SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Two-Factor Authentication Solution for
                                                               Google Apps




Two-Factor Authentication Solution for Google Apps

   Problem with exposing Emailing system on the Cloud
   Organizations want to add another layer of authentication protection to their sign-in
   process to prevent identity fraud and meet regulatory requirements. Traditional
   approaches like OTP tokens are expensive to deploy and manage, and ineffective against
   new attacks. And, they want on-demand software so they don’t have the headaches of
   installing and maintaining new equipment and applications in your data center. The
   challenge organizations face is deploying a technology that is both easy to use yet strong
   enough to protect against various sophisticated threats.




Solution
ArrayShield innovative two factor authentication system - IDAS provides a simple secure
remote access to company email using Google apps. By using its innovative pattern based
authentication it provides One-Time-Secret-Code for every login transaction.

In IDAS every user is shown with a matrix on the Google apps login screen which is populated
with random characters for every transaction. User has to choose a pattern which is a sequence
of cells in the matrix and should register the same with the system prior accessing. A
translucent card is provided to each user which has a similar structured matrix with transparent
and opaque cells and some random characters imprinted on the opaque cells. Each card is
unique in terms of the position of the opaque cells and the characters imprinted on them.

At the time of accessing the Google apps the user is shown with the randomly populated matrix
as a challenge. The user overlaps the translucent card on the shown matrix and will key in the
characters present in the chosen pattern in the same order as a response. These characters
form the One-Time-Secret-Code for the user for that transaction. The ArrayShield IDAS server
verifies the user credentials by comparing user’s registered pattern and the pattern values
entered by the user. Access is given to the user if the user credentials are valid.




                             ArrayShield | info@arrayshield.com                       Page 1
Two-Factor Authentication Solution for
                                                                    Google Apps



Integration Flow

The following diagram shows how Google Apps service can be integrated with ArrayShield IDAS
to use its two factor authentication for secure access to Google Apps products.




.




               Figure: Integration flow diagram for the Google Apps with ArrayShield IDAS




                              ArrayShield | info@arrayshield.com                            Page 2
Two-Factor Authentication Solution for
                                                               Google Apps



Features
Innovative Technology

ArrayShield IDAS technology is patent pending (globally) and has won                   several
awards/recognitions in various forums for its innovative concept.

High Level of Security

ArrayShield IDAS product leverages advanced Encryption methodologies (like Industry Standard
AES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographic
techniques) and follows Industry Standard Guidelines and Best Practices.

Ease of Use

ArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complex
passwords than can be easily compromised.

Easy to Integrate

ArrayShield IDAS product will seamlessly integrate with existing enterprise environments with
improved user experience. No expertise is required for integration.

Interoperable System

ArrayShield IDAS can also be configured as add-on module with various products of leading
technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.

Easy to Deploy

ArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure API
based system.

Easily Customizable

ArrayShield IDAS product can be easily customized to the unique needs of every organization.
Once deployed, organizations can also configure the security strength and mechanism to the
amount of risk involved in the user’s role and usability requirements.

Highly Scalable

ArrayShield IDAS can be easily scaled with huge user population without affecting the
performance and usability.




                             ArrayShield | info@arrayshield.com                      Page 3
Two-Factor Authentication Solution for
                                                                Google Apps



Benefits
Low Total Cost of Ownership

ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.
Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having
costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield IDAS
product provides lowest Total Cost of Ownership. No costly server hardware needed.

Mobility of the user

As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any
dependencies. Hence user will be able to access the application any-time, any-where.

Provides peace of mind

Protects Organizations and customers from Online Identity and data theft, hence provide peace
of mind.

Provides Compliance with regulations

Regulatory agencies agree that passwords are a weak link and are requiring companies to
implement stronger authentication. ArrayShield is a rapid, cost-effective way to comply with
Industry Guidelines, Security Standards and other Industry regulations.



Conclusion

By using ArrayShield IDAS Two-Factor authentication solution, organizations can enable the
secure access to their Google Apps account. The solution will make organizations of all sizes and
complexities protect from the malicious attacks happening on their online accounts.




                              ArrayShield | info@arrayshield.com                        Page 4

Mais conteúdo relacionado

Mais procurados

EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
Ronny de Jong
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 

Mais procurados (20)

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad20181213 - wazug protecting your data with azure ad
20181213 - wazug protecting your data with azure ad
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Vmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security Solution
Vmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security SolutionVmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security Solution
Vmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security Solution
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Secure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and AtidanSecure Productive Enterprise from Microsoft and Atidan
Secure Productive Enterprise from Microsoft and Atidan
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career path
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterMicrosoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture Poster
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 

Semelhante a Two Factor Authentication for Google Apps

Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
Amazon Web Services
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
jeffsrosalyn
 
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
Anto664537
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
SahilSingh316535
 

Semelhante a Two Factor Authentication for Google Apps (20)

Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case study
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
A Guide to Secure Acceess Service Edge.pptx
A Guide to Secure Acceess Service Edge.pptxA Guide to Secure Acceess Service Edge.pptx
A Guide to Secure Acceess Service Edge.pptx
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
Array Networks Introduces Next-Generation Secure Access Gateways to Meet the ...
Array Networks Introduces Next-Generation Secure Access Gateways to Meet the ...Array Networks Introduces Next-Generation Secure Access Gateways to Meet the ...
Array Networks Introduces Next-Generation Secure Access Gateways to Meet the ...
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Two Factor Authentication for Google Apps

  • 1. Two-Factor Authentication Solution for Google Apps Two-Factor Authentication Solution for Google Apps Problem with exposing Emailing system on the Cloud Organizations want to add another layer of authentication protection to their sign-in process to prevent identity fraud and meet regulatory requirements. Traditional approaches like OTP tokens are expensive to deploy and manage, and ineffective against new attacks. And, they want on-demand software so they don’t have the headaches of installing and maintaining new equipment and applications in your data center. The challenge organizations face is deploying a technology that is both easy to use yet strong enough to protect against various sophisticated threats. Solution ArrayShield innovative two factor authentication system - IDAS provides a simple secure remote access to company email using Google apps. By using its innovative pattern based authentication it provides One-Time-Secret-Code for every login transaction. In IDAS every user is shown with a matrix on the Google apps login screen which is populated with random characters for every transaction. User has to choose a pattern which is a sequence of cells in the matrix and should register the same with the system prior accessing. A translucent card is provided to each user which has a similar structured matrix with transparent and opaque cells and some random characters imprinted on the opaque cells. Each card is unique in terms of the position of the opaque cells and the characters imprinted on them. At the time of accessing the Google apps the user is shown with the randomly populated matrix as a challenge. The user overlaps the translucent card on the shown matrix and will key in the characters present in the chosen pattern in the same order as a response. These characters form the One-Time-Secret-Code for the user for that transaction. The ArrayShield IDAS server verifies the user credentials by comparing user’s registered pattern and the pattern values entered by the user. Access is given to the user if the user credentials are valid. ArrayShield | info@arrayshield.com Page 1
  • 2. Two-Factor Authentication Solution for Google Apps Integration Flow The following diagram shows how Google Apps service can be integrated with ArrayShield IDAS to use its two factor authentication for secure access to Google Apps products. . Figure: Integration flow diagram for the Google Apps with ArrayShield IDAS ArrayShield | info@arrayshield.com Page 2
  • 3. Two-Factor Authentication Solution for Google Apps Features Innovative Technology ArrayShield IDAS technology is patent pending (globally) and has won several awards/recognitions in various forums for its innovative concept. High Level of Security ArrayShield IDAS product leverages advanced Encryption methodologies (like Industry Standard AES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographic techniques) and follows Industry Standard Guidelines and Best Practices. Ease of Use ArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complex passwords than can be easily compromised. Easy to Integrate ArrayShield IDAS product will seamlessly integrate with existing enterprise environments with improved user experience. No expertise is required for integration. Interoperable System ArrayShield IDAS can also be configured as add-on module with various products of leading technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc. Easy to Deploy ArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure API based system. Easily Customizable ArrayShield IDAS product can be easily customized to the unique needs of every organization. Once deployed, organizations can also configure the security strength and mechanism to the amount of risk involved in the user’s role and usability requirements. Highly Scalable ArrayShield IDAS can be easily scaled with huge user population without affecting the performance and usability. ArrayShield | info@arrayshield.com Page 3
  • 4. Two-Factor Authentication Solution for Google Apps Benefits Low Total Cost of Ownership ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives. Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield IDAS product provides lowest Total Cost of Ownership. No costly server hardware needed. Mobility of the user As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any dependencies. Hence user will be able to access the application any-time, any-where. Provides peace of mind Protects Organizations and customers from Online Identity and data theft, hence provide peace of mind. Provides Compliance with regulations Regulatory agencies agree that passwords are a weak link and are requiring companies to implement stronger authentication. ArrayShield is a rapid, cost-effective way to comply with Industry Guidelines, Security Standards and other Industry regulations. Conclusion By using ArrayShield IDAS Two-Factor authentication solution, organizations can enable the secure access to their Google Apps account. The solution will make organizations of all sizes and complexities protect from the malicious attacks happening on their online accounts. ArrayShield | info@arrayshield.com Page 4