SlideShare a Scribd company logo
SMS PASSCODE 
3rd generation user authentication 
Christian Larsen 
Regional Manager, International 
VirtualizationForum 2014
Why Stronger Authentication? 
Simply because passwords are weak! 
» Hackers preferred weapon 76% of network intrusions 
exploited weak or stolen credentials (passwords)* 
» You might already be a victim 66% of breaches took months or 
years to discover* 
» The small organizations cannot hide 31%of all targeted 
attacks were aimed at businesses with less than 250 
employees** 
» The threat is only getting bigger - Cybercrime is the fastest 
growing crime type in the world and targeted attacks grew by 
62% from 2013 to 2014*** 
* Verizon Data Breach Investigations Report 2013 
** Internet Security Threat Report 2013 (published by Symantec) 
*** Internet Security Threat Report 2014 (published by Symantec) 
Adaptive User Authentication 2
Why Stronger Authentication? 
» We are already patching up, scanning and testing etc. 
» Companies often put a great effort into updating, 
patching, vulnerability testing etc., 
» but this way you only seal the windows, close the shutters 
and the cat’s door… 
» and if the wrong guy has a valid set of credentials, and 
you do not have MFA, he walks in through the main 
entrance… 
» even without anyone discovering it! – So you might be 
attacked without knowing! 
Adaptive User Authentication 3
Stronger Authentication in 2014 
» Today a password is not enough to ensure your 
online identity, because it can be compromised in 
many ways (key logged phished, bought, guessed 
etc.) 
» Therefore the providers of online services like 
banking, e-mail, gaming, social media etc. now all 
force or allow you to step up authentication 
» And since almost everybody has a mobile phone, 
the providers use SMS/Text for validation 
» A user-friendly way of enabling Multi-Factor 
Authentication on a global scale 
Adaptive User Authentication 4
SMS PASSCODE 
We are a technology leader in adaptive multi-factor authentication software. 
We ensure employees can easily and safely access corporate networks and applications 
remotely. 
We provide IT/security managers with a cost-effective and easy-to-maintain offering that 
secures remote access systems, including Microsoft, Citrix, Cisco and Juniper. 
Adaptive User Authentication 5
The Evolution of Authentication 
Technology 
1st Generation 2nd Generation 3rd Generation 
80-90’s 
Hardware Tokens 
+ Introduction of two-factor auth. 
÷ High cost on tokens 
÷ Distribution & administration cost 
÷ An extra thing to carry 
00’s 
Mobile based solutions 
+ Real-time multi-factor auth. 
+ No hardware distribution 
÷ Deployment of soft tokens / apps 
÷ Regional SMS delivery challenges 
Now 
Adaptive User Authentication 
+ Contextual intelligence layer 
+ Policy-based trusted IPs 
+ Multiple OTP options 
+ Location aware dispatching 
Our Heritage: 
• Always been based on SMS, Always been real-time, Always been session based, No client software 
Adaptive User Authentication 6
Two-factor vs. Multi-factor Authentication 
» Two-factor Authentication (2FA) is merely 
» Something you Know 
» Something you Have (Token, Card, Finger, Phone etc.) 
» Multi-Factor Authentication (MFA) simply adds more factors 
» Your Connection (unique session identification) 
» Your Location (Geographically) 
» The Role/Rights you have (Group member i.e. consultant, employee) 
» A valid Gateway/Point of entry 
» Time of day (doors are open only between i.e. 8am and 10pm) etc. 
Basic security: 
Protects against 90’ies threats (key 
loggers, guessed/ cracked/ bought/ 
borrowed passwords etc.) Plus - users 
feel that their identity is protected. 
Higher security: 
Protection against also more modern 
threats like Advanced malware, Session 
hijacking, Phishing, Pharming, Man-in-the- 
middle attacks etc. 
New flexibility: 
Access may now be controlled based on 
i.e. Countries, IP-ranges, “Trusted 
locations”, Time frames, Roles, Groups 
and other factors. 
Adaptive User Authentication 7
Valued Partnerships 
Adaptive User Authentication 8
Market Proven Technology 
Adaptive User Authentication 9
Why SMS PASSCODE 
What makes SMS PASSCODE unique? 
Makes Security Hassle-Free and 
Painless for the User 
Easy for IT to Implement, 
Manage and Scale 
Prevents Security Breaches with 
Contextual Intelligence 
Reduces Costs and 
Improves ROI 
Superior 
User 
Experience 
Adaptive User Authentication 10
Flexible OTP Delivery 
» Broad range of OTP delivery options 
» Automatic failover 
» Location Aware Dispatching 
» OATH token support – allows use of both hardware- and App tokens 
» Simultaneous use is possible 
Adaptive User Authentication 11
Platform Diagram 
Adaptive User Authentication 12
Demonstration 
Adaptive User Authentication 13
In Good Hands 
217 
customers 
in 21 countries were asked 
Customer Satisfaction 2014 
1% 
40% 
59% 
0% 20% 40% 60% 80% 
HIGHLY SATISFIED 
SATISFIED 
LESS SATISFIED 
Likelyhood to recommend 
SMS PASSCODE 
5% 
1% 
38% 
56% 
0% 20% 40% 60% 
VERY LIKELY 
LIKELY 
DON'T KNOW 
UNLIKELY 
“This project has been highly successful. Not 
only have we realized substantial cost savings, 
the users have also been very happy about the 
change” 
John Gudmann, Post Nord 
“SMS PASSCODE is a great hassle-free product 
and does exactly what we need it to” 
John Owen, IT Manager, Day Group 
“We have now regained control of the 
authentication process. We know exactly who 
receives access codes, when they use them to 
log in, and from where” 
Peter Warnier, CIO, DEME 
Adaptive User Authentication 14
FREE 30 DAY TRIAL 
www.smspasscode.com/free-trial 
Adaptive User Authentication 15
Keeping you safe 
without spoiling the ride
Questions? 
Adaptive User Authentication 17

More Related Content

PDF
Avoiding Two-factor Authentication? You're Not Alone
PPTX
Two Factor Authentication Made Easy ICWE 2015
PDF
3 reasons your business can't ignore Two-Factor Authentication
PDF
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
PPTX
Seminar-Two Factor Authentication
PPTX
Two factor authentication presentation mcit
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PDF
2 factor authentication 3 [compatibility mode]
Avoiding Two-factor Authentication? You're Not Alone
Two Factor Authentication Made Easy ICWE 2015
3 reasons your business can't ignore Two-Factor Authentication
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
Seminar-Two Factor Authentication
Two factor authentication presentation mcit
Combat the Latest Two-Factor Authentication Evasion Techniques
2 factor authentication 3 [compatibility mode]

What's hot (20)

PPTX
Two Factor Authentication: Easy Setup, Major Impact
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PDF
Two-factor Authentication
PDF
Two factor authentication
PPTX
Two factor authentication 2018
PDF
Adding Two Factor Authentication to your App with Authy
PPTX
Two Factor Authentication
PDF
Why Two-Factor Authentication?
PPTX
Multifactor Authentication
PDF
Protecting Your POS System from PoSeidon and Other Malware Attacks
PPTX
Webinar - Easy multi factor authentication strategies and PCI DSS
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
HYPR: The Leading Provider of True Passwordless Security®
PDF
2FA Advanced Authentication for Public Safety
PDF
Banking and Modern Payments System Security Analysis
PDF
Two factor authentication-in_your_network_e_guide
PPTX
Single Sign-On & Strong Authentication
PPTX
User Authentication for Government
PPT
Security and information assurance
Two Factor Authentication: Easy Setup, Major Impact
Webinar: Goodbye RSA. Hello Modern Authentication.
Two-factor Authentication
Two factor authentication
Two factor authentication 2018
Adding Two Factor Authentication to your App with Authy
Two Factor Authentication
Why Two-Factor Authentication?
Multifactor Authentication
Protecting Your POS System from PoSeidon and Other Malware Attacks
Webinar - Easy multi factor authentication strategies and PCI DSS
Stronger/Multi-factor Authentication for Enterprise Applications
HYPR: The Leading Provider of True Passwordless Security®
2FA Advanced Authentication for Public Safety
Banking and Modern Payments System Security Analysis
Two factor authentication-in_your_network_e_guide
Single Sign-On & Strong Authentication
User Authentication for Government
Security and information assurance
Ad

Viewers also liked (8)

PPT
Infoblast – Interactive 2-way Messaging Service
PDF
MobiWeb - SMS for App Promotion & Engagement
PPTX
Securing ChatOps - DevSecCon Asia 2017 arun n
PPTX
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
PDF
2FA and OTP
PPTX
Presentation9
PDF
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
PDF
MOBtexting : Leading A2P Messaging & Cloud Telephony Service Provider
Infoblast – Interactive 2-way Messaging Service
MobiWeb - SMS for App Promotion & Engagement
Securing ChatOps - DevSecCon Asia 2017 arun n
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
2FA and OTP
Presentation9
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
MOBtexting : Leading A2P Messaging & Cloud Telephony Service Provider
Ad

Similar to Welcome to the 3rd generation in user authentication (20)

PDF
Move your customer authentication to the next level!
PDF
Effective 2FA - Part 1: the technical stuff
PDF
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
PDF
Whitepaper: Unlocking the Mobile Security Potential
PDF
A Simplified Guide to the Evolution of Authentication!
PDF
A Telco and End-user Perspective on the Authentication Journey
PDF
Shared responsibility model: Why and how to choose the right 2 fa method for ...
PPT
Authenticationtechnologies 120711134100-phpapp01
PDF
Transecq ITA
PDF
How to Implement Website Authentication By MyOtpApp
PPSX
iKeyPass...Unbreakable Password Security
PDF
Security & Seamless CX in User Authentication: How to Achieve Both?
PDF
2020-08_The_Evolution_of_Authentication.pdf
PDF
Fido Overview: Status and Future
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PPTX
How To Make Mobile Apps Secure - Mobile login multifactor authentication.
PDF
Making User Authentication More Usable
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
New Opportunities with Two Factor Authentication (2FA) - A How To
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
Move your customer authentication to the next level!
Effective 2FA - Part 1: the technical stuff
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Whitepaper: Unlocking the Mobile Security Potential
A Simplified Guide to the Evolution of Authentication!
A Telco and End-user Perspective on the Authentication Journey
Shared responsibility model: Why and how to choose the right 2 fa method for ...
Authenticationtechnologies 120711134100-phpapp01
Transecq ITA
How to Implement Website Authentication By MyOtpApp
iKeyPass...Unbreakable Password Security
Security & Seamless CX in User Authentication: How to Achieve Both?
2020-08_The_Evolution_of_Authentication.pdf
Fido Overview: Status and Future
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
How To Make Mobile Apps Secure - Mobile login multifactor authentication.
Making User Authentication More Usable
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
New Opportunities with Two Factor Authentication (2FA) - A How To
Taking Control of the Digital and Mobile User Authentication Challenge
 

More from MarketingArrowECS_CZ (20)

PDF
INFINIDAT InfiniGuard - 20220330.pdf
PDF
Využijte svou Oracle databázi na maximum!
PDF
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
PDF
Chráníte správně svoje data?
PDF
Oracle databáze – Konsolidovaná Data Management Platforma
PDF
Nové vlastnosti Oracle Database Appliance
PDF
Infinidat InfiniGuard
PDF
Infinidat InfiniBox
PDF
Novinky ve světě Oracle DB a koncept konvergované databáze
PDF
Základy licencování Oracle software
PDF
Garance 100% dostupnosti dat! Kdo z vás to má?
PDF
Využijte svou Oracle databázi naplno
PDF
Oracle Data Protection - 2. část
PDF
Oracle Data Protection - 1. část
PDF
Benefity Oracle Cloudu (4/4): Storage
PDF
Benefity Oracle Cloudu (3/4): Compute
PDF
InfiniBox z pohledu zákazníka
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
PDF
Úvod do Oracle Cloud infrastruktury
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury

Recently uploaded (20)

PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Unlock new opportunities with location data.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Tartificialntelligence_presentation.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Hybrid model detection and classification of lung cancer
PPTX
The various Industrial Revolutions .pptx
PDF
Five Habits of High-Impact Board Members
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Unlock new opportunities with location data.pdf
A comparative study of natural language inference in Swahili using monolingua...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A novel scalable deep ensemble learning framework for big data classification...
Tartificialntelligence_presentation.pptx
sustainability-14-14877-v2.pddhzftheheeeee
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
Five Habits of High-Impact Board Members
Final SEM Unit 1 for mit wpu at pune .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
O2C Customer Invoices to Receipt V15A.pptx
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence

Welcome to the 3rd generation in user authentication

  • 1. SMS PASSCODE 3rd generation user authentication Christian Larsen Regional Manager, International VirtualizationForum 2014
  • 2. Why Stronger Authentication? Simply because passwords are weak! » Hackers preferred weapon 76% of network intrusions exploited weak or stolen credentials (passwords)* » You might already be a victim 66% of breaches took months or years to discover* » The small organizations cannot hide 31%of all targeted attacks were aimed at businesses with less than 250 employees** » The threat is only getting bigger - Cybercrime is the fastest growing crime type in the world and targeted attacks grew by 62% from 2013 to 2014*** * Verizon Data Breach Investigations Report 2013 ** Internet Security Threat Report 2013 (published by Symantec) *** Internet Security Threat Report 2014 (published by Symantec) Adaptive User Authentication 2
  • 3. Why Stronger Authentication? » We are already patching up, scanning and testing etc. » Companies often put a great effort into updating, patching, vulnerability testing etc., » but this way you only seal the windows, close the shutters and the cat’s door… » and if the wrong guy has a valid set of credentials, and you do not have MFA, he walks in through the main entrance… » even without anyone discovering it! – So you might be attacked without knowing! Adaptive User Authentication 3
  • 4. Stronger Authentication in 2014 » Today a password is not enough to ensure your online identity, because it can be compromised in many ways (key logged phished, bought, guessed etc.) » Therefore the providers of online services like banking, e-mail, gaming, social media etc. now all force or allow you to step up authentication » And since almost everybody has a mobile phone, the providers use SMS/Text for validation » A user-friendly way of enabling Multi-Factor Authentication on a global scale Adaptive User Authentication 4
  • 5. SMS PASSCODE We are a technology leader in adaptive multi-factor authentication software. We ensure employees can easily and safely access corporate networks and applications remotely. We provide IT/security managers with a cost-effective and easy-to-maintain offering that secures remote access systems, including Microsoft, Citrix, Cisco and Juniper. Adaptive User Authentication 5
  • 6. The Evolution of Authentication Technology 1st Generation 2nd Generation 3rd Generation 80-90’s Hardware Tokens + Introduction of two-factor auth. ÷ High cost on tokens ÷ Distribution & administration cost ÷ An extra thing to carry 00’s Mobile based solutions + Real-time multi-factor auth. + No hardware distribution ÷ Deployment of soft tokens / apps ÷ Regional SMS delivery challenges Now Adaptive User Authentication + Contextual intelligence layer + Policy-based trusted IPs + Multiple OTP options + Location aware dispatching Our Heritage: • Always been based on SMS, Always been real-time, Always been session based, No client software Adaptive User Authentication 6
  • 7. Two-factor vs. Multi-factor Authentication » Two-factor Authentication (2FA) is merely » Something you Know » Something you Have (Token, Card, Finger, Phone etc.) » Multi-Factor Authentication (MFA) simply adds more factors » Your Connection (unique session identification) » Your Location (Geographically) » The Role/Rights you have (Group member i.e. consultant, employee) » A valid Gateway/Point of entry » Time of day (doors are open only between i.e. 8am and 10pm) etc. Basic security: Protects against 90’ies threats (key loggers, guessed/ cracked/ bought/ borrowed passwords etc.) Plus - users feel that their identity is protected. Higher security: Protection against also more modern threats like Advanced malware, Session hijacking, Phishing, Pharming, Man-in-the- middle attacks etc. New flexibility: Access may now be controlled based on i.e. Countries, IP-ranges, “Trusted locations”, Time frames, Roles, Groups and other factors. Adaptive User Authentication 7
  • 8. Valued Partnerships Adaptive User Authentication 8
  • 9. Market Proven Technology Adaptive User Authentication 9
  • 10. Why SMS PASSCODE What makes SMS PASSCODE unique? Makes Security Hassle-Free and Painless for the User Easy for IT to Implement, Manage and Scale Prevents Security Breaches with Contextual Intelligence Reduces Costs and Improves ROI Superior User Experience Adaptive User Authentication 10
  • 11. Flexible OTP Delivery » Broad range of OTP delivery options » Automatic failover » Location Aware Dispatching » OATH token support – allows use of both hardware- and App tokens » Simultaneous use is possible Adaptive User Authentication 11
  • 12. Platform Diagram Adaptive User Authentication 12
  • 13. Demonstration Adaptive User Authentication 13
  • 14. In Good Hands 217 customers in 21 countries were asked Customer Satisfaction 2014 1% 40% 59% 0% 20% 40% 60% 80% HIGHLY SATISFIED SATISFIED LESS SATISFIED Likelyhood to recommend SMS PASSCODE 5% 1% 38% 56% 0% 20% 40% 60% VERY LIKELY LIKELY DON'T KNOW UNLIKELY “This project has been highly successful. Not only have we realized substantial cost savings, the users have also been very happy about the change” John Gudmann, Post Nord “SMS PASSCODE is a great hassle-free product and does exactly what we need it to” John Owen, IT Manager, Day Group “We have now regained control of the authentication process. We know exactly who receives access codes, when they use them to log in, and from where” Peter Warnier, CIO, DEME Adaptive User Authentication 14
  • 15. FREE 30 DAY TRIAL www.smspasscode.com/free-trial Adaptive User Authentication 15
  • 16. Keeping you safe without spoiling the ride
  • 17. Questions? Adaptive User Authentication 17