CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES

Size: px
Start display at page:

Download "CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES"

Transcription

1 CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES Nicholas Roy Penn State (Pennsylvania State University, The) Andrea Harrington Penn State (Pennsylvania State University, The) Michael Corn Brandeis University Tom McMahon - Weill Cornell Medical College David Bantz University of Alaska Fairbanks 2015 Internet2

2 What is the NET+ Security and Identity Portfolio A partnership focused on the needs of the broad higher educa3on community: Internet2's Trust and Identity team will focus on the federation and the TIER program NET+ Security and Identity portfolio will be the delivery mechanism for security and identity services. This alignment also reflects the linkages between identity and security within the higher education community and the affinities between some of these services, such as two-factor authentication and electronic signature solutions that are important to campus security and identity initiatives. Realigning the NET+ service portfolios is the first step in expanding engagement with security service providers and the higher education information security community. [ 2 ]

3 Penn State Identity Services Two-Factor (2FA) Duo Security Service

4 My Role Technical Director for Penn State Identity Services Responsibilities include managing: Software development (Central Person Registry) Systems management (~135 Linux VMs CPR, AMQ, LDAP, Shibboleth IdP, Web Services, Web Apps, etc.) Database Systems (Oracle RAC) All highly sensitive, all now required to be protected by 2FA

5 How We Got There With Duo Summer 13 Project Kickoff 50 stakeholders across PSU IT Common requirements Many off-the-shelf integrations Accessible Smartphone, dumbphone, hardware tokens Nervousness about cloud

6 Choosing Duo Completed a marketplace analysis Compiled requirements and analysis into assessment matrix At the time, only Duo met all requirements Rollout at scale has been highly successful

7 A Tidbit about Splunk> In the process of buying a Splunk license Will push person identifiers into security log streams and vice versa Hope to correlate IDS events with Duo fraud alerts

8 Deployment Strategy Users are required to have a Penn State Access Account Funding Central IT covers funding for licensing and telephony credits Departments cover funding for hardware tokens Project Sponsorship by the Risk Management Office and Information Technology Services (ITS) Team comprised of Identity Services (IdS) and Security Operations and Services (SOS)

9 Deployment Strategy Policy Making the case for a central 2FA service Data Categorization Public, Internal/Controlled, Restricted Minimum Security Baseline Internal/Controlled data should implement 2FA authentication as soon as feasible Restricted data must use 2FA authentication Pilots Identity Services and Security Office October January Campus Health Center (University Park) November February enrolled 8 users Talisma CRM for Student Recruitment May - June enrolled 300+ users Hershey Medical Center for Remote Access June - August enrolled 6,000+ users Systems for System Administrators August March

10 Deployment Strategy Service Development Duo role-based Administrative Console In-house development of a Self-Service Portal for user enrollment and management of devices (includes hardware tokens) Penn State Single Sign-On Authentication (WebAccess) integration with Duo 2FA service Other major integrations with Duo 2FA service (Unix, Windows, ) Content/Marketing/Communications Web site service information Engaged central IT Communications Information postcards Enrollment video News releases for University online publications and messaging

11 Deployment Strategy Service Desk Training service desk staff (Duo Administrative Console, Portal, Service) Training Services Training the Trainers Outreach Dozens of meetings with departments sharing information about the service Presentations through University forums

12 Duo Stats Integrations - configured 275 as of April 13, 2015 Users - enrolled 9,117 Hardware Devices - registered to users 545 Phones - 10,372 ( ios 5,371, Android 2,412, Landline 1,488, ) Total Devices - registered to users 10,917

13 Brandeis University Library and Technology Services Skyhigh

14 Skyhigh Networks Three facets: Discover, Analyze, Secure Focusing on Discover and Analyze Deployed Log Processor 9 weeks ago Began subnet tagging Friday Sending logs from our border Palo Alto firewalls/ips Encrypting IP info

15 Requires stepping back and thinking about service usage policy Where on your network can you ask this question? What do you need to know to have this conversation? Where you can t act, you can educate Library and Technology

16 Weill Cornell Medical College Duo and Splunk

17 Two Factor Replacement Duo Security

18 Our Problems Password are no longer considered adequate to prevent fraudulent or unauthorized access User accounts are susceptible to phishing attack, malware infections and password guessing attacks WCMC VPN and accounts have been compromised User acceptance of legacy 2FA system is low Deadline to meet NYS and DEA requirements for EPCS Password resets workflow is ineffective Our legacy two-factor authentication system, software and appliances where EOL

19 Why Duo Met most use cases and features in our requirements matrix Duo Push and similar user experience as Google Authenticator (OATH) 5 year TCO $25k Others where $225k and $150k Single non-intrusive option for accessing all of ITS systems with flexibility for other systems Free integrations and full API s to support other integrations Support of Android, ios, WinMobile, and other factor forms such as Tokens and SMS A solution that will not aggravate our users

20 Duo Multi-factor Roadmap Pilot Phase April Sept Users ITS Administrative Systems Decommission and ITS Deployment Phase Sept Dec 2014 Removal of all RSA agents Shutdown of RSA SecurID System ITS Administrative Systems User Systems Phase 1 Dec April Users 2FA Verification Implementation into HIPM Deployment into Remote access systems EPCS Phase Feb Nov Users EPIC Electronic Prescription of Controlled Substances functionality User Systems Phase 2 April Oct Users Implementation to CMS and Web systems Deployment into SSO solutions SAP User (WBG) Future Concepts EPIC MyChart Integration EPIC Login SAP Administrative

21 SIEM Replacement Splunk

22 Our Problems Legacy SIEM deployment was 7 years old and at capacity and system issues make it challenging to fulfill some audit requests Vendor was purchased by a large company and support became unsatisfactory Legacy platform had limitations to data ingest and normalization Use cases needed to be updated to reflect new security challenges

23 Why Splunk? Met all use cases and features in our requirements matrix Splunk Apps, flexibility and ecosystem allows for fast and cheap deployment of integrations Data Normalization is at Read vs. Write Creating/Customizing parsers where much easier then other platforms Enterprise Security gave us functionality that a SIEM could not Distributed architecture lets it scale horizontally easily and increase as you go

24 Splunk Post Deployment Went live in October Changed metrics reporting to real-time from monthly Other ITS and college groups are approaching Security about utilizing Splunk Now implementing Splunk for all operational monitoring Increased our license from 100gb to 300gb within 6 months Increasing our Splunk infrastructure within 9 months

25 U Alaska integrated 2FA from DuoSecurity in its Shibboleth IdP [ 25 ] 2015 Internet2

26 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Pilot as opt-in to gain acceptance Service opt in to require for authn Individuals opt in to require with their ID Opt in to facilitate phase in Required use anticipated only for key secure services [ 26 ] 2015 Internet2

27 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Multi-Context Broker key to pilot Services opt in by specifying an authn context Individuals opt in based on a Directory attribute (group membership) Thanks to InCommon Assurance Program, Scalable Privacy Project [ 27 ] 2015 Internet2

28 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo Security 2FA Net+ and existing integrations with Shibboleth Duo Java Repository Wide range of additional integrations supported (Unix, VPN ) Robust array of 2FA supported, including out-of-band App SMS OTCs [ 28 ] Phone 2015 Internet2

29 Duo 2FA in combination with initial username/password Thanks David Langenberg, U Chicago: Several Integration steps set up Duo account build & install duo java jar build & install a login handler (thanks David Langenberg, U Chicago) customize the login pages enable logging for testing [ 29 ] 2015 Internet2

30 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA w/ initial username/password (1/3) [ 30 ] 2015 Internet2

31 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA w/ initial username/password (2/3) [ 31 ] 2015 Internet2

32 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA w/ initial username/password (3/3) [ 32 ] 2015 Internet2

33 Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA in combination with initial username/password in production for several months - Pretty much bullet proof, but still small pilot - Political and financial factors remain to enable wide deployment [ 33 ] 2015 Internet2

34 U Alaska Pilot of Two-factor AuthN in institutional SSO [ 34 ] 2015 Internet2

35 Questions?

36 PRESENTATION TITLE Presenter name Presenter title, organization 2014 Internet2

Are Passwords Passé?

Are Passwords Passé? Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon

More information

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Integrating Multi-Factor Authentication into Your Campus Identity Management System Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Multi-Factor Authentication, Assurance, and the Multi-Context Broker Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago David Walker,

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Securing Physician and Patient Portals for HIPAA Compliance

Securing Physician and Patient Portals for HIPAA Compliance Securing Physician and Patient Portals for HIPAA Compliance HIPAA Summit VIII Session 2.04 1:00 2:00 pm March 8 1 Agenda Identity and Access Management Technology and HIPAA Requirements Bob Tahmaseb, Principal

More information

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition Find out what organizations need to know to compare two-factor vendors and check

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

Identity Assurance Framework

Identity Assurance Framework Executive Summary Assurance of a user s identity in an electronic system is required for many University business processes to function efficiently and effectively. As the risk associated with an electronic

More information

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management

More information

Evolving Strong Authentication at The University of Arizona

Evolving Strong Authentication at The University of Arizona Evolving Strong Authentication at The University of Arizona Gary Windham Senior Enterprise Systems Architect The University of Arizona, UITS gary.windham@arizona.edu Where are we today? credential strength

More information

Multi- factor Authentication Initiative

Multi- factor Authentication Initiative Multi- factor Authentication Initiative "UCR s Multi- factor Authentication Initiative is an easy- to- use solution to our need to secure our campus community s credentials. The Duo Security system that

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to: Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Multi-Factor Authentication: All in This Together

Multi-Factor Authentication: All in This Together Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,

More information

Request for Proposals. Statewide Two Factor Authentication Solution. Addendum #2 October 5, 2012. Questions and Responses

Request for Proposals. Statewide Two Factor Authentication Solution. Addendum #2 October 5, 2012. Questions and Responses Request for Proposals Statewide Two Factor Authentication Solution Addendum #2 October 5, 2012 Questions and Responses NOTE: NYeC responses to the questions are in red. Licensing Entity 1. Will the Licensing

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

CommIT: Simplifying Admissions Identity Management

CommIT: Simplifying Admissions Identity Management CommIT: Simplifying Admissions Identity Management IAM Online August 14, 2013 Speaker: Charlie Leonhardt, Georgetown University Moderator: Rodney Petersen, Senior Government Relations Officer and Managing

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department jmikhael@masdar.ac.ae Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation

More information

Enterprise Mobility Management for Financial Sector

Enterprise Mobility Management for Financial Sector Enterprise Mobility Management for Financial Sector Conferința Ziarul Financiar: Scurgeri de informații, furt de date confidențiale, hackeri. Pot fi o realitate? Principalele riscuri de securitate și strategii

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

How To Be Successful At Workday

How To Be Successful At Workday VMware Global HR Application in the Cloud March 2012 VMware HR System Replacement: Key Drivers for Change HR systems footprint was not optimized or scalable to support VMware s growth. Original core HR

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Application Security Made in Switzerland

Application Security Made in Switzerland Application Security Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Michael Palladino June 20, 2011

Michael Palladino June 20, 2011 Michael Palladino June 20, 2011 1 Upcoming Meetings July 11 August 15 September 19 October 17 November 7 (Final Rate Setting) All meetings in 337A from 1:30-3:00pm 2 Agenda Two-factor authentication report

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing

More information

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering Top Five Security Must-Haves for Office 365 Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering Today s Agenda Introductions & Company Overview Cloud App Trends, Risks

More information

Box: Redefining Security for the Cloud

Box: Redefining Security for the Cloud Box: Redefining Security for the Cloud Securing Content: The Core Currency of Your Business We know that your content is the core currency of your business. Product requirements, detailed financial analysis,

More information

MobileIron Product Packaging

MobileIron Product Packaging MobileIron Product Packaging The MobileIron Enterprise Mobility Management [EMM] Solution is a purpose-built mobile IT platform. It provides users with seamless access to the business processes and content

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville

More information

Initial DUO 2 Factor Setup, Install, Login and Verification

Initial DUO 2 Factor Setup, Install, Login and Verification Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

IAMUCLA 2.0 SSO Updates

IAMUCLA 2.0 SSO Updates IAMUCLA 2.0 SSO Updates Common Systems Group Meeting July 27, 2015 IAMUCLA 2.0 Projects Password Security Concerns Technology Evolution Health Systems SSO Support Departmental/Service Accounts Testing

More information

Clavister InSight TM. Protecting Values

Clavister InSight TM. Protecting Values Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Architecture, Implementations, Integrations, and Technical Overview

Architecture, Implementations, Integrations, and Technical Overview Architecture, Implementations, Integrations, and Technical Overview Introduction System Architecture & Infrastructure Implementation Parent Portal Medical Center Strategy Integrations SIS Immunization

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

How To Comply With Ffiec

How To Comply With Ffiec SOLUTION BRIEF authentication in the internet banking environment: The solution for FFIEC compliance from CA Technologies agility made possible Introduction to FFIEC Compliance In October of 2005, the

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

Drawbacks to Traditional Approaches When Securing Cloud Environments

Drawbacks to Traditional Approaches When Securing Cloud Environments WHITE PAPER Drawbacks to Traditional Approaches When Securing Cloud Environments Drawbacks to Traditional Approaches When Securing Cloud Environments Exec Summary Exec Summary Securing the VMware vsphere

More information

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

Identity in the Cloud

Identity in the Cloud White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4

More information

Frequently asked questions

Frequently asked questions Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Secure Access Control for Mobile, Cloud, and Web Apps

Secure Access Control for Mobile, Cloud, and Web Apps Secure Access Control for Mobile, Cloud, and Web Apps SecureAuth IdP is a revolutionary platform that provides flexible and secure access control through strong authentication, single sign-on, and user

More information

Axway API Portal. Putting APIs first for your developer ecosystem

Axway API Portal. Putting APIs first for your developer ecosystem Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Facebook s Security Philosophy, and how Duo helps.

Facebook s Security Philosophy, and how Duo helps. Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated. Chapter 87 Configuring Smartsheet The following is an overview of the steps required to configure the Smartsheet Web application for single sign-on (SSO) via SAML. Smartsheet offers both IdP-initiated

More information

Three Campus Case Studies: Managing Access with Grouper

Three Campus Case Studies: Managing Access with Grouper Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul

More information

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

The Cloud, Mobile and BYOD Security Opportunity with SurePassID The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,

More information

Casper Suite. Security Overview

Casper Suite. Security Overview Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information