Proposal Document TitleDocument Version 1.0 TitleDocument

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Proposal Document TitleDocument Version 1.0 TitleDocument"

Transcription

1 G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public

2 Copyright & Confidentiality Statements This document is Copyright Ltd All rights reserved. The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Ltd. The information in this document is subject to change without notice. Ltd shall not be liable for any damages resulting from technical errors or omissions which may be present in this document, or from use of this document. This document is an unpublished work protected by the United Kingdom copyright laws and is proprietary to Ltd. Disclosure, copying, reproduction, merger, translation, modification, enhancement, or use of this document by anyone other than authorised employees, authorised users, or licensees of Accumuli Security Ltd without the prior written consent of Ltd is prohibited. Document Information Client Name: Document Title: G-Cloud - Strong Authentication Service -Service Definition Version: Document Version 1.0 Publication Date: 02 December 2014 Classification: Document Classification - Public Prepared by: Document Control Version Date Author Change Summary /12/2014 Public release

3 Contents 1 Introduction Purpose Subcontractor Statement About Signify Service Overview Service Features Flexible Token Options Complete Token Lifecycle Management Simple Integration Comprehensive End User Web Helpdesk Reliable Service Expert Customer Support Advance Identity Management Centre Cloud Single Sign On (SSO) Service Detail Ordering, Invoicing and Termination Service On-boarding Service Management Service Levels Availability Performance Levels Financial Recompense Technical Requirements Customer Responsibilities Training

4 1 Introduction 1.1 Purpose The purpose of this document is to set out a clear description of the Accumuli strong authentication service. 1.2 Subcontractor Statement This service is delivered by Accumuli s wholly owned subsidiary, Signify Solutions Ltd. 1.3 About Signify Since 2000, Signify has built an outstanding reputation for delivering secure, reliable and flexible two-factor authentication which is quick and easy to deploy. We have an extensive client base across many sectors including major multi-national corporations, small and medium sized businesses, professional services, central government and local authorities. Signify's fully hosted authentication service delivers a choice of token and tokenless authentication to make it easy for our customers to provide the appropriate form of authentication to suit each group of their users. The successful deployment of two-factor authentication takes more than just technology; you also need to implement a framework of policies, procedures, logistics and user support. Through our focus on running hosted authentication services, we have learned, defined and automated many best-practice policies and processes into our service. Our service allows organisations of any size from any sector to deploy enterprise quality two-factor authentication (2FA). Signify has over 300 customers worldwide and nearly 100,000 users currently active on our service. Signify builds long term relationships with our customers; our stability and longevity allows us to do this, while we also have the resources to expand and meet any new requirements our customers may have. 1.4 Service Overview Signify is a cloud based strong two-factor authentication service. We deliver strong authentication and Single Sign On (SSO) services to a wide range of customers, from 2 man start-ups to 20,000+ user corporate customers. Signify provide and manage the authentication infrastructure, and deliver our unique cloud based Identity Management Centre (IMC) which provides a single administrative and web helpdesk interface for administrators and end users. By delivering a cloud based solution, customers benefit from significant Total Cost of Ownership (TCO) savings, as Signify offer a highly resilient and reliable service with an intuitive workflow driven administrative interface. Figure 1 - Signify Overview

5 2 Service Features Our service provides a number of unique features, including: 2.1 Flexible Token Options As a flexible service, additional users can be added at any time and will be co-terminated within the main service agreement. Users can be moved between credential types during the course of the service agreement, and indeed have more than one credential if required. Token and tokenless options are made up of the following credential types. RSA SecurID hardware tokens Signify offer both three and five year RSA hardware tokens, which benefit from the following features: Waterproof and highly robust Warrantied for the life of the token Highly secure and tamper proof can provide global logistic support as part of the service if specified RSA SecurID software tokens Signify offer RSA software tokens, which are supported on a wide range of mobile devices. Allow a user s smartphone such as Apple iphone, Blackberry, Android, or Windows Mobile device to become the authenticator Once provisioned the software token doesn t require a network signal or connectivity to operate Can t be lost if the device is lost or broken the software token can be securely re-assigned Transferable As user s upgrade their devices, or leave your organisation the software tokens can be securely re-assigned Passcode on Demand For customers who do not want to use hardware or software tokens, Signify deliver one time passcodes which can be delivered by SMS or . Uses the mobile device already assigned to a user, without the need to install anything The option to send either SMS One Time Passcodes (OTP), or OTP to the registered user Perfect for user s with ad-hoc or temporary access requirements OTP is ideal when used in conjunction with secure , and removes the need for SMS Pre-send mode for SMS delivery (have an OTP ready to go) increases the reliability for users who may have intermittent network coverage Up to 4 OTP can be delivered in any single SMS or 2.2 Complete Token Lifecycle Management When a user is added to the Signify Identity Management Centre (IMC) by a customer s administrator, we will provision the token and ship it directly to the end user (depending on the security policy, token type and service options taken by the customer). The user is also sent a welcome , and asked to log in to the IMC to set up security questions and contact details. We will also organise replacements when tokens are lost, stolen, broken or expired. This is a key differentiator for our service, and prevents the customer s IT department from having to be involved in the time consuming process of provisioning tokens and issuing them to employees

6 2.3 Simple Integration New customers can implement our service very quickly, in the case of most customers that could be on the same day the service is created. In larger enterprise rollouts Signify will ensure you have the right mixture of technical and project management resources to ensure a smooth delivery. Compatible with all leading VPN s, Firewalls and Web Servers No on premise hardware or software required In most cases no training is required Easy to understand Admin Web Portal 2.4 Comprehensive End User Web Helpdesk The web helpdesk allows users to manage their own tokens, without the need for support from your internal IT department, which provides a significant time and cost saving. We provide an intuitive web helpdesk interface, which end users can use to: Reset their pin Report lost or stolen token Request emergency access, when they have forgotten their token (and security policy allows it) Update their contact details 2.5 Reliable Service Figure 2 - Web end user helpdesk The Signify cloud based service provides a reliable and resilient two factor authentication solution, which we scale as customer demand grows. Our service is backed up by a 99.95% availability SLA, so you can depend on our platform to be available when you need it and we have been successfully operating the service for more than 14 years. Our customers do not have to absorb the expense of specifying a highly available on premise solution, or run with the risk of operating from a standalone platform. 2.6 Expert Customer Support Our support team consistently receive great feedback from our customers, and are able to provide administrators (not end users) with advice and support on troubleshooting integration of authentication nodes. Our support team can also provide administrator training for advanced features of the IMC, if required

7 2.7 Advance Identity Management Centre The Signify IMC is a workflow based administration portal that allows your administrators to set up a security policy, add two factor authentication users and configure authentication nodes. It provides a simple and intuitive interface, preventing your administrators from having to learn a complex vendor tool. The IMC has a number of powerful features including: Two-factor user administration, including adding and revoking tokens Granular security policy configuration Active Directory synchronisation Authentication logging and reporting 2.8 Cloud Single Sign On (SSO) Figure 3 - Signify Identity Management Centre Signify support Signify Single Sign On to cloud applications, including SalesForce and Google Apps for Business using their Signify two factor authentication token. The system is integrated with cloud based resources using SAML, and can extended by the Signify development team to support Customer s cloud based applications as an optional chargeable project. 3 Service Detail 3.1 Ordering, Invoicing and Termination Signify strong authentication services can be ordered by contacting our sales team on or Service terms are agreed at time of contract let, but are usually annually in advance, with termination notification 90 days prior to the annual renewal. Payment terms are typically 30 days from invoice. 3.2 Service On-boarding Having procured the service, our customers use the cloud based Identity Management Centre (IMC) to set up their security policy, integrate their authentication nodes and set up users. Comprehensive on-line help is provided to guide Customers through the process of setting up the service, and your administrators also have access to our UK based support experts, who can help you resolve any issues

8 Signify also provide integration guides for common authentication nodes, including VPNs and web servers. These documents provide instruction on how your infrastructure should be integrated with the Signify service, to enable strong authentication. 3.3 Service Management Signify Customers can complete all service management tasks from the IMC portal, including: Revoking tokens Setting up new users Assigning tokens Administering the security policy Setting up new authentication nodes Download reports 3.4 Service Levels A detailed service level agreement will be provided to the customer at the time of contract let, which shall act as the contractual service level agreement. The following information provides an overview of the service level provisions for the Signify Service: Availability Signify will use its reasonable efforts to ensure that in each calendar month: End User authentication is in Normal Operational State for not less than 98% of the time; End User authentication operates in Failover State for no more than 2% of the time; End User authentication is in Unavailable State for no more than 0.05% of the time; Performance Levels Signify will use its reasonable efforts to ensure that in each calendar month, while in the Normal Operation State, the authentication response time is: less than 2 seconds for 95% of all test authentications; and less than 6 seconds for 99.99% of all test authentications; And while in the Failover State, the authentication response time is: less than 6 seconds for 95% of all test authentications; and less than 30 seconds for 99.99% of all test authentications; Financial Recompense If one or more of the availability or performance levels detailed above is breached in any given month, then the Customer may claim a credit allowance of the equivalent of one month s Service for each of the Customer s end users and authentication nodes which are affected by the breaches and actually experience a degraded service. 3.5 Technical Requirements The Signify service is compatible with all leading VPN s, Firewalls and Web Servers, and supports RADIUS and the RSA SecurID protocol. RSA agents are supported on all major Windows and Linux operating

9 systems as well as IIS and Apache web servers. The mobile application is supported on the most popular mobile platforms, tablets and PCs including Windows Phone, Blackberry, iphone and Android operating systems. Our Web Single Sign On (Web SSO) platform can be integrated with cloud resources by our development team using the Security Assertion Mark-up Language (SAML) specification. 3.6 Customer Responsibilities The customer is responsible for setting up and administering the strong authentication service, using the cloud based IMC portal. UK based telephone support is available to IMC administrators, and end users have access to our unique web helpdesk which allows end users to manage their own strong authentication tokens, PINs and personal details. 3.7 Training Signify offer optional chargeable on-site training for the IMC portal, to enable strong authentication service administrators to set up complex security policies, and enable the advanced features of the service. However, training is not always required as the IMC is an intuitive interface and provides comprehensive online help documentation

Secure Authentication Managed Service Portfolio

Secure Authentication Managed Service Portfolio Secure Authentication Managed Service Portfolio Combating Corporate Identity Theft Signify Managed Authentication Services Signify offers a complete range of Secure Authentication and Identity Management

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

A Symantec Connect Document. A Total Cost of Ownership Viewpoint A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

How to reduce the cost and complexity of two factor authentication

How to reduce the cost and complexity of two factor authentication WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership

More information

2012 European Cloud-Based Authentication Services New Product Innovation Award

2012 European Cloud-Based Authentication Services New Product Innovation Award 2012 2012 European Cloud-Based Authentication Services New Product Innovation Award 2012 Frost & Sullivan 1 We Accelerate Growth New Product Innovation Award Cloud-Based Authentication Service Europe,

More information

UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3)

UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3) UDiMan Name: UDiMan Identity Management service Service Type: Software as a Service (SaaS Lot 3) Introduction UDiMan is an Enterprise Identity Management solution supporting mission critical authentication

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

The Hidden Costs and Risks of DIY Two Factor Authentication

The Hidden Costs and Risks of DIY Two Factor Authentication The Hidden Costs and Risks of DIY Two Factor Authentication Foreword Dave Abraham examines the real costs involved in implementing and managing two factor authentication (2FA) in-house. Dave Abraham is

More information

Azeus Convene Paperless Board and EXECUTIVE Meetings

Azeus Convene Paperless Board and EXECUTIVE Meetings Service Definition Azeus Convene Paperless Board and EXECUTIVE Meetings 1. An Overview of the G- Cloud Service (functional, non functional) Azeus Convene replaces meeting papers with a user-friendly mobile

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION

QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION Who are SecurEnvoy? As the original inventors of tokenless authentication, our goal is to continue to design innovative solutions that take advantage of

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Authentication As A Service. Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017?

Authentication As A Service. Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Quick Start Guide. for Installing vnios Software on. VMware Platforms Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

SafeWord 2008 Customer Release Notes

SafeWord 2008 Customer Release Notes SafeWord 2008 Customer Release Notes Product Version: 2.1.0.04 Release Notes Issue Date: October 14, 2010 Last Updated: October 14, 2010 1. Product Description SafeWord 2008 by SafeNet is a two-factor

More information

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management

More information

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Aurora Hosted Services Hosted AD, Identity Management & ADFS 22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

This release bulletin relates to Version 3.10.4 build 2701 of the Swivel Authentication Platform and other new capabilities.

This release bulletin relates to Version 3.10.4 build 2701 of the Swivel Authentication Platform and other new capabilities. Swivel Authentication Version 3.10.4 Release Bulletin Introduction This release bulletin relates to Version 3.10.4 build 2701 of the Swivel Authentication Platform and other new capabilities. This latest

More information

Why SMS for 2FA? MessageMedia Industry Intelligence

Why SMS for 2FA? MessageMedia Industry Intelligence Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved BlackShield ID PRO Steel Belted RADIUS 6.x Implementation Guide Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved License and Warranty Information CRYPTOCard and its affiliates retain

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

RSA SecurID Software Token Security Best Practices Guide

RSA SecurID Software Token Security Best Practices Guide RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

RSA Authentication Agents Security Best Practices Guide. Version 3

RSA Authentication Agents Security Best Practices Guide. Version 3 RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Balancing risk, cost and user experience with SMS for 2FA

Balancing risk, cost and user experience with SMS for 2FA Balancing risk, cost and user experience with SMS for 2FA MessageMedia Industry Intelligence Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email vs. SMS for

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

A Total Cost of Ownership

A Total Cost of Ownership A Total Cost of Ownership Analysis of Wave Virtual Smart Card 2.0 Executive Summary Existing authentication schemes such as passwords, tokens, and smart cards have failed to prevent the unabated rise in

More information

RSA Authentication Manager 7.1 Administrator s Guide

RSA Authentication Manager 7.1 Administrator s Guide RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3

X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3 X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3 Date : 09/08/06 Issue: 6 This is an unpublished work the copyright in which vests in X2 Connect Limited. All rights reserved. The

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

RSA Authentication Manager 8.1 Help Desk Administrator s Guide RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

SAML Authentication Quick Start Guide

SAML Authentication Quick Start Guide SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign

More information

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9 CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Secure Remote Access. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open

Secure Remote Access. Lot 4 - Specialist Cloud Services. Version: 2.0, Issue Date: 05/02/2014. Classification: Open Secure Remote Access Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no part of

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Cloud Store & Share Frequently Ask Questions

Cloud Store & Share Frequently Ask Questions Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download

More information

solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management

solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management Several trends have recently emerged to ignite the requirement for enterprise guest management. One is

More information

Security Annex for 2FA Additional Terms for Managed Authentication Service

Security Annex for 2FA Additional Terms for Managed Authentication Service CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 General... 2 2.2 Provisioningddd... 2 2.3 Setup... 3 2.4 Technical Support... 3 2.5 Administrator Responsibilities... 3 2.6

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

White Paper. The Principles of Tokenless Two-Factor Authentication

White Paper. The Principles of Tokenless Two-Factor Authentication White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

SLA, Terms & Conditions Website

SLA, Terms & Conditions Website Subject / SLA, Terms & Conditions Website 1. DEFINITION OF TERMS Design Limited (AJA Design),,,,. trading as AJA Design having its principal place of business at,,,.. The Client - the entity which enters

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Proposed Service. Name of Proposed Service: Technical description of Proposed Service: Registry-Registrar Two-Factor Authentication Service

Proposed Service. Name of Proposed Service: Technical description of Proposed Service: Registry-Registrar Two-Factor Authentication Service Print Date: 2009-06-25 23:04:33 Proposed Service Name of Proposed Service: Registry-Registrar Two-Factor Authentication Service Technical description of Proposed Service: Background: The frequency and

More information

Authentication Node Configuration. WatchGuard XTM

Authentication Node Configuration. WatchGuard XTM Authentication Node Configuration WatchGuard XTM Author: Signify Issue: Version 1.0 Date: xx Month 2013 Contents Introduction... 4 Configuration Prerequisites... 4 Knowledge and Access Rights... 4 Infrastructure...

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Profiting from SafeNet Authentication Service Offerings

Profiting from SafeNet Authentication Service Offerings whitepaper Profiting from SafeNet Authentication Service Offerings A Guide for the Channel With SafeNet, service providers and VARs can deliver profitable and successful cloud services Executive Summary

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1 RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

MANAGED FIREWALL SERVICE. Service definition

MANAGED FIREWALL SERVICE. Service definition MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

MobilePASS+ for Android. User Guide

MobilePASS+ for Android. User Guide MobilePASS+ for Android User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records

More information

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com

More information

Installation Guide Version 3.0

Installation Guide Version 3.0 SIMS Teacher app Installation Guide Version 3.0 Step-by-step guide needed to install and configure the SIMS Teacher app service for a school Version 3.0 Information use and disclaimer The information contained

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

HP Software as a Service

HP Software as a Service HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information