizing over 1.5 billion devices in 2009
 Serving 450 mobile operators worldwide with some 1.8 billion SIM cards
  addressable by our solutions
 Supplying over 350 banks worldwide with banking cards in the hands of
  over 800 million people
 Supplying ePassports to countries with some 600 million citizens
 30 years experience in designing and producing secure personal devices




                 March 2010                                                4
Strategic alliances and partners


 Alliances with major industry players in all Business
  Units telecommunications, ID and security

 Joint initiatives with leading payment associations

 Network of 400 partners with worldwide coverage
     Business partners: VARs, resellers, distributors,
      systems integrators
     Solution and technology partners
         – Increase Gemalto solutions portfolio
         – Ensure interoperability with leading solution providers




                    March 2010                                       3
BU Security - IAM Enterprise Offer                                  Cards, Tokens
Smart Card
 Readers                                                            & OTP Readers




               Services,
             Fulfillment and Operated   Drivers, applications and
                 support     services    authentication servers

                                                                                    6
What is the Role of the Smart Card?
   PKI
 Hosts digital certificates
 Hosts user PIN
                                      Secure chip
 Computes encryption /
  signing cryptography                Tamper-proof
                                      Resistant from
                                       hardware attack
   OTP                                Resistant from
     Hosts the One-Time-Password       software attack
   application
     Hosts the OTP secret keys and
   (can) protect them with a PIN
     Computes the OTP
Example of Smart Card Use in Enterprise
                                                                              Entreprise Data


                                                                                                Physical
                                                                                                Access
                                                                                                Controls



Secure access to buildings                                                                   PKI Certificates



Secure access to Entreprise networks

Secure access to Entreprise
applications                                                                             Passwords and
                                                                                             OTP



Authenticate employees digitally
and physically                                                                          Barcode &
                                                                                        Magnetic encoding




                                                               Data                 Photos
                                                               Management
                                                               Applications
                                                           Web
                                                          server


                       E-signer Software
                                           Verification
                                             server




      •email            •Digital signature
Strong authentication for Enterprises
                                                         3 factor
                                                      authentication

                              2 factor
                           authentication
Security




                                              PKI Certificates +
                                               MS Base CSP

                                           •Certificate based logon
                                              •Digital Signature
                                                  •Encryption
                                               •Secure Storage

                      OATH OTP on card +
                       Gemalto SA Server

             User
           name and
           password


                                   Feature set
                                                                       9
CARDS & MIDDLEWARE


                     10
Card Families




                    .NET




TPC                                         TOP




      Regional Offer: IAS, CNS, SetAccess
                                                  11
Differentiation & Positioning




       Differentiating features            Core Message                Target Customers

       Minidriver PKI architecture
                                     Microsoft integration
       OTP OATH onboard                                                MS-centric F500
                                     Easy to deploy / Low TCO
.NET   Bio solution                                                    SMEs through
                                     Versatility (form factors, OTP)
       .NET dev. environment                                           Channel
                                     Mainstream offer
       FIPS 140-2 level 3
                                     CC certified for legally
       Common Criteria EAL 4+                                          Fortune 500
TPC                                  binding signature
       certification                                                   Direct or through SIs

       Javacard,
       Global Platform               Multiplicative Cryptographic
TOP                                                                    System Integrators
       Dual Interface                Javacard Platform
       FIPS 140-2 level 3
                                                                       Regional (France,
       IAS ECC Compliant             Emerging european                 Europe?)
IAS
       CC EAL4+ certification        regulatory compliance             Government
                                                                       Healthcare




                                                                                            12
Middleware, Management & Competition




               Middleware             Management systems

                                      Gemalto DAS
                                      Microsoft ILM
        None for Windows
.NET                                  Intercede myID
        Libraries for Linux & MacOS
                                      Opentrust SCM
                                      Versatile vSEC:CMS
                                      Microsoft ILM
TPC     Classic Client V 6.0          Opentrust SCM
                                      Intercede myID


TOP     n/a                           n/a



        Classic Client V6.0           Opentrust SCM
IAS
                                      Microsoft ILM




                                                           13
Features, Value Proposition & Mgmt. options



 Main Features
       PKI and OTP authentication
       Minidriver for Windows XP, Vista, W7
       Diversity of form factors
       PKCS#11 libraries for Windows, Linux, Solaris and Mac
       Wide integration in the IAM ecosystem
       .NET development platform



 Value Proposition
     Ease of deployment, reduced Total Cost of Ownership
     Versatility (2 authentication mechanisms, variety of form factors)
     Ease of integration (wide ecosystem integration)




 Management Options
     SME: Gemalto DAS, Versatile VSEC:CMS
     Large Enterprise: Microsoft ILM, Intercede myID and Opentrust SCM


                                                                           14
CONNECTED PKI & SECURE
FLASH TOKENS
                         15
Features & Value Proposition




                        Unique    feature         Use

USB eSeal token v2
                                                pki
                       Java Smart Card based    Classic client


USB Shell Token v2 +
        NET               CCID .NET based
                                               pki


USB Shell Token v2 +
     TPC IM CC            CC EAL4+ /            Pki
                           PPSSCD               Classic client
     SA .NET Dual
                        connected / non
                                               Mobility & security
                          connected
                                               pki + OTP

                                                                     16
Features & Value Proposition




             Unique
                                                   Use
             feature
 SEG
            CCID .NET                        pki + secure
          MS CAPI & CSP                       storage

  SG
               HID                          secure storage +
             pkcs#11                             P11

SG FIPS
            Fips 140-2
                                             secure storage
              level 3



                         HID =Human Interface Device
                                                               17
READERS                      Prox




                     Product Launch
                        May 2010




                                             Prox-DU
Prox-DU with Stand




                           Prox-SU

                                                       18
SOFTWARE


           19
What is SA Solutions?
 Gemalto SA Solutions is the product offer for
Strong Authentication (SA) relying on One Time Password (OTP).

 This offer is made of
   A validation server and some software components:
         Gemalto SA Server (version 4)
         SA Server authentication agent software
         SA Server Sconnect plug-in
   Authentication tokens:
         Easy OTP Token
         .Net smart card or
         .Net smart card plug-in format embedded in a GemPC Shell reader to build an USB
         token
         .Net Display card
         .Net Dual token
         Smart Enterprise Guardian
 Authentication is targeted for every company with:
   Mobile workers who want to access to their enterprise resources: network, mail,
   web pages, etc.
   Employees accessing to private data through the Internet, an Intranet, etc.




                                                                                           20
Token Management System



Managed by                                        Managed by
End User                                          Enterprise
   “Self”                                            Smart TMS



                                                  Main Use:
                                                  Centralized Deployment and Token
                                                  Control
                    Remote Pin Unblock
                     Resize partitions

                  Update for maintenance
               Report Token lost for data dest.

               Applicative content management
                        Token recovery
                Security Policy management
                        Usage reporting
                 Token Issuance workflows


                                                                                     21
SOFTWARE                                                   .NET Bio
                          Features & Value Proposition

 Main Features
       Middleware and cards available for Window XP, Vista and 7
       Up to 10 Fingerprints (FP) stored and matched on card
       Support of Base CSP and PKCS#11 architectures
       Windows 7 version
         Support of the Windows Biometric Framework (WBF)
         PKI and Non PKI version support
 Value Proposition
     Security: 2 or 3 Authentication Factors
       Device + PIN and / or FP
     No need to manage PINs or Passwords
       Cost saving, convenience, security
     Privacy, compliance to regulations
     Non repudiation




                                                                               22
CUSTOMER CASE STUDIES
     www.gemalto.com/enterprise




23
Axa Technology Services (France)

                  Situation: A subsidiary of the AXA Group providing IT
                  infrastructure services and support to most of the group’s
                  companies.
                  Challenge: Equipped end-user hardware (6K Agents , brokers)
                  project with a smart card-based strong authentication platform that
                  also supports biometrics & provide convenience
                  Solution: .NET Bio (strong authentication with a biometrics-
                  enabled smart card)
                  Benefits
                       Rapid solution development and implementation at
                       customer level
                       Multi-authentication modes (PIN only, fingerprint only,
                       PIN & fingerprint)
                       Converged badge solution for physical and logical
                       access reduces data loss network attacks, password
                       sharing and badge swapping
                       Enhanced end-user experience, convenience and
                       flexibility for secure network access



 .Net solutions
Ministry of Defense (European country)

                        Situation
                          10 K users in locations
                          around the world
                          Military and civilian staff
                        Challenges:
                          Need for Strong Remote
                          authentication to online
                          services
                          Combining OTP and PKI
                          for 2 different security
                          clearance access levels
                        Ecosystem
                          Partners: Microsoft, EDS,
                          BT, CAP Gemini
                        Solution
                          .NET Card with PKI & CAP
                          OTP
                          20K cards delivered.
Telenor Hungary -Pannon
     (Compuworx)

         Situation: Population: 1500 employees.
         Challenge: New HQ building ; new system for
        authentication & access control
         Solution: A converged .NET badge (Hybrid
        with Mifare technology),
         Applications:
           PC log on
         Ecosystem :
           Microsoft ILM
         Benefit:
           1 single badge, higher security, easiest
           management




                                              26
Petroleum Development Oman (PDO)
              (GBM)
            Situation:
                 PDO is the main exploration company in Oman
                 Population: 9000 employees & subcontractors working in
                 9 majors location across Sultanate of Oman
            Challenge:
                 Unify logical & physical access in one card
                 Implement Microsoft CA
                 User smart cards for SSO
            Solution:
                  A converged .NET badge (Hybrid with HID technology),
            Applications:
                 PC log on
                 Physical Access
            Ecosystem :
                 Microsoft ILM
            Benefit:
                 1 single badge for multiple accesses
                 Cost saving: .Net lowest TCO
                 Better governance
                 Improve control

                                                           27
University of Macedonia
    (Intec partner)
     Situation: Population: 7000 users (Students and staff).
     Challenge: Have a solution offering security, services
    and automation for staffs & students
    Solution : A multiapplication student smart badge (.Net card,
    GTO readers)
     Applications on the student smart badge solution:
         Identification,
         Access control
         Computer Login
         VPN
         Esignature
         Wifi
     Ecosystem
         Microsoft MSC as system integrator
         Microsoft FIM for identity management & certificate
         Microsoft CRM Dynamics

     Benefits:
         Simplicity & Security: With easy and secure applications access control
         Self service : The student takes care of the enrolment “certificate “ himself
         Improved student population database management




                                                                        28
Welcome in Gemalto Partner Network

   Gemalto has solid long-term relationships with its partners by
  focusing on customers and skills
   we offer solutions that are fully interoperable and configurable
  to meet the requirements of our customers.
   Gemalto partners are the leaders in their respective
  categories: software, communications, security products,
  identity management systems, data centers, logistics, …




                                                                      29
Questions?
Jérôme Soufflot@gemalto.com: Channel Bus dev EMEA
Tel. : +33 (0)1 55016148

Mais conteúdo relacionado

Mais procurados

Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011lfilliat
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsMartina Naughton
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryKyle Conklin
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
OTP Solution - Mat khau su dung mot lan
OTP Solution - Mat khau su dung mot lanOTP Solution - Mat khau su dung mot lan
OTP Solution - Mat khau su dung mot lanTHANK Truong
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12lfilliat
 
Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2rpander
 
Connect M Corporate Overview
Connect M Corporate OverviewConnect M Corporate Overview
Connect M Corporate OverviewShraddha Majali
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsEd Pimentel
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Shelf Companies Aust
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 
Acertigo AG on SBS Talk 2011
Acertigo AG on SBS Talk 2011Acertigo AG on SBS Talk 2011
Acertigo AG on SBS Talk 2011Acertigo
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustoregovernment
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 

Mais procurados (20)

Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
OTP Solution - Mat khau su dung mot lan
OTP Solution - Mat khau su dung mot lanOTP Solution - Mat khau su dung mot lan
OTP Solution - Mat khau su dung mot lan
 
Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12Cidway Secure Mobile Access Transactions Short 05 12
Cidway Secure Mobile Access Transactions Short 05 12
 
Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2Mcc Company Overview 2011 V.2
Mcc Company Overview 2011 V.2
 
EC Smart Living
EC Smart LivingEC Smart Living
EC Smart Living
 
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 
Connect M Corporate Overview
Connect M Corporate OverviewConnect M Corporate Overview
Connect M Corporate Overview
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
Acertigo AG on SBS Talk 2011
Acertigo AG on SBS Talk 2011Acertigo AG on SBS Talk 2011
Acertigo AG on SBS Talk 2011
 
Tutorial 3 peter kustor
Tutorial 3 peter kustorTutorial 3 peter kustor
Tutorial 3 peter kustor
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 

Semelhante a SmartCard Forum 2010 - Secured Access for enterprise

Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyJayHicks
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Ericsson Labs
 
SMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSSMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSGPARWANI
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILEGURUDAS
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]ISS
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Fulllfilliat
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suitewatsongallery
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Blackberrymobile Application Development Casestudy
Blackberrymobile Application Development CasestudyBlackberrymobile Application Development Casestudy
Blackberrymobile Application Development Casestudydheerajkureel
 

Semelhante a SmartCard Forum 2010 - Secured Access for enterprise (20)

Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
SMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSSMARTGUARD SYSTEMS
SMARTGUARD SYSTEMS
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILE
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
C2MS
C2MSC2MS
C2MS
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]Software Plus Services Customer Deck[1]
Software Plus Services Customer Deck[1]
 
Cidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 FullCidway Corporate Access 06 2009 Full
Cidway Corporate Access 06 2009 Full
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Blackberrymobile Application Development Casestudy
Blackberrymobile Application Development CasestudyBlackberrymobile Application Development Casestudy
Blackberrymobile Application Development Casestudy
 
20071204 Arc Ready Software + Services
20071204   Arc Ready   Software + Services20071204   Arc Ready   Software + Services
20071204 Arc Ready Software + Services
 

Mais de OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslyOKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesOKsystem
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultOKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelOKsystem
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíOKsystem
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupOKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesOKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesOKsystem
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securityOKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové kartyOKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorOKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportuOKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOKsystem
 

Mais de OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

SmartCard Forum 2010 - Secured Access for enterprise

  • 1. Smart Card Forum – Prague IIIII Secured Access for entreprise Jérôme Soufflot Bus dev EMEA Channel Manager May 20 , 2010
  • 2. Agenda Gemalto Presentation Overview Gemalto IAM offer Update on Smart Card & components technology Share expertise with Use cases 2
  • 3. Gemalto key figures  € 1.65 billion revenue 2009  Innovation:  11 R&D centers worldwide  1,400 engineers  103 inventions first filed in 2009  Over 4,500 patents/applications  Global footprint: Regional revenue  18 production centers  30 personalization facilities  77 sales & marketing offices North & South Europe, Asia America Middle East, € 331m € 394m Africa 20% of  Experienced team: 24% of revenue € 929m revenue 56% of revenue  10,000 employees  90 nationalities  42 countries % of FY ’09 revenue March 2010 3
  • 4. Gemalto’s secure personal devices are in the hands of billions of individuals  Producing and securely personalizing over 1.5 billion devices in 2009  Serving 450 mobile operators worldwide with some 1.8 billion SIM cards addressable by our solutions  Supplying over 350 banks worldwide with banking cards in the hands of over 800 million people  Supplying ePassports to countries with some 600 million citizens  30 years experience in designing and producing secure personal devices March 2010 4
  • 5. Strategic alliances and partners  Alliances with major industry players in all Business Units telecommunications, ID and security  Joint initiatives with leading payment associations  Network of 400 partners with worldwide coverage  Business partners: VARs, resellers, distributors, systems integrators  Solution and technology partners – Increase Gemalto solutions portfolio – Ensure interoperability with leading solution providers March 2010 3
  • 6. BU Security - IAM Enterprise Offer Cards, Tokens Smart Card Readers & OTP Readers Services, Fulfillment and Operated Drivers, applications and support services authentication servers 6
  • 7. What is the Role of the Smart Card? PKI  Hosts digital certificates  Hosts user PIN Secure chip  Computes encryption / signing cryptography  Tamper-proof  Resistant from hardware attack OTP  Resistant from Hosts the One-Time-Password software attack application Hosts the OTP secret keys and (can) protect them with a PIN Computes the OTP
  • 8. Example of Smart Card Use in Enterprise Entreprise Data Physical Access Controls Secure access to buildings PKI Certificates Secure access to Entreprise networks Secure access to Entreprise applications Passwords and OTP Authenticate employees digitally and physically Barcode & Magnetic encoding Data Photos Management Applications Web server E-signer Software Verification server •email •Digital signature
  • 9. Strong authentication for Enterprises 3 factor authentication 2 factor authentication Security PKI Certificates + MS Base CSP •Certificate based logon •Digital Signature •Encryption •Secure Storage OATH OTP on card + Gemalto SA Server User name and password Feature set 9
  • 11. Card Families .NET TPC TOP Regional Offer: IAS, CNS, SetAccess 11
  • 12. Differentiation & Positioning Differentiating features Core Message Target Customers Minidriver PKI architecture Microsoft integration OTP OATH onboard MS-centric F500 Easy to deploy / Low TCO .NET Bio solution SMEs through Versatility (form factors, OTP) .NET dev. environment Channel Mainstream offer FIPS 140-2 level 3 CC certified for legally Common Criteria EAL 4+ Fortune 500 TPC binding signature certification Direct or through SIs Javacard, Global Platform Multiplicative Cryptographic TOP System Integrators Dual Interface Javacard Platform FIPS 140-2 level 3 Regional (France, IAS ECC Compliant Emerging european Europe?) IAS CC EAL4+ certification regulatory compliance Government Healthcare 12
  • 13. Middleware, Management & Competition Middleware Management systems Gemalto DAS Microsoft ILM None for Windows .NET Intercede myID Libraries for Linux & MacOS Opentrust SCM Versatile vSEC:CMS Microsoft ILM TPC Classic Client V 6.0 Opentrust SCM Intercede myID TOP n/a n/a Classic Client V6.0 Opentrust SCM IAS Microsoft ILM 13
  • 14. Features, Value Proposition & Mgmt. options  Main Features  PKI and OTP authentication  Minidriver for Windows XP, Vista, W7  Diversity of form factors  PKCS#11 libraries for Windows, Linux, Solaris and Mac  Wide integration in the IAM ecosystem  .NET development platform  Value Proposition  Ease of deployment, reduced Total Cost of Ownership  Versatility (2 authentication mechanisms, variety of form factors)  Ease of integration (wide ecosystem integration)  Management Options  SME: Gemalto DAS, Versatile VSEC:CMS  Large Enterprise: Microsoft ILM, Intercede myID and Opentrust SCM 14
  • 15. CONNECTED PKI & SECURE FLASH TOKENS 15
  • 16. Features & Value Proposition Unique feature Use USB eSeal token v2 pki Java Smart Card based Classic client USB Shell Token v2 + NET CCID .NET based pki USB Shell Token v2 + TPC IM CC CC EAL4+ / Pki PPSSCD Classic client SA .NET Dual connected / non Mobility & security connected pki + OTP 16
  • 17. Features & Value Proposition Unique Use feature SEG CCID .NET pki + secure MS CAPI & CSP storage SG HID secure storage + pkcs#11 P11 SG FIPS Fips 140-2 secure storage level 3 HID =Human Interface Device 17
  • 18. READERS Prox Product Launch May 2010 Prox-DU Prox-DU with Stand Prox-SU 18
  • 19. SOFTWARE 19
  • 20. What is SA Solutions? Gemalto SA Solutions is the product offer for Strong Authentication (SA) relying on One Time Password (OTP). This offer is made of A validation server and some software components: Gemalto SA Server (version 4) SA Server authentication agent software SA Server Sconnect plug-in Authentication tokens: Easy OTP Token .Net smart card or .Net smart card plug-in format embedded in a GemPC Shell reader to build an USB token .Net Display card .Net Dual token Smart Enterprise Guardian Authentication is targeted for every company with: Mobile workers who want to access to their enterprise resources: network, mail, web pages, etc. Employees accessing to private data through the Internet, an Intranet, etc. 20
  • 21. Token Management System Managed by Managed by End User Enterprise “Self” Smart TMS Main Use: Centralized Deployment and Token Control Remote Pin Unblock Resize partitions Update for maintenance Report Token lost for data dest. Applicative content management Token recovery Security Policy management Usage reporting Token Issuance workflows 21
  • 22. SOFTWARE .NET Bio Features & Value Proposition  Main Features  Middleware and cards available for Window XP, Vista and 7  Up to 10 Fingerprints (FP) stored and matched on card  Support of Base CSP and PKCS#11 architectures  Windows 7 version  Support of the Windows Biometric Framework (WBF)  PKI and Non PKI version support  Value Proposition  Security: 2 or 3 Authentication Factors  Device + PIN and / or FP  No need to manage PINs or Passwords  Cost saving, convenience, security  Privacy, compliance to regulations  Non repudiation 22
  • 23. CUSTOMER CASE STUDIES www.gemalto.com/enterprise 23
  • 24. Axa Technology Services (France) Situation: A subsidiary of the AXA Group providing IT infrastructure services and support to most of the group’s companies. Challenge: Equipped end-user hardware (6K Agents , brokers) project with a smart card-based strong authentication platform that also supports biometrics & provide convenience Solution: .NET Bio (strong authentication with a biometrics- enabled smart card) Benefits Rapid solution development and implementation at customer level Multi-authentication modes (PIN only, fingerprint only, PIN & fingerprint) Converged badge solution for physical and logical access reduces data loss network attacks, password sharing and badge swapping Enhanced end-user experience, convenience and flexibility for secure network access .Net solutions
  • 25. Ministry of Defense (European country) Situation 10 K users in locations around the world Military and civilian staff Challenges: Need for Strong Remote authentication to online services Combining OTP and PKI for 2 different security clearance access levels Ecosystem Partners: Microsoft, EDS, BT, CAP Gemini Solution .NET Card with PKI & CAP OTP 20K cards delivered.
  • 26. Telenor Hungary -Pannon (Compuworx) Situation: Population: 1500 employees. Challenge: New HQ building ; new system for authentication & access control Solution: A converged .NET badge (Hybrid with Mifare technology), Applications: PC log on Ecosystem : Microsoft ILM Benefit: 1 single badge, higher security, easiest management 26
  • 27. Petroleum Development Oman (PDO) (GBM) Situation: PDO is the main exploration company in Oman Population: 9000 employees & subcontractors working in 9 majors location across Sultanate of Oman Challenge: Unify logical & physical access in one card Implement Microsoft CA User smart cards for SSO Solution: A converged .NET badge (Hybrid with HID technology), Applications: PC log on Physical Access Ecosystem : Microsoft ILM Benefit: 1 single badge for multiple accesses Cost saving: .Net lowest TCO Better governance Improve control 27
  • 28. University of Macedonia (Intec partner) Situation: Population: 7000 users (Students and staff). Challenge: Have a solution offering security, services and automation for staffs & students Solution : A multiapplication student smart badge (.Net card, GTO readers) Applications on the student smart badge solution: Identification, Access control Computer Login VPN Esignature Wifi Ecosystem Microsoft MSC as system integrator Microsoft FIM for identity management & certificate Microsoft CRM Dynamics Benefits: Simplicity & Security: With easy and secure applications access control Self service : The student takes care of the enrolment “certificate “ himself Improved student population database management 28
  • 29. Welcome in Gemalto Partner Network Gemalto has solid long-term relationships with its partners by focusing on customers and skills we offer solutions that are fully interoperable and configurable to meet the requirements of our customers. Gemalto partners are the leaders in their respective categories: software, communications, security products, identity management systems, data centers, logistics, … 29
  • 30. Questions? Jérôme Soufflot@gemalto.com: Channel Bus dev EMEA Tel. : +33 (0)1 55016148