advertisement

Get Access Case Study

33 %
67 %
advertisement
Information about Get Access Case Study
Technology

Published on February 4, 2009

Author: mmmmmrob

Source: slideshare.net

advertisement

 

What’s Today About? What is egg? The egg Internet architecture. The egg security capability. How getAccess delivers that for us. Egg and getAccess today.

What is egg?

The egg Internet architecture.

The egg security capability.

How getAccess delivers that for us.

Egg and getAccess today.

 

What Is Egg? Egg is the UK's leading online financial services brand. Egg is 80 percent owned by Prudential plc and was launched in October 1998. Egg targets the requirements of three key demographic groups totalling about 30% of the UK population: Young professionals, Affluent elderly of retirement or near-retirement age, Busy younger members of the work force.

Egg is the UK's leading online financial services brand.

Egg is 80 percent owned by Prudential plc and was launched in October 1998.

Egg targets the requirements of three key demographic groups totalling about 30% of the UK population:

Young professionals,

Affluent elderly of retirement or near-retirement age,

Busy younger members of the work force.

What Is Egg? The new direct venture initially offered savings accounts, residential mortgages and consumer loans at attractive rates. Within 6 months of launch, egg had met its 5-year goal for savings deposits of £5 billion and had more than 500,000 customers. Within 12 months, egg had £6.7 billion in savings deposits and more than 600,000 customers: 30 percent of customers using online banking services. 44 per cent shopping online through the egg portal.

The new direct venture initially offered savings accounts, residential mortgages and consumer loans at attractive rates.

Within 6 months of launch, egg had met its 5-year goal for savings deposits of £5 billion and had more than 500,000 customers.

Within 12 months, egg had £6.7 billion in savings deposits and more than 600,000 customers:

30 percent of customers using online banking services.

44 per cent shopping online through the egg portal.

 

 

 

 

Security in Four Parts. Network security. Well understood, many products available. Privacy. Well understood, well abstracted, provided by SSL. Application security. Well understood, relies on good development process. Authentication. Inconsistent standards, inconsistently applied.

Network security.

Well understood, many products available.

Privacy.

Well understood, well abstracted, provided by SSL.

Application security.

Well understood, relies on good development process.

Authentication.

Inconsistent standards, inconsistently applied.

Conventional Wisdom. Depends on the client. Depends on the service. Permeates the whole architecture. Included as a call to a security function.

Depends on the client.

Depends on the service.

Permeates the whole architecture.

Included as a call to a security function.

 

 

 

What Are The Requirements? Secure. Flexible. Auditable. Open. Financially viable. Scalable. Available. Robust. Performant. Continuous.

Secure.

Flexible.

Auditable.

Open.

Financially viable.

Scalable.

Available.

Robust.

Performant.

Continuous.

Secure, As a Requirement. Establishes an agreed level of trust in an identity. Cannot be evaded, by users, by developers, by mistake. Allows rapid repair of holes, when discovered.

Establishes an agreed level of trust in an identity.

Cannot be evaded, by users, by developers, by mistake.

Allows rapid repair of holes, when discovered.

Flexible, As a Requirement. Protects different types of service. Protects different types of access device. Capable of different methods of authentication. Extensible to cover new methods of authentication.

Protects different types of service.

Protects different types of access device.

Capable of different methods of authentication.

Extensible to cover new methods of authentication.

Auditable, As a Requirement. Public companies get audited. Audits drain resource that could be driving your business forward. Audits should be quick, easy and cheap.

Public companies get audited.

Audits drain resource that could be driving your business forward.

Audits should be quick, easy and cheap.

Open, As a Requirement. Able to integrate with other components: Presentation of screens, Vignette StoryServer. Consistent management of screen elements across all screens. Management of offers and other information on authentication screens. BEA TopEnd and Oracle for authentication. Use of existing customer security data for authentication. Use of existing platforms keeps cost down.

Able to integrate with other components:

Presentation of screens, Vignette StoryServer.

Consistent management of screen elements across all screens.

Management of offers and other information on authentication screens.

BEA TopEnd and Oracle for authentication.

Use of existing customer security data for authentication.

Use of existing platforms keeps cost down.

Financially Viable. Exponential cost models must be avoided. Minimal impact on design, development and operation. Reasonable installation and licensing costs. Cost-effective ongoing administration.

Exponential cost models must be avoided.

Minimal impact on design, development and operation.

Reasonable installation and licensing costs.

Cost-effective ongoing administration.

 

What Are The Requirements? Secure. Flexible. Auditable. Open. Financially viable. Scalable. Available. Robust. Performant. Continuous.

Secure.

Flexible.

Auditable.

Open.

Financially viable.

Scalable.

Available.

Robust.

Performant.

Continuous.

 

 

 

What Are The Requirements? Secure. Flexible. Auditable. Open. Financially viable. Scalable. Available. Robust. Performant. Continuous.

Secure.

Flexible.

Auditable.

Open.

Financially viable.

Scalable.

Available.

Robust.

Performant.

Continuous.

Importantly, It Does It Cheaper. The Gatekeeper Model saves money: In Design. In Build. In Test. In Delivery. In Operation. In Quality Review.

The Gatekeeper Model saves money:

In Design.

In Build.

In Test.

In Delivery.

In Operation.

In Quality Review.

Importantly, It Does It Cheaper. Abstracting authentication from the application code allows it to be tested once, regardless of the number of services. “We did it once, now we’ve re-used it over 1,000 times across 18 products” Iain Hunneybell, Head of System Architecture, egg.

Abstracting authentication from the application code allows it to be tested once, regardless of the number of services.

“We did it once, now we’ve re-used it over 1,000 times across 18 products” Iain Hunneybell, Head of System Architecture, egg.

Importantly, It Does It Cheaper. Audit changes from a full code review of all services, requiring developers or analysts with a detailed understanding of the possible loopholes or issues, to a simple check of a single list of those resources that are protected.

Audit changes from a full code review of all services, requiring developers or analysts with a detailed understanding of the possible loopholes or issues, to a simple check of a single list of those resources that are protected.

Importantly, It Does It Cheaper. Removing the burden of authentication from developers frees up around 10% additional resource. Eliminating the need for developers to understand authentication reduces the training required and the level of skill.

Removing the burden of authentication from developers frees up around 10% additional resource.

Eliminating the need for developers to understand authentication reduces the training required and the level of skill.

 

We Chose Entrust Because... We liked their attitude. The price was reasonable. We liked the product. They had a UK presence. And...

We liked their attitude.

The price was reasonable.

We liked the product.

They had a UK presence.

And...

We Chose Entrust Because... We were confident they could deliver: Security was a key component for egg card. Egg was the first financial institution to launch a credit card with special features for internet-based e-commerce - and the acceptance rate for that card ranks first amongst all credit card introductions. We now have over 1.3 million customers .

We were confident they could deliver:

Security was a key component for egg card.

Egg was the first financial institution to launch a credit card with special features for internet-based e-commerce - and the acceptance rate for that card ranks first amongst all credit card introductions.

We now have over 1.3 million customers .

 

 

Multi-Channel We now have getAccess protecting resources across 3 channels: Web. WAP. iDTV. getAccess protects services both at egg and at our partner organisations.

We now have getAccess protecting resources across 3 channels:

Web.

WAP.

iDTV.

getAccess protects services both at egg and at our partner organisations.

 

All in All... We chose getAccess for it’s concept model and entrust for their staff. We’re impressed with: The product. The flexibility. The scalability. The staff.

We chose getAccess for it’s concept model and entrust for their staff.

We’re impressed with:

The product.

The flexibility.

The scalability.

The staff.

 

 

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Where can I get access to Harvard Business School case ...

How do I find business school case studies (like from Harvard Business School) for my research?
Read more

Q. How do I get access to business case studies? - Quick ...

How do I get access to business case studies? Ask another question. Search. Browse: All; Topics . 12 Banking; 8 Bonds; 7 Careers; 50 Companies; 41 ...
Read more

FAQ+Answers: Where do I get access to case studies?

If the case is a part of your coursework, check Study.Net for your course/instructor. You can order a case study for a fee directly from Harvard Business ...
Read more

Is it possible for me to get cheaper access Case Studies ...

Harvard Business School: Can we get the case studies of HBR for free anywhere? At least the best ones?
Read more

Get Access To Real World Visual Model Case Studies and ...

Along with the 16-page Visual Modeling Guidebook walking you through how to use visual models to speed up your requirements process, you’ll receive an ...
Read more

Is there a way to get access to just a case study from a ...

Best Answer: I could not find an on line copy of the book or the case study./ You may want to try a local library. If not explain the problem to ...
Read more

Case Study #1 Acne Treatment - ezSEO Customer Site

Case Study #1 – Acne Treatment For this case study, I took the search phrase “acne treatment” and searched Google.
Read more

Access Services - Access Services - Case Western Reserve ...

Pay Parking Violation Online. Access Services makes it easy to pay parking violations online. Pay Here >
Read more

Free cases | The Case Centre, for educators

Overview of the collections of free cases available from The Case ... Legatum Center case studies illuminate the thought processes of entrepreneurs, ...
Read more

Teaching Materials Using Case Studies • Guides to ...

Teaching Materials Using Case Studies by Claire Davis and Elizabeth Wilcock. A booklet in the 12 Guides to Lecturers series published by the UK Centre for ...
Read more