SlideShare a Scribd company logo
Software Tokens
Two Factor Authentication for your smartphone
Signify helps organisations to secure their computer networks. We provide a secure alternative to
passwords that safely enables remote access to systems and information by delivering two-factor
authentication as an on-demand, hosted service.



                                                                            Key benefits
                                                                            Guaranteed Reliability:
                                                                             • Works without mobile phone network
                                                                               coverage
                                                                             • Distributed and resilient infrastructure
                                                                             • SLA backed service

                                                                            Proven Security:
                                                                             • Market leading RSA software token
                                                                             • Infrastructure designed and managed
                                                                               with security in mind
Signify Software Tokens deliver market leading RSA two factor
                                                                             • Secure web portal administration
authentication by turning a smartphone (BlackBerry or Windows
Mobile) into a strong authentication token. Our service makes it easy       Flexible to your requirements:
to securely identify users 24 x 7 by confirming they have their
                                                                             • Mix our token and tokenless services
smartphone with them. As a fully hosted service we ensure that the
                                                                             • Utilises your user’s existing smartphone
service works securely and reliably.
                                                                               device
Signify Software Tokens are ideal for users who need secure remote           • Variety of contract lengths
access from any computer, but don’t want to carry a token in addition
to their other mobile devices.                                              Quick to deploy:
                                                                             • Compatible with all leading VPNs,
What are Signify Software Tokens?                                              firewalls and web servers
Signify Software Tokens allow a user’s smartphone to be used just like a
                                                                             • No training required
strong authentication token, which they need to have with them when
                                                                             • No physical token to deploy
they wish to remotely access networks, files and applications. Signify
                                                                             • Efficient software token provisioning
delivers RSA software tokens which work just like RSA’s market leading
                                                                               process
SecurID keyfob tokens. You get RSA security and reliability with the
convenience of using your own smartphone, delivered by Signify’s
proven hosted service.

When a user wishes to access their corporate data remotely using a PC
or laptop, they simply enter their secret PIN into their smartphone
token application. The smartphone then generates a one time passcode
which the user then enters into the password field on their PC or
laptop. By demonstrating that they have these two ‘factors’ – a secret
PIN and their smartphone – the user is securely identified.

Signify Software Tokens provide a better user experience because they
enable users to use their preferred mobile device to authenticate
themselves. Users usually tend to look after their smartphones more
carefully than a keyfob token and are therefore less likely to lose them.
When lost, they are more likely to report that fact, enabling the token
to be disabled, ensuring that your corporate security is maintained.
A Complete Managed Service
The successful deployment of two-factor authentication takes more than just technology; you also need to implement a
framework of policies, procedures, logistics and user support. These are automated through key features of our service:

Authentication Infrastructure: Security and reliability is designed in and implemented across multiple data
centres, to deliver and validate one time passcodes every time. 99.999% service availability over the last 5 years.

The Identity Management Centre (IMC): Manage all aspects of your service through our easy-to-use
web portal. This portal gives you more control and visibility of the service than if you ran the servers yourself.

End User Web Helpdesk: Our 24 x 7 self-service web helpdesk lets your users resolve their common problems
such as forgotten PINs. This reduces your costs and improves the end user experience.

Software Token Provisioning Process: The software token and seed record is simply pushed to a user’s
smartphone upon request, ensuring that provisioning is quick and easy for the user. We achieve this by streamlining
the set up procedure for each user, to ensure they can start working first time, every time, without adding load to
your already busy IT team.

You may not want a software token for all your users? Signify’s range of services make it easy
for you to give each user the most appropriate form of authentication to match their working pattern and security
privileges. You can mix and match Signify Software Tokens with our RSA SecurID from Signify and Signify Passcode
OnDemand services.




   Included Features
   Authentication Device                      Uses the existing smartphone each user already carries
                                              Software token is installed as an additional application

   Authentication Service                     Annual service fee per user
                                              Unlimited authentications per user

   Organisation Base Pack                     IMC web portal for administration
                                              Telephone/e-mail support for administrators from our dedicated support team
                                              End user web helpdesk for automated resolution of end user issues

   Optional Features                          Discounts for multi-year contracts
                                              Software token life to suit how long you keep your smartphones




Authorised partner:




                                                                                                                     info@signify.net www.signify.net
                                                                                                                                +44 (0)1223 472572
©2009 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks
of RSA Security Inc. The BlackBerry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.

More Related Content

PDF
Rsa Secur Id From Signify
PDF
Signify Passcode On Demand
PDF
Beam datasheet final 7 28-12
PDF
Cidway Banking 02 2011
PDF
PIV Card based Identity Assurance in Sun Ray and IDM environment
PPTX
OmniSource_ppt_2011_7-2 (2)(1)
PDF
Authentication Management
PPTX
BYOD - Ruckus way. Right way.
Rsa Secur Id From Signify
Signify Passcode On Demand
Beam datasheet final 7 28-12
Cidway Banking 02 2011
PIV Card based Identity Assurance in Sun Ray and IDM environment
OmniSource_ppt_2011_7-2 (2)(1)
Authentication Management
BYOD - Ruckus way. Right way.

What's hot (16)

PPTX
Samsung KNOX - The Most Secure Android Solution
PDF
Assurity seminar 24 jan
PPTX
Cidway Corporate Access 06 2009 Full
PPTX
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
PPTX
KNOX Message: Collaborate Securely, Anywhere, Anytime
PPTX
Norton Zone File-Sharing Service
PDF
Knox Configure Sales Deck
PDF
STRONG AUTHENTICATION ... NO PASSWORDS
PDF
Android Security Maximized by Samsung KNOX
PDF
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
PDF
Knox Customization Sales Deck
PDF
Mdc Brochure
PPTX
Knox Manage
PDF
Java Everywhere. Descubra la Internet de las Cosas
PPT
Technet System Center Mobile Device Manager Presentation
PPSX
Business Mobility - otevřete svou mysl k tomu, co je možné
Samsung KNOX - The Most Secure Android Solution
Assurity seminar 24 jan
Cidway Corporate Access 06 2009 Full
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
KNOX Message: Collaborate Securely, Anywhere, Anytime
Norton Zone File-Sharing Service
Knox Configure Sales Deck
STRONG AUTHENTICATION ... NO PASSWORDS
Android Security Maximized by Samsung KNOX
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Knox Customization Sales Deck
Mdc Brochure
Knox Manage
Java Everywhere. Descubra la Internet de las Cosas
Technet System Center Mobile Device Manager Presentation
Business Mobility - otevřete svou mysl k tomu, co je možné
Ad

Viewers also liked (6)

PDF
Scc soft token datasheet
PDF
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
PDF
Portal Authentication: A Balancing Act Between Security Usability and Complia...
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PPTX
Implementing Enterprise PPM for Multi-Maturity Organizations
PDF
Creating OTP with free software
Scc soft token datasheet
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Stronger/Multi-factor Authentication for Enterprise Applications
Implementing Enterprise PPM for Multi-Maturity Organizations
Creating OTP with free software
Ad

Similar to Signify Software Tokens (20)

PDF
Rsa Secur Id From Signify
PDF
Signify Passcode On Demand
PDF
Signify Overview
PDF
Signify Overview
PDF
2p Mta Data Sheet V1.7 X1a
PDF
SmartCard Forum 2010 - Enterprise authentication
PDF
Entrust IdentityGuard Mobile
PDF
Transecq ITA
PDF
Single Sign-On for Mobile
PDF
Knorr-Bremse Group Strong Authentication Case Study
PDF
A Single Strong Authentication Platform for Cloud and On-Premise Applications
PDF
Over the Air 2011 Security Workshop
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
Sms passcode
PDF
SmartCard Forum 2011 - Evolution of authentication market
PDF
SafeNet - Data Protection Company
PPTX
FrontOne our new and different solutions
PDF
SmartCard Forum 2009 - OpenTrust SCM
PDF
Introducing Salesforce Identity
PDF
Enterprise Mobile Security for PeopleSoft
Rsa Secur Id From Signify
Signify Passcode On Demand
Signify Overview
Signify Overview
2p Mta Data Sheet V1.7 X1a
SmartCard Forum 2010 - Enterprise authentication
Entrust IdentityGuard Mobile
Transecq ITA
Single Sign-On for Mobile
Knorr-Bremse Group Strong Authentication Case Study
A Single Strong Authentication Platform for Cloud and On-Premise Applications
Over the Air 2011 Security Workshop
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Sms passcode
SmartCard Forum 2011 - Evolution of authentication market
SafeNet - Data Protection Company
FrontOne our new and different solutions
SmartCard Forum 2009 - OpenTrust SCM
Introducing Salesforce Identity
Enterprise Mobile Security for PeopleSoft

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25 Week I
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology

Signify Software Tokens

  • 1. Software Tokens Two Factor Authentication for your smartphone Signify helps organisations to secure their computer networks. We provide a secure alternative to passwords that safely enables remote access to systems and information by delivering two-factor authentication as an on-demand, hosted service. Key benefits Guaranteed Reliability: • Works without mobile phone network coverage • Distributed and resilient infrastructure • SLA backed service Proven Security: • Market leading RSA software token • Infrastructure designed and managed with security in mind Signify Software Tokens deliver market leading RSA two factor • Secure web portal administration authentication by turning a smartphone (BlackBerry or Windows Mobile) into a strong authentication token. Our service makes it easy Flexible to your requirements: to securely identify users 24 x 7 by confirming they have their • Mix our token and tokenless services smartphone with them. As a fully hosted service we ensure that the • Utilises your user’s existing smartphone service works securely and reliably. device Signify Software Tokens are ideal for users who need secure remote • Variety of contract lengths access from any computer, but don’t want to carry a token in addition to their other mobile devices. Quick to deploy: • Compatible with all leading VPNs, What are Signify Software Tokens? firewalls and web servers Signify Software Tokens allow a user’s smartphone to be used just like a • No training required strong authentication token, which they need to have with them when • No physical token to deploy they wish to remotely access networks, files and applications. Signify • Efficient software token provisioning delivers RSA software tokens which work just like RSA’s market leading process SecurID keyfob tokens. You get RSA security and reliability with the convenience of using your own smartphone, delivered by Signify’s proven hosted service. When a user wishes to access their corporate data remotely using a PC or laptop, they simply enter their secret PIN into their smartphone token application. The smartphone then generates a one time passcode which the user then enters into the password field on their PC or laptop. By demonstrating that they have these two ‘factors’ – a secret PIN and their smartphone – the user is securely identified. Signify Software Tokens provide a better user experience because they enable users to use their preferred mobile device to authenticate themselves. Users usually tend to look after their smartphones more carefully than a keyfob token and are therefore less likely to lose them. When lost, they are more likely to report that fact, enabling the token to be disabled, ensuring that your corporate security is maintained.
  • 2. A Complete Managed Service The successful deployment of two-factor authentication takes more than just technology; you also need to implement a framework of policies, procedures, logistics and user support. These are automated through key features of our service: Authentication Infrastructure: Security and reliability is designed in and implemented across multiple data centres, to deliver and validate one time passcodes every time. 99.999% service availability over the last 5 years. The Identity Management Centre (IMC): Manage all aspects of your service through our easy-to-use web portal. This portal gives you more control and visibility of the service than if you ran the servers yourself. End User Web Helpdesk: Our 24 x 7 self-service web helpdesk lets your users resolve their common problems such as forgotten PINs. This reduces your costs and improves the end user experience. Software Token Provisioning Process: The software token and seed record is simply pushed to a user’s smartphone upon request, ensuring that provisioning is quick and easy for the user. We achieve this by streamlining the set up procedure for each user, to ensure they can start working first time, every time, without adding load to your already busy IT team. You may not want a software token for all your users? Signify’s range of services make it easy for you to give each user the most appropriate form of authentication to match their working pattern and security privileges. You can mix and match Signify Software Tokens with our RSA SecurID from Signify and Signify Passcode OnDemand services. Included Features Authentication Device Uses the existing smartphone each user already carries Software token is installed as an additional application Authentication Service Annual service fee per user Unlimited authentications per user Organisation Base Pack IMC web portal for administration Telephone/e-mail support for administrators from our dedicated support team End user web helpdesk for automated resolution of end user issues Optional Features Discounts for multi-year contracts Software token life to suit how long you keep your smartphones Authorised partner: info@signify.net www.signify.net +44 (0)1223 472572 ©2009 Signify Solutions Limited. Signify and the Signify logo are registered trademarks of Signify Solutions Limited. RSA SecurID and the RSA logo are registered trademarks of RSA Security Inc. The BlackBerry brand is a registered trademark of Research in Motion Limited. All other logos and trademarks are properties of their respective owners.