future of mobile authentication

13
1 © Copyright 2011 EMC Corporation. All rights reserved. The Future of Mobile Authentication Lauren Horaist Product Marketing, RSA

Upload: derektop

Post on 19-Jun-2015

181 views

Category:

Technology


1 download

DESCRIPTION

From Voice Biometrics Conference San Francisco (May 8-9, 2013): Mobile devices have the potential to be the universal device to make authentication stronger. But a host of challenges stand in the way for mobile security platforms. What are the key enablers and how does voice fit into a comprehensive mobile security strategy? -- Lauren Horaist, Senior Product Marketing Manager, RSA

TRANSCRIPT

Page 1: Future of Mobile Authentication

1 © Copyright 2011 EMC Corporation. All rights reserved.

The Future of Mobile Authentication Lauren Horaist Product Marketing, RSA

Page 2: Future of Mobile Authentication

2 © Copyright 2012 EMC Corporation. All rights reserved.

~135-million babies

~712-million smartphones

No wonder Android is the primary target of

mobile threats…

Page 3: Future of Mobile Authentication

3 © Copyright 2011 EMC Corporation. All rights reserved.

Look Familiar?

Page 4: Future of Mobile Authentication

4 © Copyright 2011 EMC Corporation. All rights reserved.

Cross-Channel Mobile Malware

Page 5: Future of Mobile Authentication

5 © Copyright 2011 EMC Corporation. All rights reserved.

Page 6: Future of Mobile Authentication

6 © Copyright 2011 EMC Corporation. All rights reserved.

Page 7: Future of Mobile Authentication

7 © Copyright 2011 EMC Corporation. All rights reserved.

Page 8: Future of Mobile Authentication

8 © Copyright 2011 EMC Corporation. All rights reserved.

They’re in the App Stores, too

Page 9: Future of Mobile Authentication

9 © Copyright 2011 EMC Corporation. All rights reserved.

So what does this mean?

•  Assume user devices have been compromised

•  Implement best practices to secure data on or accessed by the device

•  Enforce strong authentication to verify user’s true identity

Page 10: Future of Mobile Authentication

10 © Copyright 2011 EMC Corporation. All rights reserved.

Challenges of Mobile Authentication

User Experience a top priority

Authentication must be convenient

Policies based on risk and sensitivity

Device Profile

Behavior Profile

Known Fraud

Risk Analysis

Result

PASS

FAIL

VERIFY

Ø  Life questions

Ø Passcode via SMS

Ø Biometrics

Page 11: Future of Mobile Authentication

11 © Copyright 2011 EMC Corporation. All rights reserved.

voice

signature

vein

finger

retina face

vein retina

face

type signature

voice face

AVAILABLE FOR MOBILE

MATURE TECHNOLOGY

ENABLES STEP UP

type

Researched 30+ biometric solutions Validated & Filtered Evaluated methods

Biometric Methods For Mobile

signature

Page 12: Future of Mobile Authentication

12 © Copyright 2011 EMC Corporation. All rights reserved.

Accuracy

Usability

Integrations

Page 13: Future of Mobile Authentication

13 © Copyright 2011 EMC Corporation. All rights reserved.

Unlock Access Across Multiple Channels

The Future Is Now