SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Datasheet
SecurAccess Two
Factor Authentication
The future of authentication
for the modern business
No tokens, no fuss… Just rock-solid, two factor security on the
move. Changing the game for business security.
Key Benefits
n	Strong, affordable,
convenient two-factor
authentication
n	Enhanced security
n	Reduced helpdesk costs
n	No password reset or PIN
management issues
n	No token/smartcard
deployment, renewal or
replacement costs
n	No need to carry
additional devices
n	No software required on
the mobile phone
n	No delays waiting for a
passcode
n	Passcode always available
even if temporarily out of
Communication
Today’s organisations need watertight security,
particularly now that ‘cloud computing’ has empowered
users to access data any time, from anywhere. However,
they also need cost savings, optimum productivity and
a renewed focus on environmental action. Our solutions
give control back to businesses and users without
compromising on security or access.
Unlike traditional authentication solutions, working with
SecurEnvoy allows us to quickly install and integrate
into existing IT systems. Crucially, we avoid the need for
much of the additional cost or remote deployment of the
traditional approach to security software, creating an
unprecedented zero-footprint solution while ensuring long-
term cost benefits.
Deployment or Fully Managed Hosted Service?
We can deploy Two Factor Authentication on premise or
as a fully managed hosted service. The benefit of a fully
managed service, is that it eliminates the time, effort and
management overhead required, allowing organisations
to maximize operational efficiencies, manage capital
expenditure and release hardware, reducing the
burden of administrative and resource intensive services.
Whichever approach you take, we will work with you to
manage any risks and maximise rewards, making sure that
control of your sensitive data is retained.
www.scc.com
Key Features
n	Any GSM mobile phone
can be transformed into an
authentication token
n	No additional hardware
token required
n	No end-user hardware
deployment costs
n	No end-user hardware
failure problems
n	Supports any system that
includes a Radius client,
such as all known VPN
servers
n	Direct integration to your
existing user directory, no
additional database is
required
n	Protects applications that
run on Microsoft IIS, no
integration or code changes
required
n	Simple six-digit SMS
authentication code
n	Single-use passcodes
prevent all known password
attacks
Why SCC?
n	Europe’s largest
independent provider of
infrastructure optimisation
and technology solutions
n	Over 36 years’ experience in
helping customers facilitate
their business strategies
n	Over 7,000 results focused
employees, supporting
over 5,000,000 users across
Europe
n	Proven ITIL, OGC and ISO
compliant delivery processes
and procedures
Copyright  2011 SCC. SCC and the SCC logo are registered trademarks of SCC.
What do we do?
Our solutions are based on
SecurAccess from SecurEnvoy which
turns any mobile phone that can
receive SMS into a ready-made
authentication device. This pioneering
zero-footprint solution cuts costs by
using hardware that is already in
circulation. Unlike traditional tokens
that take months to deploy and
replace, SecurAccess can roll out more
than 15,000 new remote staff per hour
without the pain, cost or environmental
impact created by legacy hardware
distribution.
How does this integrate with my
existing systems?
The solution fully integrates into
Microsoft Active Directory, Novell
eDirectory, Sun Directory Server and
OpenLDAP. Integration is simple as
it requires no additional databases
or hardware – not to mention their
associated cost. SecurAccess also
integrates with all leading remote
access servers and web services
including Microsoft OWA, Citrix, Juniper
and Cisco. There’s also no need for
extra software, eliminating costly and
time-consuming testing and training
schemes. SecurEnvoy has been
designed to respond to the constant
changes in mobile technology to
ensure a competitive ROI.
What about network coverage or SMS
delivery delays?
SecurAccess is fundamentally
designed to let you:
• Pre-load one-time passcodes
• Reuse session passcodes that
change daily or after multiple days
• Request temporary passcodes
through self-help website
• Obtain passcodes via email if
necessary
Why do we partner with SecurEnvoy?
SecurEnvoy are the inventors of
SMS based tokenless two factor
authentication and have been leading
the way in the development of this
next generation of authentication
technology since 2000. A global leader
in business authentication, SecurEnvoy
are a UK based company, privately
owned with products distributed across
the world.
Can two factor authentication be
provided as a service?
Yes. We offer a range of services
from on-site deployment to a fully
managed, comprehensive hosted
service. Where organisations cannot
justify expenditure on skills and
infrastructure to deploy an on-site two
factor authentication solution, or where
their internal IT teams are already over
burdened, our hosted SecurAccess
Managed Service is the ideal solution
to meet your business and security
requirements.
Two factor authentication is a
specialised area and we have invested
in specialist, trained and dedicated
engineers that not only fully understand
user authentication solutions, but
also how to deliver a quality service,
following industry best practice
standards.
How resilient and flexible is the service?
Our Hosted SecurAccess Managed
Service is delivered via our secure
Tier 3+ Data Centre, which utilises
the ‘best of breed’ Technology as
a Service infrastructure. This allows
organisations to benefit from a highly
scalable, highly available, resilient
platform for delivery of authentication
services. The infrastructure is monitored
and supported 24x7x365 resulting in
performance and availability that is
truly enterprise class.
Our service allows an organisations
user base to be fully administered by
SCC, or alternatively in-house via a
secure web portal. This gives businesses
the additional flexibility to deliver the
service deemed most appropriate
to their uses and to take advantage
of a true cloud service. Our flexible
infrastructure ensures that large
numbers of users can be brought on
board quickly and with confidence.
SecurAccess Two Factor Authentication - The future of
authentication for the modern business
For further information please call
0121 766 7000 or visit
www.scc.com
International HQ
SCC, James House, Warwick
Road, Birmingham, B11 2LE

Mais conteúdo relacionado

Mais procurados

Chameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview PresentationChameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview Presentationchristoboshoff
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged InfrastructureePlus
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cbeyond company story
Cbeyond company storyCbeyond company story
Cbeyond company storymarkhuelsmann
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Jason Mashak
 
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU LtdNetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU LtdNCU Ltd
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP MarketSolarwinds N-able
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvCarl Pollard
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentationDonnie Eib
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)Riad MAALOUF
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify serviceChristine Gupta
 
Fusebill: Reliable and Secure
Fusebill:  Reliable and SecureFusebill:  Reliable and Secure
Fusebill: Reliable and SecureFusebill
 

Mais procurados (20)

Chameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview PresentationChameleon Secure Solutions Overview Presentation
Chameleon Secure Solutions Overview Presentation
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged Infrastructure
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cbeyond company story
Cbeyond company storyCbeyond company story
Cbeyond company story
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU LtdNetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
 
SDATA CompanyProfile
SDATA CompanyProfileSDATA CompanyProfile
SDATA CompanyProfile
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
Document case study-Systweak - Go4Hosting
Document case study-Systweak - Go4HostingDocument case study-Systweak - Go4Hosting
Document case study-Systweak - Go4Hosting
 
ONI Assure Insight Brochure fv
ONI Assure Insight Brochure fvONI Assure Insight Brochure fv
ONI Assure Insight Brochure fv
 
Linkdin presentation
Linkdin presentationLinkdin presentation
Linkdin presentation
 
PCI DSS Compliance
PCI DSS CompliancePCI DSS Compliance
PCI DSS Compliance
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)
 
Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Resume-DPITVlinkedin
Resume-DPITVlinkedinResume-DPITVlinkedin
Resume-DPITVlinkedin
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service10 good reasons why you should resell the Signify service
10 good reasons why you should resell the Signify service
 
Fusebill: Reliable and Secure
Fusebill:  Reliable and SecureFusebill:  Reliable and Secure
Fusebill: Reliable and Secure
 
Sicura brochure
Sicura brochureSicura brochure
Sicura brochure
 

Destaque

January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presentionrodrida1
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 

Destaque (6)

January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 

Semelhante a Scc soft token datasheet

Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xRyanPaul Mandel
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Using Business and Technology to solve business challenges
Using Business and Technology to solve business challengesUsing Business and Technology to solve business challenges
Using Business and Technology to solve business challengesIron Mountain
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochureSteve Tester
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...online Marketing
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Securaa - November 2023.pptx
Securaa - November 2023.pptxSecuraa - November 2023.pptx
Securaa - November 2023.pptxseccurra123
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfIwan Setiawan
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationSix Degrees
 
Company Profile
Company ProfileCompany Profile
Company ProfileITB001
 
ScienceSoft Corporate Profile
ScienceSoft Corporate ProfileScienceSoft Corporate Profile
ScienceSoft Corporate ProfileSergei Rabotai
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional BrochureKaganMinare
 
Company profile
Company profileCompany profile
Company profileHira Khan
 

Semelhante a Scc soft token datasheet (20)

Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4x
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Using Business and Technology to solve business challenges
Using Business and Technology to solve business challengesUsing Business and Technology to solve business challenges
Using Business and Technology to solve business challenges
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Securaa - November 2023.pptx
Securaa - November 2023.pptxSecuraa - November 2023.pptx
Securaa - November 2023.pptx
 
Identikey
IdentikeyIdentikey
Identikey
 
thei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdfthei-cybersecurity-thiene-company-profile-eng.pdf
thei-cybersecurity-thiene-company-profile-eng.pdf
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
ScienceSoft Corporate Profile
ScienceSoft Corporate ProfileScienceSoft Corporate Profile
ScienceSoft Corporate Profile
 
Bio Lynx: A Double Layer Security Approach
Bio Lynx: A Double Layer Security ApproachBio Lynx: A Double Layer Security Approach
Bio Lynx: A Double Layer Security Approach
 
IT INFRASTRUCTURE SERVICES
IT INFRASTRUCTURE SERVICESIT INFRASTRUCTURE SERVICES
IT INFRASTRUCTURE SERVICES
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
Company profile
Company profileCompany profile
Company profile
 
SNIS PROFILE
SNIS PROFILESNIS PROFILE
SNIS PROFILE
 

Mais de Hai Nguyen

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013Hai Nguyen
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 

Mais de Hai Nguyen (20)

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 

Scc soft token datasheet

  • 1. Datasheet SecurAccess Two Factor Authentication The future of authentication for the modern business No tokens, no fuss… Just rock-solid, two factor security on the move. Changing the game for business security. Key Benefits n Strong, affordable, convenient two-factor authentication n Enhanced security n Reduced helpdesk costs n No password reset or PIN management issues n No token/smartcard deployment, renewal or replacement costs n No need to carry additional devices n No software required on the mobile phone n No delays waiting for a passcode n Passcode always available even if temporarily out of Communication Today’s organisations need watertight security, particularly now that ‘cloud computing’ has empowered users to access data any time, from anywhere. However, they also need cost savings, optimum productivity and a renewed focus on environmental action. Our solutions give control back to businesses and users without compromising on security or access. Unlike traditional authentication solutions, working with SecurEnvoy allows us to quickly install and integrate into existing IT systems. Crucially, we avoid the need for much of the additional cost or remote deployment of the traditional approach to security software, creating an unprecedented zero-footprint solution while ensuring long- term cost benefits. Deployment or Fully Managed Hosted Service? We can deploy Two Factor Authentication on premise or as a fully managed hosted service. The benefit of a fully managed service, is that it eliminates the time, effort and management overhead required, allowing organisations to maximize operational efficiencies, manage capital expenditure and release hardware, reducing the burden of administrative and resource intensive services. Whichever approach you take, we will work with you to manage any risks and maximise rewards, making sure that control of your sensitive data is retained. www.scc.com
  • 2. Key Features n Any GSM mobile phone can be transformed into an authentication token n No additional hardware token required n No end-user hardware deployment costs n No end-user hardware failure problems n Supports any system that includes a Radius client, such as all known VPN servers n Direct integration to your existing user directory, no additional database is required n Protects applications that run on Microsoft IIS, no integration or code changes required n Simple six-digit SMS authentication code n Single-use passcodes prevent all known password attacks Why SCC? n Europe’s largest independent provider of infrastructure optimisation and technology solutions n Over 36 years’ experience in helping customers facilitate their business strategies n Over 7,000 results focused employees, supporting over 5,000,000 users across Europe n Proven ITIL, OGC and ISO compliant delivery processes and procedures Copyright  2011 SCC. SCC and the SCC logo are registered trademarks of SCC. What do we do? Our solutions are based on SecurAccess from SecurEnvoy which turns any mobile phone that can receive SMS into a ready-made authentication device. This pioneering zero-footprint solution cuts costs by using hardware that is already in circulation. Unlike traditional tokens that take months to deploy and replace, SecurAccess can roll out more than 15,000 new remote staff per hour without the pain, cost or environmental impact created by legacy hardware distribution. How does this integrate with my existing systems? The solution fully integrates into Microsoft Active Directory, Novell eDirectory, Sun Directory Server and OpenLDAP. Integration is simple as it requires no additional databases or hardware – not to mention their associated cost. SecurAccess also integrates with all leading remote access servers and web services including Microsoft OWA, Citrix, Juniper and Cisco. There’s also no need for extra software, eliminating costly and time-consuming testing and training schemes. SecurEnvoy has been designed to respond to the constant changes in mobile technology to ensure a competitive ROI. What about network coverage or SMS delivery delays? SecurAccess is fundamentally designed to let you: • Pre-load one-time passcodes • Reuse session passcodes that change daily or after multiple days • Request temporary passcodes through self-help website • Obtain passcodes via email if necessary Why do we partner with SecurEnvoy? SecurEnvoy are the inventors of SMS based tokenless two factor authentication and have been leading the way in the development of this next generation of authentication technology since 2000. A global leader in business authentication, SecurEnvoy are a UK based company, privately owned with products distributed across the world. Can two factor authentication be provided as a service? Yes. We offer a range of services from on-site deployment to a fully managed, comprehensive hosted service. Where organisations cannot justify expenditure on skills and infrastructure to deploy an on-site two factor authentication solution, or where their internal IT teams are already over burdened, our hosted SecurAccess Managed Service is the ideal solution to meet your business and security requirements. Two factor authentication is a specialised area and we have invested in specialist, trained and dedicated engineers that not only fully understand user authentication solutions, but also how to deliver a quality service, following industry best practice standards. How resilient and flexible is the service? Our Hosted SecurAccess Managed Service is delivered via our secure Tier 3+ Data Centre, which utilises the ‘best of breed’ Technology as a Service infrastructure. This allows organisations to benefit from a highly scalable, highly available, resilient platform for delivery of authentication services. The infrastructure is monitored and supported 24x7x365 resulting in performance and availability that is truly enterprise class. Our service allows an organisations user base to be fully administered by SCC, or alternatively in-house via a secure web portal. This gives businesses the additional flexibility to deliver the service deemed most appropriate to their uses and to take advantage of a true cloud service. Our flexible infrastructure ensures that large numbers of users can be brought on board quickly and with confidence. SecurAccess Two Factor Authentication - The future of authentication for the modern business For further information please call 0121 766 7000 or visit www.scc.com International HQ SCC, James House, Warwick Road, Birmingham, B11 2LE