integration with database
TRANSCRIPT
AuthShield Integration with Databases
Private & Confidential2
Virtual Private Network
• Databases are at the core of IT in any organization
• Most organizations use Databases to support internal operations or to handle online interactions with customers or vendors
• Databases are used in every organization in the world whether it’s a Bank, Airlines, Telecommunications, Manufacturing etc
Private & Confidential3
Why AuthShield 2FA?
• AuthShield 2FA is the only solution in the world which can be integrated at a Protocol level
• Any organization with multiple users modifying the database needs to have AuthShield 2FA to track and protect Database changes
Private & Confidential4
AuthShield 2FA
Map the physical identity of the user to the server (Two Factor Authentication)
Identify the user based on – Something he knows (user name / password)Something in the users possessions
Private & Confidential5
Unique Form Factors
Soft Token
Push Token
Mobile Token
Hard Token
Private & Confidential6
AuthShield integration with Database Queries
• Most organizations have multiple users modifying the databases at any given point of time
• It becomes impossible for an organization to track all the changes made to database by different users at different points of time
• AuthShield is the only Two Factor Authentication solution in the world which can be integrated with database queries using our patented protocol decoding technology
• All changes to the database will take place when the query (fired in real time) is approved by two individuals
Private & Confidential7
Architecture
Private and Confidential
• AuthShield 2FA is integrated with Database queries using our patented protocol decoding engine
• Second Factor of Authentication can be integrated with all or specific types of queries as well as with specific user names
• AuthShield identifies the query packets modifying the database as well as the user name and query fired
Integration with Oracle Database Queries
Private and Confidential
• For specific users, when they fire a Database query –
– A PUSH notification is generated and sent to the user as well as the reporting manager
– The notification contains details on –• User making the request• Details on the query
• The query is only processed if both the user and the reporting manager approves the query
• The same architecture can be replicated from reporting manager to any other user
Contd.
Private & Confidential10
Why AuthShield 2FA?
Why us??Only organization in the world to have integrated 2FA at a Protocol level thereby achieving direct integration with Microsoft Exchange mail clients, Lotus notes, SAP, legacy applications etc.
Trusted by multiple Government organizations across the world
Unparalleled Support
Robust and Proven Technology
Competitive Costs
About Us
Private and Confidential
About the CompanyResearch Oriented Information Security
Organization
All technologies are indigenous - Evaluated and approved by multiple Government Agencies
Empanelled with DRDO
More than six years of experience in Cyber Security
Served key clients in Private and Public sector
Features Patents on 2FA with Protocol level decoding
Direct integration of 2FA with – SAP / ERP Mail servers – Microsoft Exchange,
OCMS, IBM Lotus Nodes, Zimbra etc VPN Database Queries Web Applications etc
Customized products focused on technology immersion in clients
Contd.
Private and Confidential
Private and Confidential
Contd.
Private and Confidential
Some of our Government Clients
Delhi Police
Ministry of Home AffairsIndian Army
Ministry of Defense
National Investigation Agency
AP Police
UP Police
National Technical Research Organization
Chandigarh Police
Private and Confidential
Some of our Corporate and PSU’s Clients
Private and Confidential
GET IN TOUCH WITH US. WE’D BE HAPPY TO HELP
@ authshield2FA
+91-11-47065866/ 45272272
www.innefu.com
876, 8th Floor, Aggarwal Cyber Plaza II,Netaji Subhash Place, New Delhi, India
CONTACT US