Securing Virtual Desktop Infrastructures with Strong Authentication
|
|
- Lucas Gilmore
- 7 years ago
- Views:
Transcription
1 WHITE PAPER Securing Virtual Desktop Infrastructures with Strong Authentication Contents VDI Access Security Loopholes... 2 Access Vulnerabilities... 2 Secure Access to Virtual Desktop Infrastructures... 3 Assessing Strong Authentication Solutions for VDIs... 3 Authentication Management and Administration... 4 Authentication Methods... 4 Fitting the Authentication Method to the Endpoint Device... 5 Thin Clients... 5 Mobile Devices... 5 Laptops/Desktops... 5 Gemalto Strong Authentication Solutions for VDI... 6 Management Platforms... 6 Conclusion... 7 About Gemalto s SafeNet Identity and Data Protection Solutions... 7 Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 1
2 Flexibility, user-centric computing, and mobility are strong trends that are driving growth in the Virtual Desktop Interface (VDI) market. These factors are pushing IT teams to find solutions that will offer the flexibility employees expect while allowing them to maintain controls over the various endpoints used to access corporate resources. IT teams are also seeking to centralize security policies and data controls away from endpoints. As a result, companies need the means to implement consistent security processes and comply with regulations without increasing the burden on IT staff or inconveniencing their users. Users are increasingly dominant in determining the adoption of new computing environments, especially around the use of mobile devices. VDI Access Security Loopholes VDIs can be deployed inside the firewall. However, they are increasingly accessed over the Internet. Often, the only barrier that stands between them and sensitive corporate resources is a simple password, which cannot prevent the sophisticated level of attacks that have become increasingly prevalent, and which result in compromised identities, wide-scale credential theft, and data breaches. Organizations also need to be vigilant about internal threats that can result from lax security around sharing endpoints or data theft resulting from internal sources, such as disgruntled employees. Static passwords cannot adequately validate or protect the identities of users accessing virtual desktops and other remote resources. Access Vulnerabilities Password and Credential Theft In today s escalated risk environment, static passwords are the weakest link in remote access. Data breaches carried out for the purpose of criminal harvesting of user credentials has become rampant. In June 2012, hackers attacked LinkedIn s password database and published millions of passwords online. And in April 2011, Sony suffered an attack that resulted in the theft of 77 million accounts, as well as credit card data. These breaches highlight the unsafe - but common - practice of using the same password to access several online resources. Cybercriminals take advantage of this by hacking into vast databases in order to harvest passwords and sell them, resulting in the illegal use of the stolen passwords to gain unauthorized access to VDIs from thin clients, laptops, and mobile devices. Brute Force Attacks The use of password guessing and brute force attacks is another risk to VDI access. These attacks are designed to breach online resources by using dictionary attacks and password guessing, in which mathematical algorithms are used to systematically break the user password in order to gain access. Malware Malicious software embedded on a laptop or mobile device has the ability to steal passwords and other forms of user credentials. This allows access by unauthorized users to VDIs, and, depending on the sophistication of the malware, to the corporate network as well. Identity Spoofing Identity spoofing is a hacking method designed to hide the identity of the sender or impersonate another computing system. spoofing is used by hackers to fraudulently send messages in which the sender s address and other parts of the header are altered. In Web page spoofing, users are directed to a website that looks like the one they believe they are visiting. The actual site, however, is hosted in a different location. The common purpose of these spoofing attacks is to trick users into providing personal and confidential information that is subsequently used for identity theft. The credentials can be reused later by the attacker to impersonate the user and gain access the corporate network and VDI. Session Hijacking Session hijacking also known as Man-in-the-Middle - is an attack in which the attacker can actively inject messages into the traffic between the user s computer and the authenticating server. In this type of attack, the attacker can eavesdrop on the communications between the legitimate user and the server, or manipulate the communications in such a way that transactions and operations are performed on behalf of the user but without the user s control. Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 2
3 Organizations could undermine the benefits provided by VDIs if they don t protect themselves from data breaches and ignore vulnerabilities around VDI access points. Secure Access to Virtual Desktop Infrastructures VDIs offer considerable benefits to organizations by allowing them to improve employee productivity through Bring- Your-Own-Device policies, while still maintaining isolation, separation, and security between a user s work and personal environments. But organizations could undermine these efforts and expose themselves to data breaches if they ignore vulnerabilities around VDI access points. One way of overcoming these risks is through the use of a strong authentication solution that provides a second factor of authentication beyond simple passwords when the user logs on to the VDI and other remote access points. With the expansion in user access scenarios in the enterprise, implementing security authentication for VDI calls for a versatile authentication solution that can support numerous and diverse use cases that are common to most organizations, and also allow them to meet privacy and security regulations. By adopting an overall strategy for secure access that is enabled by a comprehensive authentication platform, organizations can secure access to VDIs from different endpoints and tailor the level of authentication to suit diverse groups of users without burdening IT teams. The Need to Accommodate Mobility A growing impetus for implementing VDIs is the need to provide employees with mobility and flexibility. This goal has led to a rise in the number and type of endpoints that employees are using. Diverse endpoints are exposed to different attack vectors and cannot be lumped together in a single risk category. Consequently, the authentication method used by the end user needs to factor in usability and risk. For example, it may be appropriate to require that a sales rep on the road use a certificate-based hardware token for VPN and remote access but suffice with OTP or out-of-band authentication when using a computer at home. Optimally, an organization should strive to implement secure access for all endpoints with a single versatile authentication solution that offers central administration and supports numerous authentication methods. In this way, organizations can implement unified secure access policies for all users regardless of the endpoint and provide a better user experience. At the same time, they can reduce the administrative burden on their IT teams and significantly increase security. The Need to Accommodate Usability The desire to balance the need for secure access, the ability to support multiple endpoints, and facilitate usability around security mechanisms can be achieved by implementing different authentication methods for groups of users with different usability needs and risk profiles. The optimal way to achieve this is by deploying a versatile authentication solution that supports different authentication methods and endpoints. Compliance is not just about meeting regulations. Organizations need to manage risk around security, ensure best practices, and pass security audits with flying colors. The Need to Achieve Compliance In many cases, a reason for implementing strong authentication is driven by the requirement to comply with industry, or country-specific regulations. There are numerous regulations, including PCI DSS, HIPAA, and FFIEEC, that recommend strong authentication as a best practices measure for validating the identities of people accessing online resources. In addition, SP (NIST Electronic Authentication Guideline) was updated and revised in This publication from the National Institute of Standards and Technology (NIST) expands the options for government agencies that need to verify the identity of users of their Web-based services and determines different assurance levels. The NIST Guideline offers a 5-step process to help companies map identified risks to the defined assurance levels, and then select an appropriate authentication technology based on NIST s e-authentication technical guidance. Assessing Strong Authentication Solutions for VDIs There are many different methods of strong authentication available for VDIs. For IT professionals, the challenge lies in avoiding the trap of taking a piecemeal approach but rather implement an authentication solution that is able to provide access security for all VDI endpoints, facilitate usability for employees, and achieve cost efficiencies in terms of management and administration. In the following paragraphs, we ll take a look at the management requirements and most commonly used strong authentication methods, and how these can contribute to securing access to VDIs. The authentication back end is a crucial part of any authentication solution since it is the foundation of efficient administration and determines the ability to implement consistent secure access policies for all resources. Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 3
4 Authentication Management and Administration All authentication solutions are managed by a corresponding authentication back end. The management platform is a crucial element in any authentication solution since it directly impacts an organization s ability to optimize identity and access processes. The authentication management platform deals with: > Authentication and validation: There are numerous authentication methods and technologies. An authentication management platform that supports a wide range of methods provides a greater degree of flexibility and allows organizations to take a risk-based approach to authentication by allowing them to deploy different methods of authentication according to the risk level of different types of users. > Provisioning and enrollment: Provisioning and enrollment is an admin-intensive task that can be highly timeconsuming. Management platforms that allow for the automation of these tasks can significantly reduce IT administration overhead and streamline processes. > Lifecycle and ongoing administration issues: A management platform should offer the ability to automate processes associated with ongoing usage scenarios. These include automatic token and password recovery in case the token or end device is lost or stolen; the ability to easily revoke or unblock certificates; the ability to offer selfservice portals to users and reduce calls to the help desk, and the ability to automatically provision new certificates when old ones expire. > Broad endpoint support: Selecting an authentication management solution that is able to address different groups of users and roles, integrate easily with a variety of access endpoints (thin clients, mobile devices, laptops, etc.), and support numerous applications (VPNs, VDIs, SaaS applications, Web-based applications, etc.) is fundamental to an organization s ability to implement an effective authentication strategy. Authentication Methods There are several authentication methods appropriate for securing access to VDI. These include: SMS Out-of-Band Authentication In SMS authentication, a dynamic passcode is sent via SMS to a user s mobile phone. Since people carry their phones with them at all times, this is a convenient and easy way to deliver dynamic passcodes. One-time Passcodes (OTP) One way to overcome security risks related to static passwords is to use a randomly-generated one-time passcode (OTP) when logging into a VDI. The passwords are generated by a hardware token or software token. When the user enters the OTP, the login client communicates with a back-end OTP Endpoint Compatibility SMS Out-of-Band Authentication > Laptop > Desktops One-time Passcodes (OTP) > Thin clients > Laptops > Desktops Certificate-based Authentication Solutions > Thin clients > Laptops > Desktops > Mobile Devices authentication server that validates the value of the OTP based on a mathematical secret shared between the OTP client device and the OTP authentication server. Certificate-based Authentication Solutions Certificate-based authentication (CBA) uses digital certificates as a means of identifying one or both parties in a transaction. A certificate contains the name of its subject (the person identified by the certificate) and the name of a Certificate Authority (CA), who vouches for the identity of the subject. Additionally, each certificate contains the subject s public key, which is associated with a corresponding private key that is kept secret. Only someone in physical possession of the private key can use the certificate to identify himself. > Certificate-based Hardware Authenticators: The most secure way of using certificates is embedding them in the protected environs of a smartcard chip on a portable hardware token. In this manner, the certificate s private key is generated within the confines of the smartcard chip. Since the smartcard is stored on a tamper-evident hardware device, it is not exposed to the vulnerable PC environment, which can be infected by malware. Certificate-based hardware authenticators are available in USB or credit card form factor. > Software-based Certificate Authentication Solutions: Software-based certificate authentication solutions can offer comparable advantages of certificate-based smartcard form factors and USB authenticators. By storing the certificate s private key within a virtual smartcard that is installed on the endpoint, software certificate-based solutions prevent unauthorized network access and overcome traditional password security weaknesses. > Embedded Certificates: Some endpoints particularly mobile devices do not support the use of smartcard form factors and USB authenticators. In these cases, it is possible to overcome password weaknesses by provisioning a certificate to the device and using it to authenticate the user at login. Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 4
5 The ability to implement different authentication methods for different endpoint devices and centrally manage them with a single authentication server is key to a achieving a consistent and uniform secure access strategy. Fitting the Authentication Method to the Endpoint Device One of the key drivers for adopting VDI environments is the desire to enable uniform access to corporate computing environments from diverse endpoints. In the following section, we ll discuss the types of strong authentication methods that can be applied to different endpoints. Authentication Solutions for Diverse Endpoints Laptops / Desktops > Certificate-based Authentication (CBA) > CBA combined with VDI Client installed on portable USB authentication device > One-time Passcode (OTP) > Out-of-Band (OOB) Mobile Devices > CBA - embedded certificate > OTP > OOB Thin Clients > CBA smartcard > OTP Thin Clients Certificate-based Hardware Authentication The use of certificate-based authentication offers a very high level of security for thin clients. When this solution is implemented, authentication takes place before the actual VDI session is launched. When booting the thin client, the user inserts a certificate-based USB token and enters the token password. The beauty of this solution is that since the USB token can contain several certificates, the same token can be used to securely access other resources, such as Web-based portals and local network resources. OTP Authentication Thin clients can be configured to support OTP hardware and software authentication via standard RADIUS, integration agents, or Web services API. Out-of-Band (OOB) A passcode sent via SMS to a user s mobile phone is another way of avoiding the use of static passwords. Mobile Devices A user-friendly way of overcoming password vulnerabilities on mobile devices, and facilitating Bring-your-own-Device (BYOD) policies, is by provisioning a certificate to the mobile device. Unlike the use of OTP authentication, the use of a certificate does not require the user to type in an OTP and is therefore more convenient and less error-prone. If the device is lost or stolen, the IT administrator revokes the certificate and thus blocks access from the VDI client. The PIN on the mobile device serves as another authentication factor if the device is lost or stolen. Laptops/Desktops One aspect of growth in the BYOD trend is a desire on the part of IT departments to enable secure use of laptops and desktops that are not issued by the corporate IT department. For example, an organization might want to provide flexibility to employees by enabling them to access the VDI from their home computers. Secure access in this case could be achieved through the use of OTP or hardware- and certificatebased strong authentication. There are other use-case scenarios that benefit from different forms of certificatebased authentication. These are discussed below. Mobile VDI Client Combined with CBA Authenticator This solution consists of a VDI client stored on the encrypted Flash memory of a certificate-based USB authentication device. The device combines certificate-based strong authentication and encrypted Flash storage, which allows for secure storage of the VDI client on the USB token. This solution offers a high level of security and a high degree of mobility since it enables users to connect the USB token to any laptop or desktop. Users benefit from this solution because it offers them the convenience and flexibility of total mobility. IT professionals benefit from the fact that they don t have to concern themselves with installing VDI clients on non-corporate issued devices or handle associated support calls. Hardened VDI Client The solution described above is available in an even more secure format for organizations that want to reduce risk to a minimum. In this case, it is possible to harden the VDI client with anti-malware components. So, not only would the VDI client be stored in encrypted Flash memory, it would also provide active protection against malware. Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 5
6 List List Dynamically Downloadable Hardened VDI Client In this variation, a hardened or regular VDI client is dynamically downloaded from a secure website after the user authenticates with their certificate-based USB authentication device. This variation offers IT teams a greater level of control over the VDI client in use since it is managed on the server side and not distributed on the actual USB authentication device. Gemalto Strong Authentication Solutions for VDI Gemalto s award-winning solutions provide an extensible, comprehensive foundation for securing an organization s VDI environment. Gemalto offers on-premise or cloudbased management platforms that support secure access to VDI clients from multiple endpoints with a broad range of authentication methods and form factors. This versatile approach allows organizations to choose the delivery model that best suits them and centrally manage their entire authentication environment while implementing unified strong authentication policies for all resources. Management Platforms Gemalto SafeNet Authentication Manager Gemalto SafeNet Authentication Manager supports Gemalto s entire range of OTP, certificate-based, and software authentication solutions, allowing organizations to secure access to VDIs, as well as numerous other resources. SafeNet Authentication Manager offers extensive authentication lifecycle management and reporting capabilities, which reduce IT administration and help desk calls, and facilitate security auditing Benefits > Lower TCO: Organizations need only deploy one management server that serves as a single infrastructure for a range of secure access solutions. This approach enables IT departments to seamlessly extend access security to as many applications as needed as user requirements and threat landscapes change, without having to invest in additional software or hardware. > Greater flexibility and scalability: Support for a wide range of authentication methods and form factors creates a versatile authentication solution that allows organizations to use a single platform to address numerous user needs and risk levels by deploying different authentication methods, or adding them, side by side, as required. > Pro-active security preparedness: Gemalto s extensible approach, together with ongoing investment in technological innovation, provides organizations with the assurance that the solution they are deploying meets their present needs, while also providing them a solid basis to meet the challenges of a rapidly evolving security landscape. On-Premise Thin Client Laptop/Desktop VDI Server Mobile SafeNet Authentication Manager RADIUS Server Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 6
7 List List Gemalto SafeNet Authentication Service Gemalto SafeNet Authentication Service is a cloudbased service that delivers fully automated OTP strong Authentication-as-a-Service. With no infrastructure required, SafeNet Authentication Service protects a wide range of access points, including VDIs, SaaS applications, and Webbased portals. Authentication Devices Gemalto offers a wide range of authentication devices. These include OTP hardware and software authenticators; CBA authenticators in USB, smartcard, and software form factors; OOB solutions; and hybrid solutions, which combine certificate-based authentication with OTP or encrypted Flash memory. Encouraging business in the cloud, SafeNet Authentication Service offers an OPEX subscription model to its fully automated, highly secure, simple, and intuitive Authentication-as-a-Service solution. Conclusion Virtual desktop solutions offer a way for IT departments to consolidate and streamline their computing environments and improve processes around distributing updated software patches and upgrades, as well as licensing issues. Moreover, as mobile devices are increasingly used as an extension to traditional computing environments, VDI solutions are also seen as a way to extend corporate controls to mobile environments and as a way of accommodating the need to facilitate user access from multiple endpoints. These benefits should not be undermined by lax security around access points. The use of a versatile strong authentication platform that can keep pace with escalating threats, ensure compliancy with regulations, offer IT efficiencies in terms of management and administration, and address the diverse computing environments that are evolving in most organizations is a critical factor in an organization s overall information security strategy. By ensuring that strong authentication is a key part of their VDI strategy, along with other data protection measures such as encryption, organizations can protect their data centers, secure access to VDIs, and comply with privacy regulations. Contact Us: For all office locations and contact information, please visit Follow Us: data-protection.safenet-inc.com GEMALTO.COM Laptop As-a-Service Thin Client SafeNet Authentication Service VDI Server VMware View Connection Server RADIUS Server About Gemalto s SafeNet Identity and Data Protection Solutions Through its acquisition of SafeNet, Gemalto offers one of the most complete portfolios of enterprise security solutions in the world, enabling its customers to enjoy industryleading protection of data, digital identities, payments and transactions from the edge to the core. Gemalto s newly expanded portfolio of SafeNet Identity and Data Protection solutions enables enterprises across many verticals, including major financial institutions and governments, to take a datacentric approach to security by utilizing innovative encryption methods, best-in-class crypto management techniques, and strong authentication and identity management solutions to protect what matters, where it matters. Through these solutions, Gemalto helps organizations achieve compliance with stringent data privacy regulations and ensure that sensitive corporate assets, customer information, and digital transactions are safe from exposure and manipulation in order to protect customer trust in an increasingly digital world SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. WP (EN)-Mar Design: Jubemo Securing Virtual Desktop Infrastructures with Strong Authentication - White Paper 7
Securing Virtual Desktop Infrastructures with Strong Authentication
Securing Virtual Desktop Infrastructures with Strong Authentication whitepaper Contents VDI Access Security Loopholes... 2 Secure Access to Virtual Desktop Infrastructures... 3 Assessing Strong Authentication
More informationAuthentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationAuthentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationRemote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
More informationIDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
More informationSecure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
More informationStrong Authentication. Securing Identities and Enabling Business
Strong Authentication Securing Identities and Enabling Business Contents Contents...2 Abstract...3 Passwords Are Not Enough!...3 It s All About Strong Authentication...4 Strong Authentication Solutions
More informationEnhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
More informationRSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
More informationhow can I provide strong authentication for VPN access in a user convenient and cost effective manner?
SOLUTION BRIEF CA Advanced Authentication how can I provide strong authentication for VPN access in a user convenient and cost effective manner? agility made possible provides a flexible set of user convenient,
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationV ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
More informationInformation Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationAuthentication Solutions Buyer's Guide
WHITE PAPER: AUTHENTICATION SOLUTIONS BUYER'S GUIDE........................................ Authentication Solutions Buyer's Guide Who should read this paper Individuals who would like more details regarding
More informationA Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
More informationLync SHIELD Product Suite
Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.
More informationThe Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
More informationADAPTIVE USER AUTHENTICATION
ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution
More informationVPN Solutions FAQ www.aladdin.com/contact North America International Germany Benelux France Spain Israel Asia Pacific Japan
A l a d d i n. c o m / e T o k e n VPN Solutions FAQ VPN authentication is a critical link in the chain of trust for remote access to your organization. Compromising that trust can expose your private
More informationProtecting Content and Securing the Organization Through Smarter Endpoint Choices
Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationSecuring Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
More informationIdentity Access Management: Beyond Convenience
Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationKASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
More informationIDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
More informationData Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationIDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
More informationConfidence in Commerce: Enabling e-banking and online services with two-factor authentication
Abstract The combination of online banking s rising popularity and the increasing number of online services offered by financial organizations indicates a bright future for e-banking. However, to maximize
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationWhen your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
More informationTop Five Ways to Protect Your Network. A MainNerve Whitepaper
A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationTwo-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
More informationReal World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
More informationA brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
More informationWebsite Security: It s Not all About the Hacker Anymore
Website Security: It s Not all About the Hacker Anymore Mike Smart Sr. Manager, Products and Solutions Trust Services & Website Security Website Security 1 Website Security Challenges Evolving Web Use
More informationHow TraitWare TM Can Secure and Simplify the Healthcare Industry
How TraitWare TM Can Secure and Simplify the Healthcare Industry January 2015 Secure and Simplify Your Digital Life. Overview of HIPPA Authentication Standards When Title II of the Health Insurance Portability
More informationUser Authentication for Software-as-a-Service (SaaS) Applications White Paper
User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper Page 1 of 16 DISCLAIMER Disclaimer of Warranties
More informationBoston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
More informationIntroduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
More informationData Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
More informationWhitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationTwo Factor Authentication for VPN Access
Trends in cloud computing, workforce mobility, and BYOD policies have introduced serious new vulnerabilities for enterprise networks. Every few weeks, we learn about a new instance of compromised security.
More informationMulti-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
More informationSamsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
More informationWhitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
More informationSecuring corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
More informationFACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
More informationWhat Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationHow to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
More informationCA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
More informationSECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
More informationThe 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
More informationSecuring Health Data in a BYOD World
BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security
More informationDell Mobile Clinical Computing
Dell Mobile Clinical Computing Healthcare Technology Solutions that Deliver Greater Security, IT Productivity and Clinician Efficiency Today s healthcare environment relies heavily on the latest technology
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationCloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
More informationWhen Desktops Go Virtual
When Desktops Go Virtual Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper I. INTRODUCTION Server virtualization is well on its way to becoming mainstream.
More informationTake the cost, complexity and frustration out of two-factor authentication
Take the cost, complexity and frustration out of two-factor authentication Combine physical and logical access control on a single card to address the challenges of strong authentication in network security
More informationInnovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
More informationIBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationCHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
More informationBlending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationBalancing Cloud-Based Email Benefits With Security. White Paper
Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email
More informationMODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
More informationPermeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
More informationTranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"
Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationUse Bring-Your-Own-Device Programs Securely
Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out
More informationHow to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
More informationWhy SMS for 2FA? MessageMedia Industry Intelligence
Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationResearch Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
More informationof firms with remote users say Web-borne attacks impacted company financials.
Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this
More informationAre You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview
Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationWhere every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
More informationHow To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
More informationStrong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
More informationITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
More informationTable of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
More informationManaging BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationHow much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
More informationPublic Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
More informationOverview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system
Contents Overview... 3 Why Should We Hack Our Own Systems?... 4 Healthcare is a Soft Target... 4 How About Those Compliance Requirements... 5 Breach Avoidance: Compliance Is Not Enough... 6 Supporting
More information