bio-d security
TRANSCRIPT
Lynne Cadenhead
Secure Email Communications - Bio ID SC3 November 2015
Emails, Emails, Emails…
•2.6 billion email users worldwide•A billion emails sent per hour•12 million business emails sent every second•122 average per person per day•156 million phishing emails every day (80,000 scammed)•9 out of 10 viruses infect via an email
Lynne Cadenhead, Bio ID Security 3 November 2015
Cybercrime
• The Snowden effect• Global costs of cybercrime rapidly
escalating towards £300 billion per annum• Virtual pandemic of concern circulating the
globe• Painfully aware of need to protect identity
and data• Immense drawbacks in current security
solutions
Lynne Cadenhead, Bio ID Security 3 November 2015
£300 billionAnnual Costs of
Cybercrime
£300 Million theft from UK bank
accounts due to hacking
Who are you?
Network/physicaladdress
Palmprints
Iris scans
Finger prints
Digital certificate
Retinascan
Smart card
Something you are
Something you have
Something you know
Username/password
Mother’s maiden name
Password Problems
•Most people use expensive, obselete and insecure passwords as a means of user identification
•The password and user id combination is dead as a means of securely identifying a person
•90% user generated password hacked in minutes
•Password Problems – 70% costs of IT Service Desk
Secure Alternative – Biometrics The process of converting unique biological characteristics of a person in a digital form of identificationWithout question the only way to be absolutely sure about the identity of a person
Lynne Cadenhead, Bio ID Security 3 November 2015
Bio ID Security Solution
Our products solve quickly, easily, cost-effectively and the current limitations.
Lynne Cadenhead, Bio ID Security 3 November 2015
We provide superior and robust security solutions for large, global organisations
BioID Products are no so-called "mass market security gimmicks", but an important and much-sought-after progress
toward real security
Bio ID Security
•Transformational proprietary software fuses biometrics and AES256 encryption•Person to Person (P2P) Secure Email Tunnel•Eliminates costs of cumbersome Digital Certificates•Fully integrated into Microsoft Active Directory•Multi-factor biometric cloud-based platform•Over 20 man years development •Simplicity belies its sophistication•Complete Authentication
Lynne Cadenhead, Bio ID Security 3 November 2015
E-mail Encryption
Bob
Server
User
Device
Intermediatedevice
Intermediatedevice
Service
End-to-end authentication
Server
User
Device
Intermediatedevice
Intermediatedevice
Intermediate authentication
Service
ServerDevice
Intermediatedevice
Intermediatedevice
Complete Authentication (Bio-ID)
Service Alice
Bob
Bob
Bio ID Enterprise Suite
Bio ID Enterprise Suite
J2EE Enterprise Server ( acts as Root Server for generating PKI and digital signatures, and combines multiple Active Directories enabling administration of AD users in multiple remote locations)
Bio ID Enterprise Server ( fully integrated extension of Microsoft Active Directory, handles various biometrics in one AD (MS 2008R2 - 2012R2)
Lynne Cadenhead, Bio ID Security 3 November 2015
Bio ID Modules
Individual Modules
Bio ID Logon Extension to replace passwords with biometrics, stand alone or networkable, proprietary minutiae-based fingerprint algorithm, stored as encypted template)
Bio ID Secure Communications MS Outlook plugin, AES 256 encryption, digital signature based on biometrics
Lynne Cadenhead, Bio ID Security 3 November 2015
Fingerprint replaces your password
MS Active Directory – Central Enrollment
Fingerprint replaces your password
Log in process
Fingerprint replaces your password
MS Active Directory
Secure Email Communication
Secure Email Communication
Show whatthe user sees
Secure Email Communication
Secure Email Communication
Bio ID SC - Secure Email Communication
•Data Loss Prevention (DLP) and High Risk Information Sharing (HRIS)
•Creates a complete “Person-to-Person Tunnel" for emails
•Biometrics provides secure authentication of the sender and recipient
•Protects emails in any status:
• In the system (data at-rest) • In transmission (data in-motion) • In temporary stage i.e. opening up (data in-process)
Lynne Cadenhead
Secure Email Communications - Bio ID SC3 November 2015
QUESTIONS