SlideShare a Scribd company logo
SMS PASSCODE 
3rd generation user authentication 
Christian Larsen 
Regional Manager, International 
VirtualizationForum 2014
Why Stronger Authentication? 
Simply because passwords are weak! 
» Hackers preferred weapon 76% of network intrusions 
exploited weak or stolen credentials (passwords)* 
» You might already be a victim 66% of breaches took months or 
years to discover* 
» The small organizations cannot hide 31%of all targeted 
attacks were aimed at businesses with less than 250 
employees** 
» The threat is only getting bigger - Cybercrime is the fastest 
growing crime type in the world and targeted attacks grew by 
62% from 2013 to 2014*** 
* Verizon Data Breach Investigations Report 2013 
** Internet Security Threat Report 2013 (published by Symantec) 
*** Internet Security Threat Report 2014 (published by Symantec) 
Adaptive User Authentication 2
Why Stronger Authentication? 
» We are already patching up, scanning and testing etc. 
» Companies often put a great effort into updating, 
patching, vulnerability testing etc., 
» but this way you only seal the windows, close the shutters 
and the cat’s door… 
» and if the wrong guy has a valid set of credentials, and 
you do not have MFA, he walks in through the main 
entrance… 
» even without anyone discovering it! – So you might be 
attacked without knowing! 
Adaptive User Authentication 3
Stronger Authentication in 2014 
» Today a password is not enough to ensure your 
online identity, because it can be compromised in 
many ways (key logged phished, bought, guessed 
etc.) 
» Therefore the providers of online services like 
banking, e-mail, gaming, social media etc. now all 
force or allow you to step up authentication 
» And since almost everybody has a mobile phone, 
the providers use SMS/Text for validation 
» A user-friendly way of enabling Multi-Factor 
Authentication on a global scale 
Adaptive User Authentication 4
SMS PASSCODE 
We are a technology leader in adaptive multi-factor authentication software. 
We ensure employees can easily and safely access corporate networks and applications 
remotely. 
We provide IT/security managers with a cost-effective and easy-to-maintain offering that 
secures remote access systems, including Microsoft, Citrix, Cisco and Juniper. 
Adaptive User Authentication 5
The Evolution of Authentication 
Technology 
1st Generation 2nd Generation 3rd Generation 
80-90’s 
Hardware Tokens 
+ Introduction of two-factor auth. 
÷ High cost on tokens 
÷ Distribution & administration cost 
÷ An extra thing to carry 
00’s 
Mobile based solutions 
+ Real-time multi-factor auth. 
+ No hardware distribution 
÷ Deployment of soft tokens / apps 
÷ Regional SMS delivery challenges 
Now 
Adaptive User Authentication 
+ Contextual intelligence layer 
+ Policy-based trusted IPs 
+ Multiple OTP options 
+ Location aware dispatching 
Our Heritage: 
• Always been based on SMS, Always been real-time, Always been session based, No client software 
Adaptive User Authentication 6
Two-factor vs. Multi-factor Authentication 
» Two-factor Authentication (2FA) is merely 
» Something you Know 
» Something you Have (Token, Card, Finger, Phone etc.) 
» Multi-Factor Authentication (MFA) simply adds more factors 
» Your Connection (unique session identification) 
» Your Location (Geographically) 
» The Role/Rights you have (Group member i.e. consultant, employee) 
» A valid Gateway/Point of entry 
» Time of day (doors are open only between i.e. 8am and 10pm) etc. 
Basic security: 
Protects against 90’ies threats (key 
loggers, guessed/ cracked/ bought/ 
borrowed passwords etc.) Plus - users 
feel that their identity is protected. 
Higher security: 
Protection against also more modern 
threats like Advanced malware, Session 
hijacking, Phishing, Pharming, Man-in-the- 
middle attacks etc. 
New flexibility: 
Access may now be controlled based on 
i.e. Countries, IP-ranges, “Trusted 
locations”, Time frames, Roles, Groups 
and other factors. 
Adaptive User Authentication 7
Valued Partnerships 
Adaptive User Authentication 8
Market Proven Technology 
Adaptive User Authentication 9
Why SMS PASSCODE 
What makes SMS PASSCODE unique? 
Makes Security Hassle-Free and 
Painless for the User 
Easy for IT to Implement, 
Manage and Scale 
Prevents Security Breaches with 
Contextual Intelligence 
Reduces Costs and 
Improves ROI 
Superior 
User 
Experience 
Adaptive User Authentication 10
Flexible OTP Delivery 
» Broad range of OTP delivery options 
» Automatic failover 
» Location Aware Dispatching 
» OATH token support – allows use of both hardware- and App tokens 
» Simultaneous use is possible 
Adaptive User Authentication 11
Platform Diagram 
Adaptive User Authentication 12
Demonstration 
Adaptive User Authentication 13
In Good Hands 
217 
customers 
in 21 countries were asked 
Customer Satisfaction 2014 
1% 
40% 
59% 
0% 20% 40% 60% 80% 
HIGHLY SATISFIED 
SATISFIED 
LESS SATISFIED 
Likelyhood to recommend 
SMS PASSCODE 
5% 
1% 
38% 
56% 
0% 20% 40% 60% 
VERY LIKELY 
LIKELY 
DON'T KNOW 
UNLIKELY 
“This project has been highly successful. Not 
only have we realized substantial cost savings, 
the users have also been very happy about the 
change” 
John Gudmann, Post Nord 
“SMS PASSCODE is a great hassle-free product 
and does exactly what we need it to” 
John Owen, IT Manager, Day Group 
“We have now regained control of the 
authentication process. We know exactly who 
receives access codes, when they use them to 
log in, and from where” 
Peter Warnier, CIO, DEME 
Adaptive User Authentication 14
FREE 30 DAY TRIAL 
www.smspasscode.com/free-trial 
Adaptive User Authentication 15
Keeping you safe 
without spoiling the ride
Questions? 
Adaptive User Authentication 17

More Related Content

PDF
Avoiding Two-factor Authentication? You're Not Alone
PPTX
Two Factor Authentication Made Easy ICWE 2015
PDF
3 reasons your business can't ignore Two-Factor Authentication
PDF
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
PPTX
Seminar-Two Factor Authentication
PPTX
Two factor authentication presentation mcit
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PDF
2 factor authentication 3 [compatibility mode]
Avoiding Two-factor Authentication? You're Not Alone
Two Factor Authentication Made Easy ICWE 2015
3 reasons your business can't ignore Two-Factor Authentication
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
Seminar-Two Factor Authentication
Two factor authentication presentation mcit
Combat the Latest Two-Factor Authentication Evasion Techniques
2 factor authentication 3 [compatibility mode]

What's hot (20)

PPTX
Two Factor Authentication: Easy Setup, Major Impact
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PDF
Two-factor Authentication
PDF
Two factor authentication
PPTX
Two factor authentication 2018
PDF
Adding Two Factor Authentication to your App with Authy
PPTX
Two Factor Authentication
PDF
Why Two-Factor Authentication?
PPTX
Multifactor Authentication
PDF
Protecting Your POS System from PoSeidon and Other Malware Attacks
PPTX
Webinar - Easy multi factor authentication strategies and PCI DSS
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
HYPR: The Leading Provider of True Passwordless Security®
PDF
2FA Advanced Authentication for Public Safety
PDF
Banking and Modern Payments System Security Analysis
PDF
Two factor authentication-in_your_network_e_guide
PPTX
Single Sign-On & Strong Authentication
PPTX
User Authentication for Government
PPT
Security and information assurance
Two Factor Authentication: Easy Setup, Major Impact
Webinar: Goodbye RSA. Hello Modern Authentication.
Two-factor Authentication
Two factor authentication
Two factor authentication 2018
Adding Two Factor Authentication to your App with Authy
Two Factor Authentication
Why Two-Factor Authentication?
Multifactor Authentication
Protecting Your POS System from PoSeidon and Other Malware Attacks
Webinar - Easy multi factor authentication strategies and PCI DSS
Stronger/Multi-factor Authentication for Enterprise Applications
HYPR: The Leading Provider of True Passwordless Security®
2FA Advanced Authentication for Public Safety
Banking and Modern Payments System Security Analysis
Two factor authentication-in_your_network_e_guide
Single Sign-On & Strong Authentication
User Authentication for Government
Security and information assurance
Ad

Viewers also liked (8)

PPT
Infoblast – Interactive 2-way Messaging Service
PDF
MobiWeb - SMS for App Promotion & Engagement
PPTX
Securing ChatOps - DevSecCon Asia 2017 arun n
PPTX
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
PDF
2FA and OTP
PPTX
Presentation9
PDF
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
PDF
MOBtexting : Leading A2P Messaging & Cloud Telephony Service Provider
Infoblast – Interactive 2-way Messaging Service
MobiWeb - SMS for App Promotion & Engagement
Securing ChatOps - DevSecCon Asia 2017 arun n
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
2FA and OTP
Presentation9
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
MOBtexting : Leading A2P Messaging & Cloud Telephony Service Provider
Ad

Similar to Welcome to the 3rd generation in user authentication (20)

PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PDF
120 i143
PDF
9697 aatf sb_0808
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PPTX
Role Of Two Factor Authentication In Safeguarding Online Transactions
PPTX
TheSMSPoint OTP SMS Solutions. Secure, Reliable, and Scalable Authentication ...
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PDF
SolusDeck
PPTX
FrontOne our new and different solutions
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
AY - Adaptive Access Control
PDF
Introduction to Solus
PDF
Cs credit card processor
PDF
How to Implement Website Authentication By MyOtpApp
PDF
Mobile Solutions and Market Trends
PDF
An Insight into Essential Eight’s Multi-Factor Authentication
PDF
An Insight into Essential Eight’s Multi-Factor Authentication
PPTX
Slideshare fintech-may26th-def
Multi Factor Authentication Whitepaper Arx - Intellect Design
120 i143
9697 aatf sb_0808
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Role Of Two Factor Authentication In Safeguarding Online Transactions
TheSMSPoint OTP SMS Solutions. Secure, Reliable, and Scalable Authentication ...
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
SolusDeck
FrontOne our new and different solutions
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
AY - Adaptive Access Control
Introduction to Solus
Cs credit card processor
How to Implement Website Authentication By MyOtpApp
Mobile Solutions and Market Trends
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
Slideshare fintech-may26th-def

More from MarketingArrowECS_CZ (20)

PDF
INFINIDAT InfiniGuard - 20220330.pdf
PDF
Využijte svou Oracle databázi na maximum!
PDF
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
PDF
Chráníte správně svoje data?
PDF
Oracle databáze – Konsolidovaná Data Management Platforma
PDF
Nové vlastnosti Oracle Database Appliance
PDF
Infinidat InfiniGuard
PDF
Infinidat InfiniBox
PDF
Novinky ve světě Oracle DB a koncept konvergované databáze
PDF
Základy licencování Oracle software
PDF
Garance 100% dostupnosti dat! Kdo z vás to má?
PDF
Využijte svou Oracle databázi naplno
PDF
Oracle Data Protection - 2. část
PDF
Oracle Data Protection - 1. část
PDF
Benefity Oracle Cloudu (4/4): Storage
PDF
Benefity Oracle Cloudu (3/4): Compute
PDF
InfiniBox z pohledu zákazníka
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
PDF
Úvod do Oracle Cloud infrastruktury
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Unlock new opportunities with location data.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Architecture types and enterprise applications.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Web Crawler for Trend Tracking Gen Z Insights.pptx
Module 1.ppt Iot fundamentals and Architecture
DP Operators-handbook-extract for the Mautical Institute
Unlock new opportunities with location data.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Benefits of Physical activity for teenagers.pptx
CloudStack 4.21: First Look Webinar slides
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Enhancing emotion recognition model for a student engagement use case through...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A novel scalable deep ensemble learning framework for big data classification...
Architecture types and enterprise applications.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Taming the Chaos: How to Turn Unstructured Data into Decisions

Welcome to the 3rd generation in user authentication

  • 1. SMS PASSCODE 3rd generation user authentication Christian Larsen Regional Manager, International VirtualizationForum 2014
  • 2. Why Stronger Authentication? Simply because passwords are weak! » Hackers preferred weapon 76% of network intrusions exploited weak or stolen credentials (passwords)* » You might already be a victim 66% of breaches took months or years to discover* » The small organizations cannot hide 31%of all targeted attacks were aimed at businesses with less than 250 employees** » The threat is only getting bigger - Cybercrime is the fastest growing crime type in the world and targeted attacks grew by 62% from 2013 to 2014*** * Verizon Data Breach Investigations Report 2013 ** Internet Security Threat Report 2013 (published by Symantec) *** Internet Security Threat Report 2014 (published by Symantec) Adaptive User Authentication 2
  • 3. Why Stronger Authentication? » We are already patching up, scanning and testing etc. » Companies often put a great effort into updating, patching, vulnerability testing etc., » but this way you only seal the windows, close the shutters and the cat’s door… » and if the wrong guy has a valid set of credentials, and you do not have MFA, he walks in through the main entrance… » even without anyone discovering it! – So you might be attacked without knowing! Adaptive User Authentication 3
  • 4. Stronger Authentication in 2014 » Today a password is not enough to ensure your online identity, because it can be compromised in many ways (key logged phished, bought, guessed etc.) » Therefore the providers of online services like banking, e-mail, gaming, social media etc. now all force or allow you to step up authentication » And since almost everybody has a mobile phone, the providers use SMS/Text for validation » A user-friendly way of enabling Multi-Factor Authentication on a global scale Adaptive User Authentication 4
  • 5. SMS PASSCODE We are a technology leader in adaptive multi-factor authentication software. We ensure employees can easily and safely access corporate networks and applications remotely. We provide IT/security managers with a cost-effective and easy-to-maintain offering that secures remote access systems, including Microsoft, Citrix, Cisco and Juniper. Adaptive User Authentication 5
  • 6. The Evolution of Authentication Technology 1st Generation 2nd Generation 3rd Generation 80-90’s Hardware Tokens + Introduction of two-factor auth. ÷ High cost on tokens ÷ Distribution & administration cost ÷ An extra thing to carry 00’s Mobile based solutions + Real-time multi-factor auth. + No hardware distribution ÷ Deployment of soft tokens / apps ÷ Regional SMS delivery challenges Now Adaptive User Authentication + Contextual intelligence layer + Policy-based trusted IPs + Multiple OTP options + Location aware dispatching Our Heritage: • Always been based on SMS, Always been real-time, Always been session based, No client software Adaptive User Authentication 6
  • 7. Two-factor vs. Multi-factor Authentication » Two-factor Authentication (2FA) is merely » Something you Know » Something you Have (Token, Card, Finger, Phone etc.) » Multi-Factor Authentication (MFA) simply adds more factors » Your Connection (unique session identification) » Your Location (Geographically) » The Role/Rights you have (Group member i.e. consultant, employee) » A valid Gateway/Point of entry » Time of day (doors are open only between i.e. 8am and 10pm) etc. Basic security: Protects against 90’ies threats (key loggers, guessed/ cracked/ bought/ borrowed passwords etc.) Plus - users feel that their identity is protected. Higher security: Protection against also more modern threats like Advanced malware, Session hijacking, Phishing, Pharming, Man-in-the- middle attacks etc. New flexibility: Access may now be controlled based on i.e. Countries, IP-ranges, “Trusted locations”, Time frames, Roles, Groups and other factors. Adaptive User Authentication 7
  • 8. Valued Partnerships Adaptive User Authentication 8
  • 9. Market Proven Technology Adaptive User Authentication 9
  • 10. Why SMS PASSCODE What makes SMS PASSCODE unique? Makes Security Hassle-Free and Painless for the User Easy for IT to Implement, Manage and Scale Prevents Security Breaches with Contextual Intelligence Reduces Costs and Improves ROI Superior User Experience Adaptive User Authentication 10
  • 11. Flexible OTP Delivery » Broad range of OTP delivery options » Automatic failover » Location Aware Dispatching » OATH token support – allows use of both hardware- and App tokens » Simultaneous use is possible Adaptive User Authentication 11
  • 12. Platform Diagram Adaptive User Authentication 12
  • 13. Demonstration Adaptive User Authentication 13
  • 14. In Good Hands 217 customers in 21 countries were asked Customer Satisfaction 2014 1% 40% 59% 0% 20% 40% 60% 80% HIGHLY SATISFIED SATISFIED LESS SATISFIED Likelyhood to recommend SMS PASSCODE 5% 1% 38% 56% 0% 20% 40% 60% VERY LIKELY LIKELY DON'T KNOW UNLIKELY “This project has been highly successful. Not only have we realized substantial cost savings, the users have also been very happy about the change” John Gudmann, Post Nord “SMS PASSCODE is a great hassle-free product and does exactly what we need it to” John Owen, IT Manager, Day Group “We have now regained control of the authentication process. We know exactly who receives access codes, when they use them to log in, and from where” Peter Warnier, CIO, DEME Adaptive User Authentication 14
  • 15. FREE 30 DAY TRIAL www.smspasscode.com/free-trial Adaptive User Authentication 15
  • 16. Keeping you safe without spoiling the ride
  • 17. Questions? Adaptive User Authentication 17