authshield -trusted authentication partner for your enterprise solution

2
“A CHAIN IS AS STRONG AS TH E WEAKEST LINK IN THE CHAIN. WHAT IS THE WEAKEST LINK IN YOUR SECURITY THAT A HACKER CAN EXPLOIT??” AuthShield security team has always been focused on innovating and creating the latest technology and so- lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation, Professionalism and dedication to meeting any target. Apart from our research and development team in Two Factor Authentication, AuthShield security Team has expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or other custom ERP’s to desktop and mobile mail clients including Microsoft Outlook. Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi- zation in the world in less than two hours!! With a multi-tenant architecture, client has a centralized manage- ment system to set up Two Factor Authentication for the entire user database. The users can easily be synced from Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token etc. For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the option of hosting the authentication server at their own premises with the same set of features. Empanelled with DRDO Labs for multiple indigenous products. A strong Board of Advisors consisting of former Army officers and academicians. Only Indian company to have developed an indigenous Two Factor Authentication (Hard token, USB Token, Image based login). Only Indian company to have developed and deployed an independent Internet Monitoring Sys- tem across an entire region. Served key clients in Private and Public sector for more than four years. Management with combined experience of more than 5000 Hours in information security. Multiple patent pending technologies including Cyber Café surveillance, Tactical Internet Monitor- ing System, Multifactor Authentication. TRUSTED AND RELIABLE AUTHENTICATION SECURITY PARTNER FOR YOUR ENTERPRISE

Upload: authshield-lab

Post on 23-Sep-2015

218 views

Category:

Documents


1 download

DESCRIPTION

AuthShield is a pioneer in the arena of catering Information security solution to businesses of different genres. Innovative features and convenience of services are two important aspects of this company.

TRANSCRIPT

  • A CHAIN IS AS STRONG AS TH E WEAKEST LINK IN THE CHAIN. WHAT IS THE WEAKEST LINK IN YOUR SECURITY THAT A HACKER CAN EXPLOIT??

    AuthShield security team has always been focused on innovating and creating the latest technology and so-lutions to meet the needs of our customers. The culture around AuthShield Labs is ingrained around Innovation, Professionalism and dedication to meeting any target. Apart from our research and development team in Two Factor Authentication, AuthShield security Team has expertise in varied domains from SSL packet decoding to full disk encryption technology. The varied skill set in our extensive security team ensures that we are able to create custom plugins for almost anything from SAP or other custom ERPs to desktop and mobile mail clients including Microsoft Outlook. Our hosted security model brings strong, stable and easy to integrate Two Factor Authentication to any organi-zation in the world in less than two hours!! With a multi-tenant architecture, client has a centralized manage-ment system to set up Two Factor Authentication for the entire user database. The users can easily be synced from Active Directory, LDAP or any other Database. With a single authentication server, a client can assign and manage different types of tokens including Hard Token, Soft Token, One Touch Authentication, USB Token etc. For critical customers who may not wish their authentication servers to be on a hosted model, we do offer the option of hosting the authentication server at their own premises with the same set of features.

    Empanelled with DRDO Labs for multiple indigenous products.

    A strong Board of Advisors consisting of former Army officers and academicians.

    Only Indian company to have developed an indigenous Two Factor Authentication (Hard token,

    USB Token, Image based login).

    Only Indian company to have developed and deployed an independent Internet Monitoring Sys-

    tem across an entire region.

    Served key clients in Private and Public sector for more than four years.

    Management with combined experience of more than 5000 Hours in information security.

    Multiple patent pending technologies including Cyber Caf surveillance, Tactical Internet Monitor-

    ing System, Multifactor Authentication.

    TRUSTED AND RELIABLE AUTHENTICATION SECURITY PARTNER FOR YOUR ENTERPRISE

  • The Problem: Why Two Factor Authentication

    Many organizaons protect local and remote logins with a simple username and password. Entering these two pieces of informaon grants access to com-pany databases, email accounts, and other sensive informaon. But pass-words are notoriously insecure. Many users choose weak passwords which can be easily guessed or cracked. Phishing aacks trick people daily into revealing their passwords, and users on unsecured networks (e.g. at Food Courts) can have their passwords snied. Malicious viruses and spyware can capture pass-words and send them over the network to aackers. Furthermore, its impossible to tell who has access to your users accounts, or even if anyone is accessing them illicitly. In the past year alone, aackers have compromised LinkedIn, Twier, Facebook (and many more) by simply gaining knowledge of users passwords. Clearly passwords are not enough for protecng important logins.

    VPN

    RDP

    Web Application

    Mail

    Citrix

    VPN Server

    Terminal Server

    Web Server

    Exchange Server

    Citrix Server

    AuthShield Server

    AuthShield Server 2-Factor A

    uthentication Layer

    AuthShield Two Factor Authentication Architecture

    AuthShield Token Types

    Har

    d T

    oke

    n US

    B T

    oken

    Soft Token Mobile Token

    SMS Token Push Token

    Methods of Attack

    Phishing

    The Solution

    AuthShield - Two Factor Authencaon maps the physical identy of the user to the server and increases the security. Integrang Stronger User Authencaon system not only helps prevent Online Credit Card fraud, Card Cloning, Identy the but also helps in the capture of habitual cyber criminals.

    AuthShield authencates and veries the user based on something only the user knows

    (user id and password) something only the user has (mobile

    phone/ desktop/ hard token)

    AuthShield technology uses a dual mode of idencaon where along with the user id and password, vericaon is done through a secure randomly gener-ated one me password (OTP).

    Har

    d T

    oke

    n

    Built and designed using a patented process, the Hard-tokens comes in an easy to use and convenient form factor. It generates a new password aer xed intervals of me. The user enters the password generated by the hard token as a secondary form of authencaon.

    Mobile token is convenient form factor installed on the smart phone itself which is highly popular among tech-savvy users. The user does not need to carry any extra devices. Available for any smartphone OS.

    Mob

    ile T

    oken

    PKI-based security soluons are en-hanced by something you have technologies by providing secure stor-age of digital idenes backed up by strong two-factor authencaon. AuthShields USB token is based on Public Key Infrastructure (PKI )Technology. It enables the use of digital signature, digital receipt, en-crypon and permissions manage-ment services.

    U

    SB T

    oken

    S

    oft

    To

    ken

    It is highly popular among organi-zaons as it ensures that the users do not need to carry any extra devices to authencate them-selves. AuthShield so token is a convenient form factor installed on the laptop / desktop itself. The user enters the password generat-ed by so token as secondary form of authencaon.

    P

    ush

    Toke

    n

    Push token is the latest Two Factor Authencaon system to come out from AuthShield. It is an one click authencaon sys-tem in which whenever a user wishes to log, a push noca-on is sent to his smart phone. Thus, it removes the concept of One Time Passwords and intro-duces One Click Authencaon

    It is the most widely used form of Dual Authencaon. In SMS token One Time Password is generated and sent to the registered mobile phone of the user. By this way, it becomes the most convenient One Time password authenca-tors for users not having a smart phone.

    S

    MS

    Toke

    n

    Our Experse in dealing with various Government Agencies

    Simple and Easy Integraon

    Robust and Proven Technology

    Compeve Advantage

    Indigenous Technology

    Unparalleled Support