Multi- factor Authentication Initiative

Size: px
Start display at page:

Download "Multi- factor Authentication Initiative"

Transcription

1 Multi- factor Authentication Initiative "UCR s Multi- factor Authentication Initiative is an easy- to- use solution to our need to secure our campus community s credentials. The Duo Security system that we integrated with our campus single sign- on infrastructure is more flexible and easier to use than technologies we previously tested. Duo s broad range of options for entering an additional authentication factor ensure that the full spectrum of our user base will be able to take advantage of this enhanced security. I believe this is a best- in- breed implementation of multi- factor authentication. Campus Impact Bob Grant, Executive Director and CTO, UCR Computing and Communications UC Riverside s implementation of a multi- factor authentication (MFA) initiative has provided the campus with a huge leap forward in network security that is easy to adopt by members of the campus community, since it relies on devices (e.g. smartphones) they are already familiar with. Since it is integrated with the campus single- sign- on infrastructure (CAS), it is a smooth extension to the authentication processes they already use. Business Need UCR has made a strategic investment during the past decade in identity management and a single sign- on infrastructure that leverages Jasig s Central Authentication Services (CAS). All members of our campus community use their credentials (a UCR NetID and password) through CAS to access 1

2 web applications and databases. Many of these have increased security requirements because they incur financial obligations and access personally identifiable information (PII) in human resource or student records. This highly integrated authentication and authorization infrastructure is placed in the context of an almost daily onslaught of phishing messages, viruses and network probes that seek to steal the credentials of staff, faculty and students. Consequently there is a clear business need to mitigate the risk of a breach associated with the accidental or purposeful divulging of credentials in a manner that easily integrates into the well- established authentication and authorization channels currently being used by campus (CAS). UCR s implementation of a multi- factor authentication (MFA) initiative based on the Duo Security system and customized to integrate with CAS meets this need since it requires two authentication factors, a password followed by the use of a smartphone or token that can t be divulged in a phishing attack or via other means. Highlights Evaluation of Duo Security vs. in- house developed TOTP MFA solution. Development of reusable modules for integrating Duo Security based multi- factor authentication with a Central Authentication Services (CAS) single sign on system. Development of a user portal for self- management of devices used for authentication (e.g. phones. hardware tokens, and cell and land- line phone numbers). The Process: Technology and Implementation Evaluation The initial evaluation phase began with a process that involved identifying factors to rate potential multi- factor implementations. Ten different factors were identified: Evaluation Factor Integration with CAS Integration with Windows/AD Application specific passwords Highly available Monitorable Multi- channel capable Multiple classes of users Ability to opt- in/opt- out Campus VPN integration Integration with SSH Description Can the product integrate with the campus CAS implementation? Can the product integrate with Active Directory (Windows) based authentication? Can users set passwords for applications that cannot easily be made to use multi- factor authentication such as . Is the product highly available and redundant? Can the product be easily monitored for outages? Do users have the option to use several different types of devices for authentication? (smartphones, tokens, SMS) Can users be classified into groups such as administrators, financial system transactors, etc.? Is it possible to opt- in a subset of users to begin a pilot? Can the product integrate with the campus Cisco VPN? Can the product be used to require multi- factor when authenticating over SSH? 2

3 After some initial research five products were identified for initial evaluation using the evaluation factors: Duo Security, PhoneFactor, Toopher, Authy, and SecureAuth. Additionally an in- house developed solution based on time- based one- time passwords (TOTP) was added to the list. Evaluation Factor Duo PhoneFactor Toopher Authy SecureAuth TOTP Integration with CAS Integration with Windows/AD Application specific passwords Highly available Monitorable Multi- channel capable Multiple classes of users Ability to opt- in/opt- out Campus VPN integration Integration with SSH Based on the initial evaluation, two solutions, Duo Security and the TOTP solution were chosen for further evaluation. Selection Ultimately, the selection of Duo Security over the in- house developed TOTP solution hinged on the number of authentication channels available out of the box. While the TOTP solution could rely on a smartphone product like Google authenticator, or a token, Duo offered a rich set of smartphone applications that performed push authentication requests that made it easier to use. Implementation The implementation thus far of multi- factor authentication consisted of two parts, first writing the code to integrate Duo Security with CAS and second developing a portal utilizing Duo Security APIs for the users of MFA to enroll and manage smartphones and tokens. CAS Integration The Duo Security product comes with a number of integrations, but CAS is not one of them. Fortunately the CAS architecture allows extensions to add new authentication types. At a high level several things needed to be added or changed in CAS: The Spring web flow was altered to show a second authentication screen for Duo if the user was opted into MFA and the application being accessed allowed or required MFA. 3

4 Spring web flow action beans were added to connect to the Duo Security web services and perform the second authentication for a user (send a push notification to Duo Mobile, verify a passcode generated by a token, etc). The CAS security context was extended for an authenticated user so CAS could keep track of whether a CAS ticket granting ticket was generated using only a username/password (one factor) or username/password plus a Duo Security authentication (two factors). Added code to query the attributes in the CAS services registry to determine if a particular application requires MFA or not. UCR has placed the code to integrate with CAS in an open- source repository and has already had inquiries from two other universities regarding our implementation. Multi- factor Authentication Enrollment Portal Duo Security does not offer a customizable branded enrollment portal for users but does offer a rich set up APIs for building such a solution. UCR opted to build a customized portal utilizing these APIs to facilitate enrollment and subsequent profile management. This application, written using the Grails framework has several features: A step- by- step wizard to walk a user through enrolling in MFA for the first time. Once enrolled, the ability to add/remove smartphones and tablets that are running the Duo Security mobile app. Once enrolled, the ability to add/remove hardware tokens such as a Yubico YubiKey. Ability to request several single use passcodes in the event the enrolled smartphone/token is unavailable. Implementation Flexibility UCR s implementation allows applications to flexibly configure their MFA requirement based on a number of attributes. The most secure level to be utilized once MFA is rolled out extensively on campus is to require MFA of every user of the application. This would require a user to be setup for MFA before using the application the first time. Current applications enabled for MFA only require it for users who have enrolled in MFA production pilot. Other applications may choose to not require MFA at all. Our campus portals and about 20 other applications currently utilize MFA for all enrolled users. Testimonials I ll admit, when it was proposed that I pilot the new multi- factor authentication tool, I was worried that it was going to take longer to access campus applications and because I am a non- techy, using MFA would not be easy. I was pleasantly surprised to find out my experience was the exact opposite. The Duo Security application was easy to install on my iphone and it is extremely user friendly. As soon as I try to log on to any campus application or the R Space portal, a push notification is sent to my iphone. When I acknowledge the push notification, in no time at all, a screen appears on my phone asking me to verify my 4

5 authentication by simply touching Approve on my phone screen. It is an extremely fast and painless process. I have had absolutely no problems with MFA and am still able to access applications in a timely manner. I wish all pilots went this smoothly. " Shelley Gupta, CFAO, Computing and Communications "UC Riverside s implementation of MFA has already become a integral part of the defense in depth strategy for campus users and resources. Our security teams spend considerable time dealing with compromised credentials and MFA is a new defense layer to combat these issues. The MFA implementation provides the critical enhancement of security for users without sacrificing usability and functionality of campus services. It has truly been a commendable implementation Nick Turley, Manager of IT Security, Computing and Communications Timeline May 2013 June 2013 August 2013 September 2013 October 2013 March 2014 Project Initiation Evaluation and selection of solution Integration with CAS completed Enrollment portal completed Production Pilot begun with Computing and Communications staff MFA deployment planning and phased deployment to campus Team Members Computing & Communications Michael Kennedy, Enterprise Architect Stephen Hock, Manager of Identity Management, Infrastructure and Security Jonathan Ocab, Systems Analyst, Infrastructure and Security Andrew Tristan, Associate Director, Infrastructure and Security Russ Harvey, Director, Infrastructure and Security Submitted By Michael Kennedy Enterprise Architect Computing & Communications michael.kennedy@ucr.edu (951)

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems Security Tools (SecTools) UCR's implementationn of a security dashboard (nominally designated SecTools) is a wonderfully flexible and useful framework for viewing current security incidents and for gaining

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Security Data Analytics Platform

Security Data Analytics Platform Security Data Analytics Platform Figure 1 - Global Search Dashboard "The Data Analytics Platform has revolutionized the way we handle data from our Security monitoring infrastructure to our developers

More information

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Integrating Multi-Factor Authentication into Your Campus Identity Management System Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Multi-Factor Authentication Job Aide

Multi-Factor Authentication Job Aide To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

Initial DUO 2 Factor Setup, Install, Login and Verification

Initial DUO 2 Factor Setup, Install, Login and Verification Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Multi-Factor Authentication for first time users

Multi-Factor Authentication for first time users Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1 st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor

More information

Two-Factor Authentication Evaluation Guide

Two-Factor Authentication Evaluation Guide ???? 22700 Two-Factor Authentication Evaluation Guide Learn what to look for when assessing and comparing two-factor authentication solutions. A helpful guide from Two-Factor Authentication Evaluation

More information

Evolving Strong Authentication at The University of Arizona

Evolving Strong Authentication at The University of Arizona Evolving Strong Authentication at The University of Arizona Gary Windham Senior Enterprise Systems Architect The University of Arizona, UITS gary.windham@arizona.edu Where are we today? credential strength

More information

Setting Up and Accessing VPN

Setting Up and Accessing VPN Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication

More information

Cisco AnyConnect VPN for: Windows 8

Cisco AnyConnect VPN for: Windows 8 Cisco AnyConnect VPN for: Windows 8 Introduction The following instructions detail how to set up Cisco VPN for Microsoft Windows using NetID+. You will need to use VPN with NetID+ if you are trying to

More information

Using RD Gateway with Azure Multifactor Authentication

Using RD Gateway with Azure Multifactor Authentication Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to: Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive

More information

I m getting MFA, you re getting MFA, we re ALL getting MFA. Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke.

I m getting MFA, you re getting MFA, we re ALL getting MFA. Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke. I m getting MFA, you re getting MFA, we re ALL getting MFA Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke.edu) Durham, we have a problem Passwords are the most used way to secure

More information

Password Reset PRO Version 3 Operational Summary and Screenshots

Password Reset PRO Version 3 Operational Summary and Screenshots Password Reset PRO Version 3 Operational Summary and Screenshots This guide covers screenshots relating to iphone / mobile device self service access, Profile Enrollment Mode access and Active Directory

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS

More information

Facebook s Security Philosophy, and how Duo helps.

Facebook s Security Philosophy, and how Duo helps. Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Swivel Multi-factor Authentication

Swivel Multi-factor Authentication Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction

More information

Securing your Juniper SSL VPN with two-factor authentication.

Securing your Juniper SSL VPN with two-factor authentication. Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring

More information

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

IT Information Packet

IT Information Packet IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology

More information

Moving Beyond User Names & Passwords

Moving Beyond User Names & Passwords OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition Find out what organizations need to know to compare two-factor vendors and check

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

Moving Beyond User Names & Passwords Okta Inc. info@okta.com 1-888-722-7871

Moving Beyond User Names & Passwords Okta Inc. info@okta.com 1-888-722-7871 Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 Moving Beyond

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

Multi-Factor Network Authentication

Multi-Factor Network Authentication Multi-Factor Network Authentication Setup Guide Multi-Factor Network Authentication (also called GhostPorts) is a powerful security feature available with the Halo Workload Firewall Management security

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

sions ration Grad communications. feedback on their Hobsonss

sions ration Grad communications. feedback on their Hobsonss Grad SIS Gradu uate Admis sions Connect Integr ration Hobsonss Hobsons has been a great project and initiative, collaboratively developed and deployed between the Graduate Division and C&C. This year is

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Duo Two-Factor Authentication: Frequently Asked Questions

Duo Two-Factor Authentication: Frequently Asked Questions Duo Two-Factor Authentication: Frequently Asked Questions The following links are for frequently asked questions related to the Duo two-factor authentication: General Questions Using Two-Factor with Your

More information

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Enterprise Portal Built by and for Higher Education

Enterprise Portal Built by and for Higher Education www.apereo.org/uportal Enterprise Portal Built by and for Higher Education Now Responsive for All Devices along with Native App Experience There is a growing demand for higher education institutions to

More information

Why SMS for 2FA? MessageMedia Industry Intelligence

Why SMS for 2FA? MessageMedia Industry Intelligence Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email

More information

MIS Impact Report Duo Security looks to shake up authentication market with mobile and service focus Analyst: Steve Coplan 5 Dec, 2011 Duo Security named for the two-factor authentication technology for

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

THE CANVAS LMS RECOMMENDATION

THE CANVAS LMS RECOMMENDATION THE CANVAS LMS RECOMMENDATION Presented on: January 11, 2013 Prepared by: John Farquhar EXECUTIVE SUMMARY A pilot of the Canvas Learning Platform involving Western faculty, students and support staff,

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012 Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Rich Communication Suite Enabler. plus integration with your existing VoIP services

Rich Communication Suite Enabler. plus integration with your existing VoIP services Rich Communication Suite Enabler plus integration with your existing VoIP services Join the next generation telecom market and offer services that are blend the best features of Skype, Viber and WhatsApp.

More information

How to reduce the cost and complexity of two factor authentication

How to reduce the cost and complexity of two factor authentication WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime

More information

2-FACTOR AUTHENTICATION WITH

2-FACTOR AUTHENTICATION WITH 2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Picasso Recommendation

Picasso Recommendation Picasso Recommendation Mission The School of Dentistry for the University at Buffalo (UB) uses a custom application called Picasso to manage their clinic operations. Developed by two engineers in 1997,

More information

Open Source Enterprise Mobile Campus Solution. September 30, 2011

Open Source Enterprise Mobile Campus Solution. September 30, 2011 Open Source Enterprise Mobile Campus Solution September 30, 2011 umobile is a Jasig Project Sponsor open source software projects for higher education. Non-profit membership organization. Provides: Community,

More information

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy

More information

BlackShield ID Best Practice

BlackShield ID Best Practice BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

Getting Started With Halo for Windows

Getting Started With Halo for Windows Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Cisco ASA Authentication QUICKStart Guide

Cisco ASA Authentication QUICKStart Guide Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.

More information

CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES

CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES Nicholas Roy Penn State (Pennsylvania State University, The) Andrea Harrington Penn State (Pennsylvania State University, The) Michael

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc. Implementing two-factor authentication: Google s experiences Cem Paya (cemp@google.com) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal

More information

Mobilize Your Corporate Content and Apps Enable Simple and Secure Mobile Collaboration for Business. www.maas360.com

Mobilize Your Corporate Content and Apps Enable Simple and Secure Mobile Collaboration for Business. www.maas360.com Mobilize Your Corporate Content and Apps Enable Simple and Secure Mobile Collaboration for Business www.maas360.com Copyright 2014 Fiberlink, an IBM company. All rights reserved. Information in this document

More information

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA) Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected

More information

ADAPTIVE USER AUTHENTICATION

ADAPTIVE USER AUTHENTICATION ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Using GhostPorts Multi-Factor Authentication

Using GhostPorts Multi-Factor Authentication Using GhostPorts Multi-Factor Authentication With CloudPassage Halo GhostPorts is a powerful multi-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans.

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering

More information

The Top 7 Ways to Protect Your Data in the New World of

The Top 7 Ways to Protect Your Data in the New World of The Top 7 Ways to Protect Your Data in the New World of Shadow IT and Shadow Data Brought to you by Elastica and Centrify Introduction According to research conducted by Elastica, most companies use over

More information

Choosing the Right Active Directory Framework

Choosing the Right Active Directory Framework Choosing the Right Active Directory Framework April 14th, 2014 Introduction The problems that IT professionals face with the cloud generally involve extending a multitude of processes outside of the trust

More information