authshield trusted authentication partner for your enterprise solution

2
“A CHAIN IS AS STRONG AS TH E WEAKEST LINK IN THE CHAIN. WHAT IS THE WEAKEST LINK IN YOUR SECURITY THAT A HACKER CAN EXPLOIT??” AuthShield security team has always been focused on innovating and creating the latest technology and so- lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation, Professionalism and dedication to meeting any target. Apart from our research and development team in Two Factor Authentication, AuthShield security Team has expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook. Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi- zation in the world in less than two hours!! With a multi-tenant architecture, client has a centralized manage- ment system to set up Two Factor Authentication for the entire user database. The users can easily be synced from Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token etc. For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the option of hosting the authentication server at their own premises with the same set of features. Empanelled with DRDO Labs for multiple indigenous products. A strong Board of Advisors consisting of former Army officers and academicians. Only Indian company to have developed an indigenous Two Factor Authentication (Hard token, USB Token, Image based login). Only Indian company to have developed and deployed an independent Internet Monitoring Sys- tem across an entire region. Served key clients in Private and Public sector for more than four years. Management with combined experience of more than 5000 Hours in information security. Multiple patent pending technologies including Cyber Café surveillance, Tactical Internet Monitor- ing System, Multifactor Authentication. TRUSTED AND RELIABLE AUTHENTICATION SECURITY PARTNER FOR YOUR ENTERPRISE

Upload: authshieldlabs

Post on 22-Jul-2016

213 views

Category:

Documents


0 download

DESCRIPTION

AuthShield is a pioneer in the arena of catering Information security solution to businesses of different genres. Innovative features and convenience of services are two important aspects of this company.

TRANSCRIPT

“A CHAIN IS AS STRONG AS TH E WEAKEST LINK IN THE CHAIN. WHAT IS THE WEAKEST LINK IN YOUR SECURITY THAT A HACKER CAN EXPLOIT??”

AuthShield security team has always been focused on innovating and creating the latest technology and so-lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation, Professionalism and dedication to meeting any target. Apart from our research and development team in Two Factor Authentication, AuthShield security Team has expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook. Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi-zation in the world in less than two hours!! With a multi-tenant architecture, client has a centralized manage-ment system to set up Two Factor Authentication for the entire user database. The users can easily be synced from Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token etc. For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the option of hosting the authentication server at their own premises with the same set of features.

Empanelled with DRDO Labs for multiple indigenous products.

A strong Board of Advisors consisting of former Army officers and academicians.

Only Indian company to have developed an indigenous Two Factor Authentication (Hard token,

USB Token, Image based login).

Only Indian company to have developed and deployed an independent Internet Monitoring Sys-

tem across an entire region.

Served key clients in Private and Public sector for more than four years.

Management with combined experience of more than 5000 Hours in information security.

Multiple patent pending technologies including Cyber Café surveillance, Tactical Internet Monitor-

ing System, Multifactor Authentication.

TRUSTED AND RELIABLE AUTHENTICATION SECURITY PARTNER FOR YOUR ENTERPRISE

The Problem: Why Two Factor Authentication

Many organiza ons protect local and remote logins with a simple username and password. Entering these two pieces of informa on grants access to com-pany databases, email accounts, and other sensi ve informa on. But pass-words are notoriously insecure. Many users choose weak passwords which can be easily guessed or cracked. Phishing a acks trick people daily into revealing their passwords, and users on unsecured networks (e.g. at Food Courts) can have their passwords sniffed. Malicious viruses and spyware can capture pass-words and send them over the network to a ackers. Furthermore, it’s impossible to tell who has access to your users’ accounts, or even if anyone is accessing them illicitly. In the past year alone, a ackers have compromised LinkedIn, Twi er, Facebook (and many more) by simply gaining knowledge of users’ passwords. Clearly passwords are not enough for protec ng important logins.

VPN

RDP

Web Application

Mail

Citrix

VPN Server

Terminal Server

Web Server

Exchange Server

Citrix Server

AuthShield Server

AuthShield Server 2-Factor A

uthentication Layer

AuthShield Two Factor Authentication Architecture

AuthShield Token Types

Har

d T

oke

n U

SB

To

ken

Soft Token Mobile Token

SMS Token Push Token

Methods of Attack

Phishing

The Solution

AuthShield - Two Factor Authen ca on maps the physical iden ty of the user to the server and increases the security. Integra ng Stronger User Authen ca on system not only helps prevent Online Credit Card fraud, Card Cloning, Iden ty the but also helps in the capture of habitual cyber criminals.

AuthShield authen cates and verifies the user based on – something only the user knows

(user id and password) something only the user has (mobile

phone/ desktop/ hard token)

AuthShield technology uses a dual mode of iden fica on where along with the user id and password, verifica on is done through a secure randomly gener-ated one me password (OTP).

Har

d T

oke

n

Built and designed using a patented process, the Hard-tokens comes in an easy to use and convenient form factor. It generates a new password a er fixed intervals of me. The user enters the password generated by the hard token as a secondary form of authen ca on.

Mobile token is convenient form factor installed on the smart phone itself which is highly popular among tech-savvy users. The user does not need to carry any extra devices. Available for any smartphone OS.

Mob

ile T

oken

PKI-based security solu ons are en-hanced by “something you have” technologies by providing secure stor-age of digital iden es backed up by strong two-factor authen ca on. AuthShield’s USB token is based on Public Key Infrastructure (PKI )Technology. It enables the use of digital signature, digital receipt, en-cryp on and permissions manage-ment services.

U

SB T

oken

S

oft

To

ken

It is highly popular among organi-za ons as it ensures that the users do not need to carry any extra devices to authen cate them-selves. AuthShield so token is a convenient form factor installed on the laptop / desktop itself. The user enters the password generat-ed by so token as secondary form of authen ca on.

P

ush

Toke

n

Push token is the latest Two Factor Authen ca on system to come out from AuthShield. It is an one click authen ca on sys-tem in which whenever a user wishes to log, a ‘push’ no fica-

on is sent to his smart phone. Thus, it removes the concept of ‘One Time Passwords’ and intro-duces ‘One Click Authen ca on’

It is the most widely used form of Dual Authen ca on. In SMS token One Time Password is generated and sent to the registered mobile phone of the user. By this way, it becomes the most convenient One Time password authen ca-tors for users not having a smart phone.

S

MS

Toke

n

Our Exper se in dealing with various Government Agencies

Simple and Easy Integra on

Robust and Proven Technology

Compe ve Advantage

Indigenous Technology

Unparalleled Support