1 Hitachi ID Password Manager. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
|
|
- Britton Williamson
- 8 years ago
- Views:
Transcription
1 1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated Credential Management for Users: Passwords, encryption keys, tokens, smart cards and more. 2 Agenda Introducing Hitachi ID. Credential management challenges. Hitachi ID Password Manager: Features. Technology. Impact Hitachi ID Systems, Inc. All rights reserved. 1
2 3 Hitachi ID Corporate Overview Hitachi ID delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. Founded as M-Tech in A division of Hitachi, Ltd. since Over 1200 customers. More than 14M+ licensed users. Offices in North America, Europe and APAC. Partners globally Hitachi ID Systems, Inc. All rights reserved. 2
3 4 Representative Customers 5 Hitachi ID Suite 2015 Hitachi ID Systems, Inc. All rights reserved. 3
4 Slide Presentation 6 The Credentials Landscape PIN SaaS password Smart card PIN RS Secu A rid 159 The Cloud 759 OTP token Boot password OS password AD password Cached password Encryption key ERP password Laptop Mainframe pw App password Local password Cached password At office Phone ipad Local password Mobile Cached password Tablet At home 2015 Hitachi ID Systems, Inc. All rights reserved. 4
5 7 Problems Due To Complexity Security / Internal Controls IT Support Cost Sticky notes. Guessable passwords. Social engineering the help desk. High call volume. #1 incident type. Staffing for peak load. Audit User Service Is authentication reliable? What users are triggering lockouts? Who can or did reset whose password? Too many passwords. Too many login prompts. Frequent login problems Hitachi ID Systems, Inc. All rights reserved. 5
6 8 Too many passwords Hard to remember passwords Synchronize passwords High help desk call volume. Users write down passwords. Fewer, stronger passwords. Easy to remember, change. Lower help desk call volume. 9 Synchronization Features Transparent: Triggered from native password change. Available on AD, LDAP, RAC/F, etc. Web-based: Change passwords using web browser. Interactively show systems, policies. Expired password notification: . Web popup. Pre-empt native expiry Hitachi ID Systems, Inc. All rights reserved. 6
7 Slide Presentation 10 Users forget their password or PIN Users forget or lock out their password/pin Self-service reset sel f ser vi ce Business interruption: can t login. Support cost: high call volume. Security: help desk fooled into improper password resets. Fewer, shorter business interruptions. Lower support cost. Available 24x7, everywhere. Secure and convenient. 11 Self-Service Password/PIN Reset Reset passwords and/or clear lockouts: Directory, OS, DB, application. On-premise and SaaS (cloud). Server-based and cached on the user s device. Reset PINs: One time password tokens (e.g., RSA SecurID). Smart cards. Always accessible: PC, tablet or phone web browser. PC login screen. On the corporate network and over public Internet/WiFi/VPN. Via telephone call Hitachi ID Systems, Inc. All rights reserved. 7
8 12 Authentication prior to support Need to authenticate users without asking for their (forgotten) password or PIN Managed enrollment process Backup authentication factors are a pre-requisite to self-service. Automatically invite users to enroll. Forms for Q&A; phone number, etc. High user adoption leads to good ROI. 13 Managed Enrollment Prior enrollment is often a pre-requisite to self-service. Enrollment may include: Security questions. Mobile phone number (for SMS/PIN). Non-standard login IDs. Voice samples for biometric authentication. Hitachi ID Password Manager includes a robust, automated system to manage the enrollment process: Identify users who need to enroll. Send out invitations. Automated reminders. Launch browser to enrollment page at PC login time. Control pace of invitations (globally and per user). Mandatory enrollment is possible. Automated, managed enrollment significantly improves user adoption Hitachi ID Systems, Inc. All rights reserved. 8
9 14 Users tired of typing many passwords Users enter too many passwords Copy credentials from Windows to application login screens Friction between users and apps. User frustration. Faster, simpler logins. Business happier with IT. 15 HiLM Operation Users log into their workstation as before, using their network login ID and password. Hitachi ID Login Manager installs a network provider, which picks up the user s primary ID and password. HiLM monitors the applications that a user launches, watching for instances where the user retypes the primary ID and password. HiLM stores the locations where the user reused his/her primary ID or password. When a familiar authentication prompt reappears, HiLM automatically fills in the ID and/or password. HiLM can read login ID aliases from an AD attribute at login time, eliminating the need to synchronize login IDs Hitachi ID Systems, Inc. All rights reserved. 9
10 16 Mobile users have login problems Users may forget their primary or VPN password while off-site. Reset cached, VPN passwords over WiFi+VPN VPN Link WiFi Internet Laptop Cafe VPN Server HiPM Server Forgot cached Windows password: PC is a brick. Forgot VPN password: cannot communicate. Users can get back to work. Self-service from any device, at any location, any time. 17 Self-Service, Anywhere Self-service is complicated by connectivity and device options. User location Endpoint device Connectivity Reset/unlock Work. Home. Airport. Cafe. Partner office. Laptop. Tablet. Smart phone. Wired at work. Wired at home. WiFi at home. Public WiFi. Tethered phone. Cell modem. Network password. Cached password. Smart card PIN. Token PIN. Encrypted HDD. Example scenarios supported by Hitachi ID Password Manager: Reset forgotten, cached AD password at airport. Recover from forgotten full disk encryption password (via phone) Hitachi ID Systems, Inc. All rights reserved. 10
11 Slide Presentation 18 Off-site, Locked-out Password Reset Animation:../../pics/camtasia/v82/hipm-self-service-anywhere/hipm-self-service-anywhere.cam 19 Hitachi ID Mobile Access overview The challenge Hitachi ID Mobile Access Users want access to IAM from phone. Phone on the Internet, IAM on-prem. Don t want attackers probing IAM from Internet. 3 App for ios, Android. Device activation required (install key). Proxy service on DMZ or cloud. IAM, phone both call the proxy. No firewall changes required. IAM not visible on Internet. Messaging passing system: Exchange requests Outbound connections only Cloud Proxy 4G Firewall 70% 3:06 PM Firewall 1 Mon, 15 June 2015 Type to search... Personal Device 2 Public Internet DMZ Private Corporate Network IAM Server Worker thread: Give me an HTTP request HTTPS request: Includes userid, deviceid 20 Activate Mobile Access Animation:../../pics/camtasia/v9/enable-mobile-device-1/enable-mobile-device-1.mp Hitachi ID Systems, Inc. All rights reserved. 11
12 21 Forgotten encryption passwords Users with a cryptographically secured PC forget their pre-boot password Self-service key recovery over telephone/ivr Phone System Laptop User Phone HiTPM Key Recovery Server PC is a brick until unlocked. Support calls are long and costly. Users get back to work quickly. No costly help desk support call Hitachi ID Systems, Inc. All rights reserved. 12
13 22 Impact of Synchronization and SSPR calls problems 2015 Hitachi ID Systems, Inc. All rights reserved. 13
14 23 Multi-Master Architecture IVR server VPN server TCP/IP + AES Various Protocols Secure Native Protocol HTTPS Reverse web proxy system Load balancer Notifications and invitations Incident mgmt system Validate pw Tickets HR SQL DB Hitachi ID server System of record Native password change AD, Unix, OS/390, LDAP, AS400 Load balancer Password synch trigger systems SQL DB Replication Firewall Hitachi ID server Firewall Target systems with local agent: OS/390, unix, older RSA Proxy server (if needed) Data center A Data center B Web services Target systems with remote agent: AD, SQL, SAP, Notes, etc Target Systems Cloud-hosted, SaaS apps Remote Remote data data center center 2015 Hitachi ID Systems, Inc. All rights reserved. 14
15 24 Included Connectors Many integrations to target systems included in the base price: Directories: Any LDAP, AD, WinNT, NDS, edirectory, NIS/NIS+. Unix: Linux, Solaris, AIX, HPUX, 24 more variants. ERP: JDE, Oracle ebiz, PeopleSoft, PeopleSoft HR, SAP R/3 and ECC 6, Siebel, Business Objects. WebSSO: CA Siteminder, IBM TAM, Oracle AM, RSA Access Manager. Servers: Windows NT, 2000, 2003, 2008[R2], 2012, Samba, Novell, SharePoint. Mainframes, Midrange: z/os: RACF, ACF2, TopSecret. iseries, OpenVMS. Collaboration: Lotus Notes, inotes, Exchange, GroupWise, BlackBerry ES. Help Desk: ServiceNow, BMC Remedy, SDE, HP SM, CA Unicenter, Assyst, HEAT, Altiris, Clarify, RSA Envision, Track-It!, MS System Center Service Manager Databases: Oracle, Sybase, SQL Server, DB2/UDB, Informix, Progress, ODBC, Oracle Hyperion EPM Shared Services, Cache. HDD Encryption: McAfee, CheckPoint, BitLocker, PGP. Tokens, Smart Cards: RSA SecurID, SafeWord, RADIUS, ActivIdentity, Schlumberger. Cloud/SaaS: WebEx, Google Apps, MS Office 365, Success Factors, Salesforce.com, SOAP (generic) Hitachi ID Systems, Inc. All rights reserved. 15
16 25 Rapid Integration with Custom Apps Hitachi ID Password Manager easily integrates with custom, vertical and hosted applications using flexible agents. Each flexible agent connects to a class of applications: API bindings (C, C++, Java, COM, ActiveX, MQ Series). Telnet / TN3270 / TN5250 / sessions with TLS or SSL. SSH sessions. HTTP(S) administrative interfaces. Web services. Win32 and Unix command-line administration programs. SQL scripts. Custom LDAP attributes. Integration takes a few hours to a few days. Fixed cost service available from Hitachi ID. 26 Competitive Differentiation Integrated solution Always available Manage all credentials: OS, app passwords. Pre-boot passwords. On-premise and SaaS. Smart cards. OTP tokens connectors included. Full or phone browser. Voice call. PC login screen. Pre-boot (encrypted HDD). At work and off-site. Scalability Cost savings Multi-master architecture. Load balanced, replicated. Deploy across data centers. Multi-lingual. Reduce problem frequency (not just self-service). Managed enrollment to maximize adoption. Easy to deploy, maintain Hitachi ID Systems, Inc. All rights reserved. 16
17 27 The Leading Vendor Innovation Ongoing support Low cost Self-Service, Anywhere. Crypto key recovery. SSO without a password wallet. Responsive and skilled customer support. Unattended operation: Auto-discovery. Managed enrollment. Metrics and trend analysis. SIEM, help desk integration. Lost cost deployments. Minimal need for ongoing maintenance. Fixed-price engagements. 28 Summary An integrated solution for managing credentials: Immediate security benefit: password policy, help desk caller authentication. Low deployment cost, minimal ongoing investment, significant IT support savings. Always accessible: Web browser on PC, phone or tablet. Windows login prompt. Pre-boot encryption password prompt. Phone call / IVR. Available at work and while off-site connectors included. Learn more at Hitachi-ID.com/Password-Manager 500, Street SE, Calgary AB Canada T2G 2J3 Tel: Fax: sales@hitachi-id.com Date: May 22, 2015 File: PRCS:pres
1 Hitachi ID Suite. 2 Agenda. 3 Corporate. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Administration and Governance of Identities, Entitlements and Credentials. 2 Agenda Corporate. IAM problems
More information1 Hitachi ID Password Manager. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated Credential Management for Users: Passwords, encryption keys, tokens, smart cards and
More informationHitachi ID Password Manager Frequently Asked Questions for Network Architects
Hitachi ID Password Manager Frequently Asked Questions for Network Architects 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 How does Hitachi ID Password Manager reset passwords? 1 2 How
More information1 Hitachi ID Password Manager
1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated Credential Management for Users: Passwords, encryption keys, tokens, smart cards and
More informationHitachi ID Password Manager Frequently Asked Questions for Help Desk Managers
Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 What kind of call volume reduction can I expect? 1 2 Can I integrate
More informationSecure Management of Access to Privileged Accounts using Hitachi ID Privileged Access Manager
Secure Management of Access to Privileged Accounts using Hitachi ID Privileged Access Manager 2015 Hitachi ID Systems, Inc. All rights reserved. Every IT asset has at least one local, privileged login
More informationSelf-Service, Anywhere
2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Mobile users warned of password expiry 2 3 Reset forgotten, cached password while away from the office 2 4 Unlock encrypted
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More information1 Maximizing Value. 2 Economics of self-service. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Maximizing Value Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Getting value from Hitachi ID Password Manager by improving user adoption. 2 Economics of self-service 2015
More informationHitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationLarge Scale Password Management With Hitachi ID Password Manager
Large Scale Password Management With Hitachi ID Password Manager 2015 Hitachi ID Systems, Inc. All rights reserved. As users access ever more systems and applications, they accumulate passwords and other
More informationFrom Password Reset to Authentication Management: the Evolution of Password Management Technology
From Password Reset to Authentication Management: the Evolution of Password Management Technology 2010 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 In the Beginning: A Simple
More informationApproaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationSuccessful Enterprise Single Sign-on Addressing Deployment Challenges
Successful Enterprise Single Sign-on Addressing Deployment Challenges 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: User Problems with Passwords 2 3 Approaches
More informationMobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
More informationPassword Management Before User Provisioning
Password Management Before User Provisioning 2015 Hitachi ID Systems, Inc. All rights reserved. Identity management spans technologies including password management, user profile management, user provisioning
More informationProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
More informationIBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationP-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
More informationManageEngine Password Manager Pro Vs Thycotic Secret Server
ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on August 19, 2015) Feature ManageEngine Password
More informationPassword Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
More informationHitachi ID Password Manager Deployment Best Practices
Hitachi ID Password Manager Deployment Best Practices 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Project objectives 2 3 Stake-holders 4 3.1 System administrator........................................
More informationData Replication in Privileged Credential Vaults
Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches
More informationMobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
More informationCA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
More informationTFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationPassword Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More information> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional
Web Access Management May 2008 CA Canada Seminar > Please fill your survey to be eligible for a prize draw Only contact info is required for prize draw Survey portion is optional > How to Transform Tactical
More informationCA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
More informationRegulatory Compliance Using Identity Management
Regulatory Compliance Using Identity Management 2015 Hitachi ID Systems, Inc. All rights reserved. Regulations such as Sarbanes-Oxley, FDA 21-CFR-11 and HSPD-12 require stronger security, to protect sensitive
More informationCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
More informationFor Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.
Investment and Governance Division 614.995.9928 tel Ted Strickland, Governor 30 East Broad Street, 39 th Floor 614.644.9152 fax R. Steve Edmonson, Director / State Chief Information Officer Columbus, Ohio
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationOracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
More informationDirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationPasslogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationAccess Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationWhite Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
More informationSecuring your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
More informationTop 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper
Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012
More informationThe Centrify Vision: Unified Access Management
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationDirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationFileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
More informationHow To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationVoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk
VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...
More informationWorkspot. Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device. Technical White Paper
Workspot Workspace as a Service enables Secure Access to Desktops, Applications and Data from Any Device Technical White Paper Technical White Paper 1 Table of Contents Introduction... 4 Challenges with
More informationONE PRODUCT, THREE SOLUTIONS
ONE PRODUCT, THREE SOLUTIONS PRIVILEGED ACCOUNT MANAGEMENT REMOTE ACCESS MANAGEMENT PRIVILEGED SESSION MANAGEMENT Introduction Password Manager Pro is a complete solution to control, manage, monitor, and
More informationetoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationOndřej Výšek Sales Lead, Microsoft MVP. vysek@kpcs.cz
Ondřej Výšek Sales Lead, Microsoft MVP vysek@kpcs.cz Azure Active Directory Features Free edition Basic edition Premium edition Directory as a service User and group management using UI or Windows PowerShell
More informationAuthentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationSecurity Specifications
Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords
More informationEnterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationTable of Contents. Page 1 of 6 (Last updated 30 July 2015)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationThe Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
More informationAdaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationTwo-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
More informationLeveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
More informationDeriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
More informationClientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
More informationService Offering: Outsourced IdM Administrator Service
Service Offering: Outsourced IdM Administrator Service 2014 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 The Outsourced IdM Administrator Service 2 2.1 Hitachi ID Systems and
More informationSAM Enterprise Identity Manager
SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More informationEndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
More informationAmazon Elastic Compute Cloud Microsoft Active Directory
Feature Summary Manage Microsoft Windows, Active Directory, Exchange, ActiveSync IIS, SQL Server, DHCP, DNS, Cluster Server, System Center Operations Manager and System Center Mobile Device Manager, RSA,
More informationA Practical Path to Unified Identity Across Data Center, Cloud and Mobile
C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity
More informationThe Cloud, Mobile and BYOD Security Opportunity with SurePassID
The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,
More informationIBM InfoSphere Guardium
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationRSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
More informationHow To Write An Ets Request For Proposal (Rfp)
Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment
More informationBlackBerry Business Cloud Services. Administration Guide
BlackBerry Business Cloud Services Administration Guide Published: 2012-07-25 SWD-20120725193410416 Contents 1 About BlackBerry Business Cloud Services... 8 BlackBerry Business Cloud Services feature overview...
More informationEnterprise Single Sign-On
Enterprise Single Sign-On The Holy Grail of Computing Written by Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is protected
More informationABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
More informationIBM Security Identity Manager
IBM Security Identity Manager Introduction for Technical Sales Agenda Identity Management update Privileged Identity Management update Functional Overview Market and Licensing Information 2 Security Identity
More informationManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)
ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3
More informationSophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
More informationWHITEPAPER. Identity Management ROI Calculation Case Study. T h i n k I D e n t i t y. March 2006
Identity Management ROI Calculation Case Study March 2006 T h i n k I D e n t i t y Table of Contents INTRODUCTION...3 IDENTITY & ACCESS MANAGEMENT COMPONENTS...4 THE BENEFITS OF IDENTITY & ACCESS MANAGEMENT...4
More information(A) User Convenience. Password Express Benefits. Increase user convenience and productivity
Comparison Feature Sheet Feature Sheet is a next generation password management and password synchronization tool that provides users with reduced sign on experience across all applications and password
More informationOnegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
More information