SlideShare a Scribd company logo
1 of 16
Enhancing Identity
Protection Solutions
with a Certified
Hardware Security
Module (HSM)
Will LaSala – VASCO Data Security
Juan Asenjo – Thales e-Security
Things can go wrong…
Trust takes years to build, seconds to break, and forever to repair.
Why protect your authentication solutions?
Unauthorized access to
online sensitive data
Targeted cyber-attacks on
authentication solutions
can render them ineffective
• Insider Attacker Threats
• Targeted Social
Engineering Attacks
• Advanced Persistent
Threats
Multi-Factor Authentication
▌ VACMAN Controller
Backend
Protect & manage keys
used for provisioning
authentication devices
▌ IDENTIKEY
Authentication Server
Backend
Authentication server
Processes user login
requests
Validates devices
▌ DIGIPASS
Frontend
Authentication device
family
Something user has
Something user knows
Thales nShield HSM
A Component of the VASCO Trust Platform
IDENTIKEY Authentication Server
Remote Clients
Back-End
IDENTIKEY DB
• Built-in
• ODBC
• Active Directory
Web Admin Command
AD Admin Line
Additional ToolsAdministration
SEAL
RADIUS
Customer Web ApplicationsSOAP
DIGIPASS Authentication
for Windows LogonSEAL-SSL
Wifi / RADIUS ClientRADIUS
Citrix/OWA/IIS6
WINDOWS
LDAP
Native HSM
Key Protection
VACMAN Controller
VACMAN Controller replaces your built in password
verification module inside your application
6
Platform
X
Application
Core
Communication
Interface
StorageUser
Interface
Password
Validation
Module
VACMAN
Controller
HSM
Security
World VC
HSM
Module
• Thales and VASCO platforms with HSM leverages multiple secure keys which are used to decrypt DIGIPASS
secrets in the manufacturing injection process, transport file and customer backend database.
• VASCO HSM Encrypted data used for Authentication and Provisioning
• DIGIPASS Secrets are never in the clear and leverage an HSM throughout the entire lifecycle
VASCO and Thales Deliver Secure Lifecycle Management of User
Credentials and Authentication Devices:
Manufacturing to Delivery
Delivery to Loading
Joint Solution Details
What are HSMs and What do they do?
Hardware Security Module
Hardened, tamper-resistant devices isolated
from host environment
Alternative to software crypto libraries
Secure cryptographic operations
Protect critical cryptographic keys
Segregate administration and security domains
and enforce key use policy
nShield HSMs
are FIPS 140-2
Level 3 certified
Protecting the Keys (Software vs. Hardware)
Software-Only System
Numerous copies of keys live across
system and backups
Hardened System
Keys are segregated within an isolated
security environment
Extending nShield Security Capabilities
CodeSafe – secure code execution
 Enables sensitive applications to run within HSM security boundary
 Protects application code from attack while it executes
 Essential when the protection of keys and crypto processes alone is not sufficient
 Creates tamper-resistant applications
 Ideal for remote deployment operations such as manufacturing sites
Business Application Security-Sensitive Code
Code moved into
HSMHSM security boundary
Application keys and security-
sensitive code inside HSM
boundary
Security-sensitive
code
Crypto processing engine
Protecting the Private Key
Cryptographic Identity
 1:1 mapping between a private key and its corresponding certificate
 Your private key is your identity
 Personal
 Corporate
 What is the impact if that key is compromised?
 Compromise of DIGIPASS OTP secrets, which can be used for remote access to
company resources
 Compromise of trusted user authorization, without triggering inherent network monitor
alarms
 What can be done to mitigate a compromise?
 Surprisingly little – the cat is out of the bag
 OTP token can be revoked
 New OTP tokens & keys can be distributed and hope your credibility survives
Thales Integration with Vasco
Enhance the Security of your User
Credentials with a Proven,
Integrated Solution
CLICK HERE
Why Thales e-Security?
Banking Government Utilities High Tech Mobile
Automotive
Healthcare
Manufacturing
▌ Our track record. Over 40 years of leadership delivering data protection solutions around
the world
▌ Our customers. We secure some of the world’s most valuable information and > 80% of
payment transactions
▌ Our commitment. Hundreds of R&D staff dedicated to excellence in applied
cryptography
▌ Our certifications. All our offerings are independently security certified - more than
anyone else!
▌ Our support services. Our Advanced Solutions Group (ASG) provides world-class
consulting, training, and deployment assistance
 End to End key protection throughout key lifecycle
 Hardened tamper resistant environment
 Seamless support of an integrated solution
 Robust two-factor authentication of users
 Protects a wide range of authentication devices
 Full lifecycle cryptographic key management
 Stores keys in a FIPS 140-2 Level 3 validated module
 Simplified PCI DSS auditing and reduced compliance costs
A Secure environments needs to have Trust, across users, devices,
applications, communications, platforms
End to End Trusted User Security is…
 Building Trust for Everything the user is
 Building Trust for Everything the user does
 By ensuring Everything is secure
 Everything is built on controlling access to the Keys
 If that key is compromised, then others can follow
Joint Solution Summary
VASCO Trust Platform
The VASCO Trust Platform
Risk
Management
Transaction
Security
Mobile Application
Security
Multi-Factor
Authentication
Identity
Proofing
Trusted Identity Trusted User
Trusted Device
Trusted App
Trusted Channel
Trusted Data & Docs
Trusted Signatures
Trusted Transactions Trusted Behavior
VASCO Trust Platform
Who you are What you do
IDENTIKEY
Risk Manager
f o r A P P S
Leverage new technology to deliver higher levels of security and fraud prevention that are frictionless and
transparent to the end user, and that enable new business capabilities and efficiencies.
 Download Solution brief CLICK HERE
 Upgrade your IDENTIKEY license to IDENTIKEY
Enterprise
info-usa@vasco.com
 Request more information about Thales HSM
www.thales-esecurity.com
What’s Next:

More Related Content

Viewers also liked

SSL State of the Union
SSL State of the UnionSSL State of the Union
SSL State of the UnionSander Temme
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsThales e-Security
 
TLS State of the Union
TLS State of the UnionTLS State of the Union
TLS State of the UnionSander Temme
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection SolutionGreg Stone
 
[Application guide] IoT Protocol gateway
[Application guide] IoT Protocol gateway[Application guide] IoT Protocol gateway
[Application guide] IoT Protocol gatewaySeth Xie
 
Cloud payments (HCE): a simpler step with Thales HSMs
Cloud payments (HCE): a simpler step with Thales HSMsCloud payments (HCE): a simpler step with Thales HSMs
Cloud payments (HCE): a simpler step with Thales HSMsThales e-Security
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksMarco Morana
 
47 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v847 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v8Veeam Software
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Thales e-Security
 
Le contrat agile ce n'est pas si simple que ça
Le contrat agile ce n'est pas si simple que çaLe contrat agile ce n'est pas si simple que ça
Le contrat agile ce n'est pas si simple que çaFranck Beulé
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseInsider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire
 

Viewers also liked (19)

ROTLD DNSSEC Implementation
ROTLD DNSSEC ImplementationROTLD DNSSEC Implementation
ROTLD DNSSEC Implementation
 
Mexico trends mx 042116 (003)
Mexico trends mx 042116 (003)Mexico trends mx 042116 (003)
Mexico trends mx 042116 (003)
 
SSL State of the Union
SSL State of the UnionSSL State of the Union
SSL State of the Union
 
Protecting application delivery without network security blind spots
Protecting application delivery without network security blind spotsProtecting application delivery without network security blind spots
Protecting application delivery without network security blind spots
 
TLS State of the Union
TLS State of the UnionTLS State of the Union
TLS State of the Union
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
[Application guide] IoT Protocol gateway
[Application guide] IoT Protocol gateway[Application guide] IoT Protocol gateway
[Application guide] IoT Protocol gateway
 
Cloud payments (HCE): a simpler step with Thales HSMs
Cloud payments (HCE): a simpler step with Thales HSMsCloud payments (HCE): a simpler step with Thales HSMs
Cloud payments (HCE): a simpler step with Thales HSMs
 
Innovation Solutions
Innovation SolutionsInnovation Solutions
Innovation Solutions
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
47 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v847 restore scenarios from Veeam Backup & Replication v8
47 restore scenarios from Veeam Backup & Replication v8
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?
 
thales-corporate-presentation 2015
thales-corporate-presentation 2015thales-corporate-presentation 2015
thales-corporate-presentation 2015
 
Le contrat agile ce n'est pas si simple que ça
Le contrat agile ce n'est pas si simple que çaLe contrat agile ce n'est pas si simple que ça
Le contrat agile ce n'est pas si simple que ça
 
Insider threat
Insider threatInsider threat
Insider threat
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseInsider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Enhancing identity protection solutions with a certified hsm

  • 1. Enhancing Identity Protection Solutions with a Certified Hardware Security Module (HSM) Will LaSala – VASCO Data Security Juan Asenjo – Thales e-Security
  • 2. Things can go wrong… Trust takes years to build, seconds to break, and forever to repair.
  • 3. Why protect your authentication solutions? Unauthorized access to online sensitive data Targeted cyber-attacks on authentication solutions can render them ineffective • Insider Attacker Threats • Targeted Social Engineering Attacks • Advanced Persistent Threats
  • 4. Multi-Factor Authentication ▌ VACMAN Controller Backend Protect & manage keys used for provisioning authentication devices ▌ IDENTIKEY Authentication Server Backend Authentication server Processes user login requests Validates devices ▌ DIGIPASS Frontend Authentication device family Something user has Something user knows Thales nShield HSM A Component of the VASCO Trust Platform
  • 5. IDENTIKEY Authentication Server Remote Clients Back-End IDENTIKEY DB • Built-in • ODBC • Active Directory Web Admin Command AD Admin Line Additional ToolsAdministration SEAL RADIUS Customer Web ApplicationsSOAP DIGIPASS Authentication for Windows LogonSEAL-SSL Wifi / RADIUS ClientRADIUS Citrix/OWA/IIS6 WINDOWS LDAP Native HSM Key Protection
  • 6. VACMAN Controller VACMAN Controller replaces your built in password verification module inside your application 6 Platform X Application Core Communication Interface StorageUser Interface Password Validation Module VACMAN Controller HSM Security World VC HSM Module
  • 7. • Thales and VASCO platforms with HSM leverages multiple secure keys which are used to decrypt DIGIPASS secrets in the manufacturing injection process, transport file and customer backend database. • VASCO HSM Encrypted data used for Authentication and Provisioning • DIGIPASS Secrets are never in the clear and leverage an HSM throughout the entire lifecycle VASCO and Thales Deliver Secure Lifecycle Management of User Credentials and Authentication Devices: Manufacturing to Delivery Delivery to Loading Joint Solution Details
  • 8. What are HSMs and What do they do? Hardware Security Module Hardened, tamper-resistant devices isolated from host environment Alternative to software crypto libraries Secure cryptographic operations Protect critical cryptographic keys Segregate administration and security domains and enforce key use policy nShield HSMs are FIPS 140-2 Level 3 certified
  • 9. Protecting the Keys (Software vs. Hardware) Software-Only System Numerous copies of keys live across system and backups Hardened System Keys are segregated within an isolated security environment
  • 10. Extending nShield Security Capabilities CodeSafe – secure code execution  Enables sensitive applications to run within HSM security boundary  Protects application code from attack while it executes  Essential when the protection of keys and crypto processes alone is not sufficient  Creates tamper-resistant applications  Ideal for remote deployment operations such as manufacturing sites Business Application Security-Sensitive Code Code moved into HSMHSM security boundary Application keys and security- sensitive code inside HSM boundary Security-sensitive code Crypto processing engine
  • 11. Protecting the Private Key Cryptographic Identity  1:1 mapping between a private key and its corresponding certificate  Your private key is your identity  Personal  Corporate  What is the impact if that key is compromised?  Compromise of DIGIPASS OTP secrets, which can be used for remote access to company resources  Compromise of trusted user authorization, without triggering inherent network monitor alarms  What can be done to mitigate a compromise?  Surprisingly little – the cat is out of the bag  OTP token can be revoked  New OTP tokens & keys can be distributed and hope your credibility survives
  • 12. Thales Integration with Vasco Enhance the Security of your User Credentials with a Proven, Integrated Solution CLICK HERE
  • 13. Why Thales e-Security? Banking Government Utilities High Tech Mobile Automotive Healthcare Manufacturing ▌ Our track record. Over 40 years of leadership delivering data protection solutions around the world ▌ Our customers. We secure some of the world’s most valuable information and > 80% of payment transactions ▌ Our commitment. Hundreds of R&D staff dedicated to excellence in applied cryptography ▌ Our certifications. All our offerings are independently security certified - more than anyone else! ▌ Our support services. Our Advanced Solutions Group (ASG) provides world-class consulting, training, and deployment assistance
  • 14.  End to End key protection throughout key lifecycle  Hardened tamper resistant environment  Seamless support of an integrated solution  Robust two-factor authentication of users  Protects a wide range of authentication devices  Full lifecycle cryptographic key management  Stores keys in a FIPS 140-2 Level 3 validated module  Simplified PCI DSS auditing and reduced compliance costs A Secure environments needs to have Trust, across users, devices, applications, communications, platforms End to End Trusted User Security is…  Building Trust for Everything the user is  Building Trust for Everything the user does  By ensuring Everything is secure  Everything is built on controlling access to the Keys  If that key is compromised, then others can follow Joint Solution Summary VASCO Trust Platform
  • 15. The VASCO Trust Platform Risk Management Transaction Security Mobile Application Security Multi-Factor Authentication Identity Proofing Trusted Identity Trusted User Trusted Device Trusted App Trusted Channel Trusted Data & Docs Trusted Signatures Trusted Transactions Trusted Behavior VASCO Trust Platform Who you are What you do IDENTIKEY Risk Manager f o r A P P S Leverage new technology to deliver higher levels of security and fraud prevention that are frictionless and transparent to the end user, and that enable new business capabilities and efficiencies.
  • 16.  Download Solution brief CLICK HERE  Upgrade your IDENTIKEY license to IDENTIKEY Enterprise info-usa@vasco.com  Request more information about Thales HSM www.thales-esecurity.com What’s Next: