SlideShare a Scribd company logo
Multi-Factor
Authentication
Solution
PCN PINsafe Solution Overview



The evolution of communications and network technology has transformed modern business processes.
Communications are no longer hindered by geography and the distinctions between local and global, big and small
have crumbled. Businesses of all sizes, across all industries are thriving as diverse and geographically distributed
employees have quick, reliable, and secure access to internal data and services, anytime, anyplace.

However, this freedom comes with the need for modern, flexible security protocols. PCN’s Multi-Factor Authentication
Solution allows you to reliably and securely provide remote access for employees, partners, and customers.

PCN’s Multi-Factor Authentication Solution
PCN’s Multi-Factor Authentication Solution utilizes Swivel Secure’s PINsafe product to offer cost-effective and
secure remote access by authorized users to your network from any web-capable computer device. With over 20
years experience as a systems integrator and managed service provider, PCN has the technical experience and
business acumen to design an Authentication Solution that is closely aligned with your business processes to
increase efficiency, improve service and security, and reduce costs.

PINsafe Product
PINsafe is an inherently flexible solution that adapts to meet a range of authentication requirements -- for example,
it can configure your solution to provide different authentication experiences for different users and for different
services. PCN can implement your solution using single and dual channel authentication processes. For example,
the security string can be displayed as a TURing image to the end-user as part of the SSL VPN login process. This
provides a simple and seamless user-experience that provides defense against many of the most widely deployed
attacks. For a higher level of security, the security string can be sent via SMS to the user’s registered mobile phone
-- this provides a stronger, true two-factor authentication as a user needs to “have” the correct phone and “know”
their PIN. Key features of PINsafe are outline below.


   Tokenless: No tokens or client side installation          Flexible: Integrates with virtually all existing remote
                                                             access products.
   Dual Channel Authentication: Cutting-edge mobile
   telephone & SMS-based authentication including being      Provisioning: Near-instant provisioning and
   iClient app for the Apple iPhone.                         deprovisioning by adding and removing authorized users
                                                             from the database or Microsoft’s Active Directory.
   No Data Footprint: Users never enter their PIN, but
   combine their PIN with a random security string to        Microsoft Integration: The only tokenless multi-factor
   derive an OTC authentication credential.                  authentication solution approved by Microsoft.

   Logging: Detailed logging for auditing and security.

   Scalability: Once the database servers are deployed,
   scale to any number of users by simply buying more
                                                                                    Technical Expertise. Tangible Results.
   licenses.
                                                                   www.PCN-inc.com I 888.726.3877 I info@PCN-inc.com
Multi-Factor Authentication Solution
PCN PINsafe Solution Overview (con’t)


PCN’s Multifactor Authentication Solution can be delivered as a standard systems integration project ends with
ongoing managed services and support at the customer’s option.

Systems Integration Services
•   End-to-End Project Management.
•   Due diligence and data discovery to specify, order, and configure the solution.
•   Assemble, configure, burn-in, and test all equipment in PCN’s NOC.
•   Securely package and ship the finished units to the designated location. For international locations, customs,
    VAT, and other export and shipping expenses will be passed through to customer at cost. Customer will arrange
    for the equipment to be stored in a secure on-site location until it is installed.
•   On-site installation to assemble and configure systems at designated data centers, plan and implement pilot
    test, test devices for power on and standard functionality, and initial training of customer administrators.
•   Provide hardware and software documentation, as appropriate.
•   Although this includes stand up of the authentication database, custom API development or other programming
    customization to the implementation may (depending on the level of customization) be provided on a time and
    materials basis.

Optional Services
For customers looking to outsource technical and/or end-user support, PCN offers a range of flexible managed
services customized to your enterprise requirements. This may include:

On-going Solution Support and Maintenance
• Remote monitoring of PINsafe appliances for connectivity and service states, monitoring of services status,
   emergency backups and restores.
• PINsafe appliance troubleshooting, incident resolution, problem management and root cause analysis, change
   and release management, patching or upgrading of deployed appliances and/or software.
• Technical support to customer’s PINsafe “administration users”.

End User Support and Administration
• Level 2 support for end user administration service requests and support (“How to” questions, PIN resets,
   account unlocks, etc.) or Moves, Adds, Changes, or Deletions (MACDs). Contingent upon granting PCN
   appropriate administrative rights, network access, and bandwidth.

Training and Education
• End user training, creation of training materials, administrative Knowledge Base, user self-help website, or FAQ.

Professional Programming Services and Customizations
• Custom API development or other programming customization to the implementation.

Extended Support Hours
• Extended support hours include live support on a 7x24x365 basis (vs. 5x8).

Co-Location Facility
• While the base solution assumes appliances will be based at customer data centers, PCN can provide a co-
    location site in our secure data center.
                                                                      Point of Contact: Shaun Antram
                                                                                        Shaun.Antram@PCN-inc.com
 www.PCN-inc.com I 888.726.3877 I Info@PCN-inc.com                                      Direct: 267.236.0136

More Related Content

PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PPTX
PCI-DSS v3.0 - What you need to know
PDF
PCI 3.0 Revealed - What You Need to Know Today
PDF
Caretower's Managed ePO Brochure 180215
PDF
Virtual private network
PDF
SDP Glossary v2.0
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PPTX
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PCI-DSS v3.0 - What you need to know
PCI 3.0 Revealed - What You Need to Know Today
Caretower's Managed ePO Brochure 180215
Virtual private network
SDP Glossary v2.0
How to Overcome Network Access Control Limitations for Better Network Security
Checkpoint Firewall Training | Checkpoint Firewall Online Course

What's hot (20)

PDF
Point-to-Point Encryption: Best Practices and PCI Compliance Update
PDF
Hitachi ID Password Manager
PDF
Hitachi ID Password Manager
PPTX
CompTIA Security+ Guide
PPTX
Cryptzone: What is a Software-Defined Perimeter?
PPTX
User Authentication for Government
PDF
Check Point appliances brochure 2012
PDF
STRONG AUTHENTICATION ... NO PASSWORDS
PDF
Proc mate for manufacturing
PPTX
Understanding the Role of Hardware Data Encryption in EMV and P2PE
PDF
Webinar NETGEAR - Insight Pro, la soluzione di Networking Management per il t...
PPTX
CSA Presentation - Software Defined Perimeter
PDF
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PPTX
Ewug 1802 secure your windows device in a modern way
DOCX
Abhishek Kumar
PPSX
MindRiver Managed Servces
PDF
Scc soft token datasheet
PPTX
Scug 1803 modern device management
PDF
Webinar NETGEAR - Insight, la configurazione passo a passo delle reti e dei c...
PDF
Rest Solution : NOC-as-a-service
Point-to-Point Encryption: Best Practices and PCI Compliance Update
Hitachi ID Password Manager
Hitachi ID Password Manager
CompTIA Security+ Guide
Cryptzone: What is a Software-Defined Perimeter?
User Authentication for Government
Check Point appliances brochure 2012
STRONG AUTHENTICATION ... NO PASSWORDS
Proc mate for manufacturing
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Webinar NETGEAR - Insight Pro, la soluzione di Networking Management per il t...
CSA Presentation - Software Defined Perimeter
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
Ewug 1802 secure your windows device in a modern way
Abhishek Kumar
MindRiver Managed Servces
Scc soft token datasheet
Scug 1803 modern device management
Webinar NETGEAR - Insight, la configurazione passo a passo delle reti e dei c...
Rest Solution : NOC-as-a-service
Ad

Similar to Multi-Factor Authentication (20)

PDF
Contextual Authentication
PDF
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
PPTX
Winkler Cloud, ORCON, and Mobility
PDF
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
PDF
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
PPTX
Brave new world of encryption v1
PDF
Issa chicago next generation tokenization ulf mattsson apr 2011
PDF
20 74-1-pb
PDF
Enterprise Mobile Security for PeopleSoft
PDF
Oded Tsur - Ca Cloud Security
PDF
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
Two-factor Authentication
PDF
ISSA: Cloud data security
PDF
Protecting Data in the Cloud
PPTX
Windows 7 For Itpro
PDF
IRJET- Secure Cloud Storage through Dual Protection
PDF
Context Based Authentication
PDF
Evaluating thin client_security
PDF
Cloud Security Alliance Q2-2012 Atlanta Meeting
Contextual Authentication
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Winkler Cloud, ORCON, and Mobility
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Brave new world of encryption v1
Issa chicago next generation tokenization ulf mattsson apr 2011
20 74-1-pb
Enterprise Mobile Security for PeopleSoft
Oded Tsur - Ca Cloud Security
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Two-factor Authentication
ISSA: Cloud data security
Protecting Data in the Cloud
Windows 7 For Itpro
IRJET- Secure Cloud Storage through Dual Protection
Context Based Authentication
Evaluating thin client_security
Cloud Security Alliance Q2-2012 Atlanta Meeting
Ad

Recently uploaded (20)

PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Architecture types and enterprise applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid model detection and classification of lung cancer
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
project resource management chapter-09.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Getting started with AI Agents and Multi-Agent Systems
TLE Review Electricity (Electricity).pptx
The various Industrial Revolutions .pptx
Architecture types and enterprise applications.pdf
Programs and apps: productivity, graphics, security and other tools
Module 1.ppt Iot fundamentals and Architecture
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Modernising the Digital Integration Hub
Hybrid model detection and classification of lung cancer
1 - Historical Antecedents, Social Consideration.pdf
project resource management chapter-09.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Getting Started with Data Integration: FME Form 101
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
NewMind AI Weekly Chronicles – August ’25 Week III

Multi-Factor Authentication

  • 1. Multi-Factor Authentication Solution PCN PINsafe Solution Overview The evolution of communications and network technology has transformed modern business processes. Communications are no longer hindered by geography and the distinctions between local and global, big and small have crumbled. Businesses of all sizes, across all industries are thriving as diverse and geographically distributed employees have quick, reliable, and secure access to internal data and services, anytime, anyplace. However, this freedom comes with the need for modern, flexible security protocols. PCN’s Multi-Factor Authentication Solution allows you to reliably and securely provide remote access for employees, partners, and customers. PCN’s Multi-Factor Authentication Solution PCN’s Multi-Factor Authentication Solution utilizes Swivel Secure’s PINsafe product to offer cost-effective and secure remote access by authorized users to your network from any web-capable computer device. With over 20 years experience as a systems integrator and managed service provider, PCN has the technical experience and business acumen to design an Authentication Solution that is closely aligned with your business processes to increase efficiency, improve service and security, and reduce costs. PINsafe Product PINsafe is an inherently flexible solution that adapts to meet a range of authentication requirements -- for example, it can configure your solution to provide different authentication experiences for different users and for different services. PCN can implement your solution using single and dual channel authentication processes. For example, the security string can be displayed as a TURing image to the end-user as part of the SSL VPN login process. This provides a simple and seamless user-experience that provides defense against many of the most widely deployed attacks. For a higher level of security, the security string can be sent via SMS to the user’s registered mobile phone -- this provides a stronger, true two-factor authentication as a user needs to “have” the correct phone and “know” their PIN. Key features of PINsafe are outline below. Tokenless: No tokens or client side installation Flexible: Integrates with virtually all existing remote access products. Dual Channel Authentication: Cutting-edge mobile telephone & SMS-based authentication including being Provisioning: Near-instant provisioning and iClient app for the Apple iPhone. deprovisioning by adding and removing authorized users from the database or Microsoft’s Active Directory. No Data Footprint: Users never enter their PIN, but combine their PIN with a random security string to Microsoft Integration: The only tokenless multi-factor derive an OTC authentication credential. authentication solution approved by Microsoft. Logging: Detailed logging for auditing and security. Scalability: Once the database servers are deployed, scale to any number of users by simply buying more Technical Expertise. Tangible Results. licenses. www.PCN-inc.com I 888.726.3877 I info@PCN-inc.com
  • 2. Multi-Factor Authentication Solution PCN PINsafe Solution Overview (con’t) PCN’s Multifactor Authentication Solution can be delivered as a standard systems integration project ends with ongoing managed services and support at the customer’s option. Systems Integration Services • End-to-End Project Management. • Due diligence and data discovery to specify, order, and configure the solution. • Assemble, configure, burn-in, and test all equipment in PCN’s NOC. • Securely package and ship the finished units to the designated location. For international locations, customs, VAT, and other export and shipping expenses will be passed through to customer at cost. Customer will arrange for the equipment to be stored in a secure on-site location until it is installed. • On-site installation to assemble and configure systems at designated data centers, plan and implement pilot test, test devices for power on and standard functionality, and initial training of customer administrators. • Provide hardware and software documentation, as appropriate. • Although this includes stand up of the authentication database, custom API development or other programming customization to the implementation may (depending on the level of customization) be provided on a time and materials basis. Optional Services For customers looking to outsource technical and/or end-user support, PCN offers a range of flexible managed services customized to your enterprise requirements. This may include: On-going Solution Support and Maintenance • Remote monitoring of PINsafe appliances for connectivity and service states, monitoring of services status, emergency backups and restores. • PINsafe appliance troubleshooting, incident resolution, problem management and root cause analysis, change and release management, patching or upgrading of deployed appliances and/or software. • Technical support to customer’s PINsafe “administration users”. End User Support and Administration • Level 2 support for end user administration service requests and support (“How to” questions, PIN resets, account unlocks, etc.) or Moves, Adds, Changes, or Deletions (MACDs). Contingent upon granting PCN appropriate administrative rights, network access, and bandwidth. Training and Education • End user training, creation of training materials, administrative Knowledge Base, user self-help website, or FAQ. Professional Programming Services and Customizations • Custom API development or other programming customization to the implementation. Extended Support Hours • Extended support hours include live support on a 7x24x365 basis (vs. 5x8). Co-Location Facility • While the base solution assumes appliances will be based at customer data centers, PCN can provide a co- location site in our secure data center. Point of Contact: Shaun Antram Shaun.Antram@PCN-inc.com www.PCN-inc.com I 888.726.3877 I Info@PCN-inc.com Direct: 267.236.0136