Risk Based Authentication and AM 8. What you need to know!
|
|
- Dortha Tate
- 8 years ago
- Views:
Transcription
1 Risk Based Authentication and AM 8 What you need to know!
2 Agenda Authentication Manager 8 Customer Use Cases Risk Based Authentication (RBA) RBA Integration and Deployment 2
3 SecurID / Authentication Manager 8 AM8 Compelling New Features Risk-Based Authentication lowers authentication costs Virtualization better control at lower cost; Mix & Match between Virtual and/or Physical Appliance Self Service & Admin Dashboards lowers TCO Software Token Provisioning improves by 57% Proven High Quality Release AM Prime Suite Advanced Token Lifecycle Management Solutions Archer Focused Solutions (Reporting) Software Token 2.0 Improves User Experience AM8.0 (Virtual Appliance) GA in Mar 2013 AM 8.1 (Hardware Appliance) GA in Dec
4 The Clock is Ticking A Few Months Left Until End of Primary Support (EOPS) AM 6.1 EOPS Dec 2014 No extensions Can migrate directly to 8.x No Appliance migration AM 7.1 EOPS Dec 2014 No extensions Some Appliances may migrate For Migration Resources, visit 4
5 Risk Based Authentication 5
6 Diverse User Populations Require Choice Employees, Temps, Contractors, Partners, Clients, Customers, Auditors, Remote Workers Convenience & Cost Security & Flexibility Risk-Based Analytics Tokenless Software Tokens Hardware Tokens Passwords On-Demand PC / Web Browser Mobile Embedded Solutions Fob / Card Token Hybrid Smart Card 6
7 RBA Use Case: Web-Based Remote Access For Employees, Contractors, Partners and Clients SSL VPN Web Portals OWA SharePoint Employee Mobility SSL VPN and web-based for employees & contractors Enterprise Web Portal Web Portals for Employee, Contractor or Customer Services Manufacturing Supply Chain Order Management System hosted by XenApp Professional Services Exchange of sensitive information with clients using an online portal Healthcare Health Clinics eliminating the token necklace for medical staff Employees & Contractors Partners & Vendors Clients 7
8 AM8 RBA Customer Implementation Large Global Media & Marketing Conglomerate with diverse portfolio of broadcast, digital, mobile and publishing companies Problem Solution Management of digital certificate environment for authentication is time consuming, tedious and costly Difficulty meeting PCI Compliance Increased risk to the business with potential outages and breaches VPN access is single factor into corporate network High Management and Maintenance Costs AM8, 15,000 RBA/ODA Licenses & 15,000 Software Tokens for multifactor strong authentication, reduced management & administration costs Easily achieves PCI Compliance Strengthens access to sensitive applications with strong authentication for all users (VPN and ODA) 7x24 availability via multiple replicas RBA delivers multi-factor authentication, no impact to user experience & lowers costs; Software tokens meet strong 2-factor authentication requirement for non-web based applications Dramatically lowers TCO 8
9 AM8 RBA Customer Implementation Problem Large North American City Municipality (Population = 1 Million+) Access to HR portal access from internal corporate network only Rising help desk costs associated with employees losing tokens, re-issuing tokens Cost of issuing tokens to employees who only require occasional access Network utilization, efficiency and negative experience of dual authentication for an increasing population of remote users accessing HR portal indirectly via VPN from home office with a token. Solution Upgrade from AM7.1 to AM 8 Virtual Appliance with Web Tiers, Self Service Console significantly lowered deployment, maintenance, Help Desk costs Deployed 18,000 RBA licenses; RBA licenses do not expire and can easily be re-provisioned in AM 8 HR portal access from anywhere using RBA has streamlined operations, lowered cost and improved user experience. Tokens moving forward will only be given to users who have access to critical assets other than their own HR portal. 9
10 The AM8 RSA Risk Engine Based on Adaptive Authentication Risk Engine Industry most proven & sophisticated risk engine Protects 400+ million online identities over last decade Network Security vs. fraud mitigation Predictable results vs. challenge rate Assurance levels vs. risk scoring Simple Deployment vs. customization Optimized for Enterprise Use Cases RSA Risk Engine Self Tuning Risk Model Adapts to Customer Environment Common device characteristics de-prioritized in risk score Suspicious behavior based on norms for overall user population 10
11 Risk-Based Authentication Strengthens Traditional Password Authentication By Silently Applying Risk-based Analytics Device Identification User Behavior Device Fingerprint Network Forensics Device Token Profile Relative Velocity Web Browser SSL VPN Web Portals Activity Details Assurance Level Authentication Policy PASS RISKY Protected Resources OWA RSA Risk Engine Identity Challenge PASS? FAIL SharePoint On-Demand Tokencode Challenge Questions 11
12 Risk Assessment Device Identification Analyzes Detailed Hardware & Software Characteristics of Each Device Device FingerPrint: Collects & evaluates multiple facts about user device such as User Agent String, System Display, Software Fingerprint, Time Zone, Languages, Enabled Cookies and Enabled for Java Behavior Analysis Assesses Impact of Behavior Anomalies Based on Frequency and Recentness Profile Anomalies: Assesses Recent changes to user profile such as password or account changes Increases Network Forensics: Matches device IP configuration Assurance to previously registered IP addresses for user device; DHCP receives partial credit based on strength of match Device Token: Identifies device using a combination of anti-theft protected Cookies & Flash Shared Objects (FSO s) to prevent impersonation & future identification & ensure unique match; Without Device Tokens, strength of match determined by statistical probability Decreases Comparative Anomalies: Compare behavior patterns and assesses behavior anomalies Assurance such as new or infrequently used IP address Velocity Anomalies: Compares the number of occurrence within a specified period of time (velocity) of a user vs. user population Risk Engine automatically updates scoring algorithm based on statistical probability of certain characteristics within each unique deployment 12
13 Assurance Levels Assurance Level 4 Pre-defined Levels defined by Policy Description Degree of confidence of each user authentication attempt Use Case Minimum assurance required to authenticate without challenge; High Medium-High* Medium Low BEST for protecting sensitive assets when higher challenge rates are acceptable VERY GOOD for protecting sensitive assets when higher challenge rates not acceptable GOOD when a balance between protection and end user convenience is required Use with least sensitive assets & for end user convenience Authentication from easily-identifiable or corporate-owned assets (e.g. employee laptop) Authenticate from same location (e.g. branch or home office) Authentication from corporate & individual-owned assets when policy can be dictated (e.g. cookies must be enabled). Laptop users that frequently authenticate while traveling Authentication from uncontrolled, non-managed assets (e.g., a personal laptop or home PC) When corporate policy cannot be enforced or when tracking objects (e.g., cookies or FSO) cannot be reliably used Minimum device assurance while challenging users primarily based on suspicious behavior * RSA Recommended 13
14 Device & Behavior Impact on Assurance Device Matching Technique Match based on two or more uniquely identifying elements & statistical data Match based on one uniquely identifying element plus statistical data Match based on one uniquely identifying element Device ID Match Strong Behavioral Analysis Risk Low High HIGH HIGH MED-HIGH VERY LOW MED-HIGH MEDIUM LOW VERY LOW MEDIUM MEDIUM LOW VERY LOW Match based on statistical data VERY LOW VERY LOW VERY LOW VERY LOW Weak Unrecognized / unbound device VERY LOW VERY LOW VERY LOW VERY LOW Assurance Levels Adjusted for Behavioral Risk 14
15 Integration & Deployment 15
16 End User On-Boarding Per User by Security Domain Silent Collection Engine is passive Period of passivity is configurable (14 Days is Recommended) User browser session information collected during authentication Once assurance reached user prompted in-line for step up challenge* Self-Service Console User login to Self-Service Console User enters step-up challenge based on policy (Life Questions or On Demand) RBA is active immediately No history * If user does not enter Step-Up Information they will not be able to authenticate 16
17 Risk-Based Authentication Flow Internet Connect to SSL-VPN Login Page (Custom RBA script) DMZ SSL-VPN SecurID Web Agent Access Granted Validate artifact using SecurID APIs Intranet Protected Resources RBA integration script redirects to AM web tier SSC CTKIP RBA AM Web Tier Create auth artifact Return to SSL VPN AM Appliance Authenticate user Risk Assessment (challenge if necessary) 17
18 Certified RBA Integrations 18
19 RSA Authentication Risk Analytics and Intelligence AM8 Risk Based Authentication Adaptive Authentication Target Market Enterprise Web Based Applications Enterprise / Consumer Portals Risk Engine Tuned for Predictable results Tuned for Predictable challenge rates Deployment Size Small to Medium - Up to 20,000 users Medium to Large - 10,000+ users Integration Plug-and-Play PS Engagement Administration Policy Management Devices Features Self-tuning risk engine requires little administration Simplified policy management with pre-defined assurance levels Risk engine optimization specific to SecurID Supports SecurID, ODA authentication methods Case management allows for manual tuning by advanced administrators Advanced policy management allows custom weighting of additional risk factors Risk engine optimizations specific to mobile devices Supports advanced behavioral analytics: efn, IP Geo, anti-trojan 19
20 AM8 and Risk Based Authentication Summary Optimized for Enterprise Use Cases Expands the Use of Strong Authentication for Cost Sensitive Web Applications and Provides User Convenience Low Cost Alternative for Hardware Authenticators Simple Plug & Play Deployment Combo License includes RBA & On-Demand Authentication (ODA) No Expiration No Tokens to Purchase or Renew or Re-provision Self Tuning Risk Model Adapts to Customer Environment 20
21 THANK YOU
22 Common Device Identification Values Category Attribute Description Token Attributes Cookie Valid browser cookie is present Flash Valid flash cookie is present Invalid_cookie Cookie is invalid, expired, or does not match host machine Invalid_flash Invalid, expired or non-match Flash shared object (FSO) present on host machine No_device_matched Device not previously registered for this user Network Attributes IP Matches previously known IP address for device classc Matches previously known Class C subnet for device classb Matches previously known Class B subnet for device classa Matches previously known Class A subnet for this device Device Fingerprint software Software fingerprint based on installed browser plug-ins usragent User Agent String match browser Browser version match display Resolution (width/height) & color depth of the device s display httpacceptlang Accept Language String (from the HTTP header) userlang User Language Preferences systemlang System Language Settings browserlang Browser Language Settings timezone System Time Zone Settings 22
23 Common Behavioral Anomaly Events Category Anomaly Description Profile Anomalies dscpassw The user s password was recently changed or reset Velocity Anomalies (IP address) Velocity Anomalies (Users) dscaddr dsc dscphone dscchallengemethod dscsecretquestion dscprofile dsccleardev numclassbusr10d numclassbusr30d ipage iplasthit ipauth numusrsip10m numusrsip1h numusrsip1d numusrsdev10m numusrsdev1h numusrsdev1d The user s address was recently updated The user s address was recently updated The user s phone number was recently updated The user s challenge method was recently changed The user s security questions were recently updated Multiple elements of the user s account were recently changed or updated The user s device history was recently cleared High number of IP (class B) addresses for this user in the last 10 days High number of IP (class B) addresses for this user in the last 30 days Length of time since this IP address was first recorded Length of time since this IP address was last used Recent Identity Confirmation attempts from this IP address were unsuccessful High rate of users authenticating from the same IP address over the last 10 minutes High rate of users authenticating from the same IP address over the last hour High rate of users authenticating from the same IP address over the last day High rate of users authenticating from the same device over the last 10 minutes High rate of users authenticating from the same device over the last hour High rate of users authenticating from the same device over the last day 23
RSA AUTHENTICATION. 20 Settembre, Jesi - SICUREZZA ICT SOIEL. Copyright 2011 EMC Corporation. All rights reserved.
RSA AUTHENTICATION MANAGER EXPRESS Multi-factor Authentication for the Small to Mid-Sized Organization 20 Settembre, Jesi - SICUREZZA ICT SOIEL Massimo Carlotti COMPUTERLINKS Systems Engineer 1 Agenda
More informationAn Introduction to RSA Authentication Manager Express. Helmut Wahrmann helmut.wahrmann@rsa.com
An Introduction to RSA Authentication Manager Express Helmut Wahrmann helmut.wahrmann@rsa.com Authentication Landscape Agenda Solution Details Business Value Opportunity DEMO Authentication Market by the
More informationMigrating to RSA Authentication Manager Version 8.1
Migrating to RSA Authentication Manager Version 8.1 2014 EMC Corporation All Rights Reserved Rev. P3 1 Why Migrate to AM 8.1? Solid, quality release puts your authentication platform on excellent footing
More informationRSA Authentication Manager 8.1 Planning Guide. Revision 1
RSA Authentication Manager 8.1 Planning Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks
More informationRSA Authentication Manager 8.1 Help Desk Administrator s Guide
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationHow To Choose An Authentication Solution From The Rsa Decision Tree
White paper The RSA Decision Tree: Selecting the Best Solution for Your Business What is the best authentication solution for my business? This is a recurring question being asked by organizations around
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationRSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationRSA Authentication Manager 6.1 to 8.1 Migration Guide. Revision 1
RSA Authentication Manager 6.1 to 8.1 Migration Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More informationNew Brunswick Internal Services Agency. RSA Self-Service Console User Guide
New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service
More informationADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
More informationWorkspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com
More informationRSA Authentication Manager 7.1 Administrator s Guide
RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA
More informationRSA Authentication Manager 8.1 Administrator s Guide
RSA Authentication Manager 8.1 Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks
More informationRSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2
RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationRSA Authentication Manager 8.1 Administrator s Guide. Revision 1
RSA Authentication Manager 8.1 Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationIMS Health Secure Outlook Web Access Portal. Quick Setup
IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred
More informationBalancing risk, cost and user experience with SMS for 2FA
Balancing risk, cost and user experience with SMS for 2FA MessageMedia Industry Intelligence Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email vs. SMS for
More informationWhy SMS for 2FA? MessageMedia Industry Intelligence
Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email
More informationWhite Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
More information1 Hitachi ID Password Manager
1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated Credential Management for Users: Passwords, encryption keys, tokens, smart cards and
More informationAppendix C Pricing Index DIR Contract Number DIR-TSO-2724
Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers
More informationWHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION
WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION Executive Overview The explosion of devices laptops, desktops and now the plethora of mobile devices has left enterprises
More informationAbridged. for Security Domain Administrators. IT Services Iowa State University. Jan 2015
Abridged RSA Authentication Manager 8.1 Administrator s Guide for Security Domain Administrators IT Services Iowa State University Jan 2015 Contact Information Go to the RSA corporate website for regional
More informationIntralinks Best Practices in Security: Risk-Based Multi-Factor Authentication
Intralinks Best Practices in Security: Risk-Based Multi-Factor Authentication With an increasing amount of critical information living online, risk-based multi-factor authentication has become a business
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationWhite paper. Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications
White paper Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications As the usage of online portals, SSL VPN applications, and web access management (WAM) products continue
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationRSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
More informationAllianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 29 pages Table of Contents 1. Introduction to the Remote Access Page 3 2. Overview of Outlook Web Access
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationRSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
More informationAllianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
More informationVMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
More informationAbout the white paper: The pressure to demonstrate compliance with standards and regulations such as Sarbanes Oxley, HIPAA, PCI DSS and Basel II,
TWO FACTOR AUTHENTICATION FOR THE IBM SYSTEM i WHITE PAPER MAY 2010 About the white paper: The pressure to demonstrate compliance with standards and regulations such as Sarbanes Oxley, HIPAA, PCI DSS and
More informationOracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationCisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationVidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
More informationAdaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based
More informationSecure Authentication Managed Service Portfolio
Secure Authentication Managed Service Portfolio Combating Corporate Identity Theft Signify Managed Authentication Services Signify offers a complete range of Secure Authentication and Identity Management
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationRSA SECURITY SOLUTIONS. Secure Mobile & Remote Access
RSA SECURITY SOLUTIONS Secure Mobile & Remote Access SECURE MOBILE & REMOTE ACCESS empower workforce mobility strengthen relationships & create new opportunities reduce exposure to network breaches support
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationRSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationAlex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationOut-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
More informationTwo-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
More informationMIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
More informationSecuring Remote Access in the Federal Government: Addressing the Needs for Telework and Continuity of Operations. RSA Solution Brief
RSA Solution Brief Securing Remote Access in the Federal Government: Addressing the Needs for Telework and Continuity of Operations RSA Solution Brief The Telework Improvements Act of 2009 that was introduced
More informationRSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
More informationZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER OVERVIEW OF OPEN VIRTUAL DESKTOP Mathieu SCHIRES Version: 1.0.2 Published April 9, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Terminology and
More informationSelf-Service, Anywhere
2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Mobile users warned of password expiry 2 3 Reset forgotten, cached password while away from the office 2 4 Unlock encrypted
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationOndřej Výšek Sales Lead, Microsoft MVP. vysek@kpcs.cz
Ondřej Výšek Sales Lead, Microsoft MVP vysek@kpcs.cz Azure Active Directory Features Free edition Basic edition Premium edition Directory as a service User and group management using UI or Windows PowerShell
More informationLieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012
RSA SecurID Ready Implementation Guide Last Modified: March 20 th, 2012 Partner Information Product Information Partner Name Web Site Product Name Lieberman Software Corporation www.liebsoft.com Version
More informationWHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
More informationStrong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
More informationIdentity Access Management: Beyond Convenience
Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking
More informationSSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationProtecting Microsoft Internet Information Services Web Servers with ISA Server 2004
Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents
More informationActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access
More informationEntrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant Sam.linford@entrust.
Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments Sam Linford Senior Technical Consultant Sam.linford@entrust.com Entrust is a World Leader in Identity Management and Security
More informationContextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
More informationEURECOM VPN SSL for students User s guide
EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...
More informationSecuring Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly
Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationEMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
More informationCitrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide
Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Copyright and Trademark Notices Use of the product documented herein is subject to your prior acceptance of the End
More informationVirtual Desktop and SSL VPN access with OnDemand tokencode. User Guide
Virtual Desktop and SSL VPN access with OnDemand tokencode User Guide Contents : 1. Quick Start Guide : Access to the Virtual Desktop main page 2 1.1 First authentication... 3 1.2 PIN... 4 1.3 PIN change...
More informationSoftware Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
More informationRSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationENTRUST CLOUD. SSL Digital Certificates, Discovery & Management +1-888-690-2424. entrust@entrust.com entrust.com
ENTRUST CLOUD SSL Digital Certificates, Discovery & Management +1-888-690-2424 entrust@entrust.com entrust.com Entrust Cloud SSL Digital Certificates, Discovery & Management Digital certificates have emerged
More informationTwo-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationInstalling and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
More informationChapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
More informationOracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationRisk Based Authentication in the Enterprise
Risk Based Authentication in the Enterprise ISSA Phoenix Q3 Chapter Meeting July 8 th, 2014 Rupert Scammell Principal Consultant rupert.scammell@rsa.com 1 Talking Points A quick introduction to your presenter
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationTotal Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com
Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security
More informationThank you for joining us today! The presentation will begin shortly. Thank you for your patience.
Thank you for joining us today! The presentation will begin shortly. Thank you for your patience. Copyright 2012-2015. SDNCentral LLC. All Rights Reserved September 11, 2015 Webinar Logistics Enable pop-ups
More informationAuthentication Solutions
Authentication Solutions simplicity security freedom connection and protection on the move Business is going mobile. Today s agile organisations need to give their key people access to all their information
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationExtranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
More informationPassword Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
More informationMoving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
More informationRSA Solution Brief. RSA Adaptive Authentication. Balancing Risk, Cost and Convenience
RSA Adaptive Authentication Balancing Risk, Cost and Convenience As more organizations look to migrate customers, members, and partners to the costeffective online channel, the need to instill confidence
More information