Skip to main content

Out-of-Band (OOB) Phone Authentication for step-up authentication and authorization

Tab navigation

How OOB Phone Authentication Works?

For Login, high risk activities such as reset password, add a payee, initiate a wire transfer, 3rd party fund transfer or suspicious activities identified by Dawn InfoTek’s risk engine when an institutional policy triggers it (e.g., “Step-up authentication all transactions originating in Country X or transfer amount over a certain limit in one day). Dawn InfoTek’s OOB phone authentication is triggered to ask the customer for a step-up authentication.

Business information

Show all   |   Hide all


  • + Functional details

    To protect your customer from newly emerging attacks (MITB/MITM/Trojans) and to prevent the use of stolen identity or account credentials gained through phishing and other means, an Out-of-Band (OOB) phone authentication through a separate channel of telephone network is most effective security control method.

  • + Business problem

    To protect your customer from newly emerging attacks (MITB/MITM/Trojans) and to prevent the use of stolen account credentials gained through phishing and other means, an OOB through a separate channel of telephone network is most effective security control method. A real-time phone call provides an easy-to-use method for confirming online banking logins, reset password, online banking enrollment, high value transactions and suspicious activity.

  • + Business opportunity

    Crimeware – a term referring to a malicious program downloaded onto a user’s device by exploiting vulnerability in the user’s browser to attack the online banking system.

    Crimeware is classified as follows:

    Identity or account take over (during login)

    Fund transfer Session – hijacking

     

    Crimeware attack types:

    Session–hijacking Trojans Man-in-the-Middle attacks (MITM) or Man-in-the-Browser attacks (MITB)

    MITM or MITB attacks from malware and online banking trojans are now responsible for millions of dollars in fraudulent financial transactions each month.

  • + Return on investment

    Significant Cost Savings

    No Devices to Buy, Ship, Replace or Renew  

    Automated User Enrolment

    No certificates to install, so setup and deployment are quick and easy

    Easy integration with App via a Web Service call

    Reduced Help Desk Calls

  • + Competitive advantage

    Most Effective security control

    100% Out-of-Band Security

    Instant Fraud Alerts if the user didn't initial the transaction or login

    Real-time authentication

    Transaction Verification

    The Public Switched Telephone Network (PSTN) is a secure network

    Phone communication can occur in true real time

    The authentication process can be "closed-loop" with certainty of completion

    Superior User Experience

    No Extra Devices to Carry

    No End User Training Required

    No additional hardware, software required for the end user

    Significant Cost Savings

    No Devices to Buy, Ship, Replace or Renew

    Automated User Enrolment

    No certificates to install, so setup and deployment are quick and easy.

    Easy integration with App via a Web Service call

    Reduced Help Desk Calls

  • + Industries

    Banking Industry
       Banking - Global Customer Management
       Banking - Other
    Financial Markets Industry
       Financial Markets - Global Customer Management
       Financial Markets - Other

  • + Solution areas

    Financial Services/Banking

  • + Customer size

    Midmarket Business (100 to 499 employees)
    Midmarket Business (500 to 1000 employees)
    Large Business (greater than 1000 employees)

  • + Languages supported

    Chinese (Simplified)
    English
    French

  • + Countries/regions available for distribution

    Canada

Technical information

Show all   |   Hide all


  • + Hardware/OS platforms

    • + Operating systems

      AIX family
         AIX 5
            AIX 5.2
            AIX 5.3
         AIX 6
            AIX 6.1
         AIX 7
            AIX 7.1
      UNIX family
         HP family
            HP-UX

  • + Services

    IBM Application Security Services
    IBM Cloud security consulting – Cloud security assessment
    IBM Cloud security consulting – Cloud security strategy roadmap

  • + Software

    IBM WebSphere
       WebSphere
          WebSphere Application Server
          WebSphere Application Server - Express
          WebSphere Application Server Network Deployment
          WebSphere Application Server v7 Feature Pack for Modern Batch

  • + Storage devices

    Network Attached Storage
       IBM System Storage N series


Date last modified:    Apr 11, 2013


dawn_logo_small.gif

Contact information

Mark Chen
416-807-9828 EXT 8000

Company

Dawn InfoTek Inc.
200 Consumers Road, Suite 302
Toronto, Ontario M2J 4R4
Canada

+1 416 4168079828

Contact PartnerWorld

Live Chat is currently unavailable


The live chat service is normally available weekdays 8am-8pm Eastern Time. Use the 'Contact us' link or one of the other links for help now.