Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
|
|
- Gyles Stewart
- 8 years ago
- Views:
Transcription
1 Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering
2 What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based Authentication technology Measures risk associated with a user s login and post-login activities Determines level of authentication required based on risk, policies, and customer segmentation 2
3 The Risk Engine Gathers Facts Build Profiles, Generates Predictors, & Learns Assesses Risk Internet Protocol (IP) Information Proprietary Device Fingerprints RSA Risk Engine Scoring Results User Behavior RSA efraudnetwork Profiling 3
4 Hosted or On Prem 4
5 On Premise J2EE Java Based Application installed and maintained within a customer s own datacenter. Flexible Platform Support Including: OS: Windows Server, Red Hat Enterprise Linux, Solaris and AIX Application Servers: WebSphere, Web Logic, JBoss, Tomcat DB Servers: Oracle, MS SQL Server 5
6 Hosted AA fully hosted in the cloud by RSA. Integration handled via SOAP calls over HTTPS. Access to back office tools granted via online web portals. New re-architected 12.0 platform to be released Q4 2014, running on an elastic cloud provider. 6
7 Integration Method Direct API or Adapter 7
8 Direct Integration Standard code (SOAP) based integration following Request- Response model between Application and AA Server Customer integrate into their own applications by developing against the AA WSDL Standard methods include: Analyze, Notify, Query, Challenge, UpdateUser, CreateUser, Authenticate 8
9 SOAP Request Example <soapenv:envelope xmlns:soapenv=" <soapenv:body> <ws:analyze> <ws:genericactiontypes>sessionsignin</ws:genericactiontypes> <ns1:httpacceptchars>iso ,utf-8;q=0.7,*;q=0.3</ns1:httpacceptchars> <ns1:httpacceptlanguage>en-us,en;q=0.8</ns1:httpacceptlanguage> <ns1:httpreferrer> <ns1:ipaddress> </ns1:ipaddress> <ns1:useragent>mozilla/5.0 (Windows NT 5.2; WOW64) AppleWebKit/ (KHTML, like Gecko) Chrome/ Safari/537.17</ns1:userAgent> <ws:username>jmurray</ws:username> <ws:userstatus>verified</ws:userstatus> <ws:usertype>persistent</ws:usertype> <ws:apitype>direct_soap_api</ws:apitype> <ws:requesttype>analyze</ws:requesttype> <ws:version>7.0</ws:version> <ws:callercredential>password</ws:callercredential> <ws:callerid>caller</ws:callerid> </ws:analyze> </soapenv:body> </soapenv:envelope> 9
10 AA SaaS Direct Integration Architecture INTERNET Firewall DMZ Firewall TRUSTED ZONE Customer browser Web servers App servers App database Credential store SOAP RSA Adaptive Authentication (SaaS) 10
11 AA On Direct Prem Integration Direct Integration Architecture INTERNET DMZ TRUSTED ZONE Customer browser Web servers App servers App database Credential store SOAP RSA Adaptive Authentication RSA AA database Firewall Firewall 11
12 Adapter Pre-built integrations with popular enterprise portals No software development required Full customizable pages handle entire workflow and interaction with AA Server including: Enrollment Forensics Collection Challenging Blocking Current RSA Adapters RSA Access Manager* Tivoli Access Manager CA SiteMinder Juniper SSL VPN Cisco SSL VPN Citrix NetScaler Microsoft UAG 12
13 Sample Adapter Architecture - Citrix 13
14 Web vs. Mobile 14
15 Mobile Browser - Data Collection Data collected via JavaScript: Browser characteristics: Browser type, version, language, etc. Device forensics: Time zone, Screen resolution. Geolocation: Latitude, Longitude, Accuracy, Additional Information: User Agent String IP Address Cookie FSO WAP sites: WAP header sent as the HTTP header In the Other ID field in the API send the WAP client id 15
16 Mobile Apps Data Collection Data elements collected and sent to AA using either Mobile SDK or a native API Location information collection Mobile device identification data Device model Device multitasking supported Device Name Device System Name Device System Version Language Wi-Fi Mac Address Wi-Fi Networks data: Station Name Wi-Fi Networks data: BBSID Wi-Fi Networks data: Signal Strength Wi-Fi Networks data: Channel Wi-Fi Networks data: SSID Cell Tower ID Location area code Screen size Number of address book entries RSA Application key MCC MNC OS ID Location error code 16
17 What To Protect Login or Post Login Transactions 17
18 Transaction Monitoring Allows AA Risk Analysis and Actions to be applied to Post Login Events Has the ability to monitor both: Profile Changes Changes to the user s password, address, e- mail, security question, phone numbers, etc. Funds or Financial Transfers Add Payee, Add Beneficiaries, Request Credit Increase, Request Checks, etc. Events will utilize additional information as part of risk model. E.g. Payment: Amount, Payee Acct #, Currency, Type, Time, etc. 18
19 AA Full Event Type List ACTIVATE CARD ADD PAYEE CHANGE ADDRESS CHANGE ALERT SETTINGS CHANGE AUTH DATA CHANGE CHANGE LIFE QUESTIONS CHANGE LOGIN ID CHANGE PASSWORD CHANGE PHONE CHANGE STATEMENT SETTINGS CHANGE STU CLIENT DEFINED CREATE USER DEPOSIT EDIT PAYEE ENROLL FAILED CHANGE PASSWORD ATTEMPT FAILED LOGIN AUTHENTICATION FAILED OLB ENROLLED ATTEMPT OLB ENROLL OPEN NEW ACCOUNT OPTIONS TRADE PAYMENT READ SECURE MESSAGE REQUEST CHECK_COPY REQUEST CHECKS REQUEST CREDIT REQUEST NEW CARD REQUEST NEW PIN REQUEST STATEMENT COPY SEND SECURE MESSAGE SESSION SIGNIN STOCK TRADE UPDATE USER USER DETAILS VIEW CHECK VIEW STATEMENT 19
20 Transaction Monitoring More Fraud Stopped and Fewer Customers Challenged Increase in fraud detected when adding transaction level protection Increase in fraud detected from Device ID to Device ID & efraudnetwork 20 20
21 Challenge Methods What are my options? 21
22 Step-up Authentication An additional factor or procedure that validates a user s identity, out-of-the-box options include: Challenge Questions Secret questions that have been selected & answered by end user during enrollment Out-of-Band Authentication One time passcode sent to the end user via phone call, SMS text message or . Transaction details, such as transfer amount, can be included Dynamic Knowledge- Based Authentication (KBA) Dynamic questions that are unique to the end user, and generated from publically & commercially available data in real-time Provided by LexisNexis Identity Verification service (available in US & UK) Multi-credential Framework Allows organizations to use in-house or third party method through a RSA Professional Services engagement 22
23 RSA Out-of-Band Authentication One Time Password RSA Generated OTP RSA Delivery Customer Delivery Delivery Method Phone SMS Phone SMS Channel Delivery Mobile Landline Mobile Landline 23
24 THANK YOU
ProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
More informationADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
More informationOut-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
More informationCA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationWhite paper. Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications
White paper Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications As the usage of online portals, SSL VPN applications, and web access management (WAM) products continue
More informationRSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
More informationCA RiskMinder. Java Developer's Guide. r3.1
CA RiskMinder Java Developer's Guide r3.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration
More informationCitrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.
More informationID Director for Windows
2016 ID Director for Windows FINGERPRINT AUTHENTICATION FOR MICROSOFT NETWORKS BIO-key International www.bio-key.com Introduction Fingerprint biometrics are commonly deployed by organizations seeking to
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix
More informationRSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
More informationMulti-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
More informationSOLUTION BRIEF CA ADVANCED AUTHENTICATION. How can I provide effective authentication for employees in a convenient and cost-effective manner?
SOLUTION BRIEF CA ADVANCED AUTHENTICATION How can I provide effective authentication for employees in a convenient and cost-effective manner? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
More informationSecurity Upgrade FAQs
Security Upgrade FAQs Your online security is important to us. Soon, we ll be upgrading your online banking experience to include a new security service, which is known in the online security industry
More informationSNOW LICENSE MANAGER (8.X)... 4
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Unix Client for OS
More informationVMware Horizon View for SMS PASSCODE SMS PASSCODE 2014
VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware View Radius authentication configuration for SMS PASSCODE With the introduction of RADIUS authentication support in VMware View it is possible
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationIBM Tivoli Directory Integrator
IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02
More informationSugar Professional. Approvals + + + + Competitor tracking + + + + Territory management + + + + Third-party sales methodologies + + + +
Professional Corporate Enterprise Ultimate List price / user / month $35 $45 $60 $150 List price / user / year (contractual term) $420 $540 $720 $1,800 Application or user limits no limits no limits no
More informationSecurity Specifications
Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords
More informationOracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
More informationEXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationAccess Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
More informationCompTIA Security+ Certification SY0-301
CompTIA Security+ Certification SY0-301 Centro Latino, Inc. Computer Technology Program Prof: Nestor Uribe, nuribe@centrolatino.org www.centrolatino.org 267 Broadway, Chelsea, MA 02150 Tel. (617) 884-3238
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationSugar Professional. Approvals + + + + Competitor tracking + + + + Territory management + + + + Third-party sales methodologies + + + +
Professional Corporate Enterprise Ultimate List price / user / month $35 $45 $60 $100 List price / user / year (contractual term) $420 $540 $720 $1,200 Application or user limits no limits no limits no
More informationSOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?
SOLUTION BRIEF ADVANCED AUTHENTICATION How do I increase trust and security with my online customers in a convenient and cost effective manner? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
More informationSAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP
More informationPMDP is simple to set up, start using, and maintain
Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - info@ibelem.com PMDP is simple to set
More informationAccess Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
More informationQuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationRequirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
More informationMQ Authenticate User Security Exit Overview
MQ Authenticate User Security Exit Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com Table of Contents 1INTRODUCTION...1
More informationHow to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationUltra-strong authentication to protect network access and assets
Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.
More informationDIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationWHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management: Solution Architecture
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management: Solution Architecture 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT: SOLUTION ARCHITECTURE ca.com Table of Contents Introduction 3 The
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationThis document lists the configurations that have been tested for the Oracle Primavera P6 version 7.0 release.
Oracle Primavera P6 Tested Configurations Release Version: 7.0 Date: November 2014 Revision: 7.0.0.0.16 This document lists the configurations that have been tested for the Oracle Primavera P6 version
More informationtibbr Now, the Information Finds You.
tibbr Now, the Information Finds You. - tibbr Integration 1 tibbr Integration: Get More from Your Existing Enterprise Systems and Improve Business Process tibbr empowers IT to integrate the enterprise
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationUsing a Web Service Dispatcher with SMS PASSCODE version 7.2 SMS PASSCODE 2014
Using a Web Service Dispatcher with SMS PASSCODE version 7.2 SMS PASSCODE 2014 SMS PASSCODE Web Service Dispatching This document outlines the process for activating a Web Service Dispatcher for sending
More informationWhite Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationN02-IBM Managed File Transfer Technical Mastery Test v1
N02-IBM Managed File Transfer Technical Mastery Test v1 Number: 000-N02 Passing Score: 750 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ The IBM/Sterling Managed File Transfer Suite
More informationImplementation Guidelines. Dyna Pass. Wireless Secure Access
Implementation Guidelines Dyna Pass Wireless Secure Access Implementation Guidelines Implementation Guidelines Abstract This document describes implementations. Examples are based on different technologies
More informationExternal authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
More informationRisk Based Authentication and AM 8. What you need to know!
Risk Based Authentication and AM 8 What you need to know! Agenda Authentication Manager 8 Customer Use Cases Risk Based Authentication (RBA) RBA Integration and Deployment 2 SecurID / Authentication Manager
More informationPalo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015
SMS PASSCODE 2015 Guide for implementing SMS PASSCODE protection with Palo Alto Networks. This document outlines the process of configuring a Palo Alto Networks GlobalProtect VPN with SMS PASSCODE RADIUS
More informationipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationTwo-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationESET Secure Authentication Java SDK
ESET Secure Authentication Java SDK Getting Started Guide Document Version 1.0 ESET Secure Authentication Java SDK 2 Introduction This document details what is required to add a second authentication factor
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationEntrust IdentityGuard
+1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
More informationM2M: EE Connectivity. 22 July 2015 2015, EE LIMITED 1
M2M: EE Connectivity 22 July 2015 2015, EE LIMITED 1 EE network and service access Our M2M service gives you access to our mobile network, to facilitate communication between devices and application servers,
More informationCompany Background Something you know PIN or Password Something you have a token; mobile phone Something you are biometric (retina scan / fingerprint) Something you use the device through which you are
More informationExternal Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationProduct Information. Sugar vs Zoho. Features Comparison
Product Information vs Zoho Features Comparison CRM Community Price / user / month $0 $35 $45 $60 $100 $0 $12 $25 Price / user / year $0 $420 $540 $720 $1,200 $0 $144 $300 User limits no limit no limit
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationHOB WSP Web-Server-Gate Secure Access for Mobile Users and Business Partners to Enterprise Web Servers
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: 09103 / 715-0 Fax: 09103 / 715-271 E-Mail: support@hob.de Internet: www.hobsoft.com HOB WSP Web-Server-Gate Secure Access for Mobile Users and
More informationWHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
More informationClientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
More informationCA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
More informationAdobe Experience Manager: Commerce
Adobe Experience Manager: Commerce Datasheet Adobe Experience Manager: Commerce Benefits of e-commerce capabilities Agile merchandising and marketing Rapid and flexible customization of the shopping experience
More informationBlending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
More informationEditions Comparison Chart
Sugar Professional Sugar Enterprise Sugar Ultimate List price / user / month $35 $60 $150 List price / user / year (contractual term) $420 $720 $1,800 Application or user limits no limits no limits no
More informationUltra-strong authentication to protect network access and assets
Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.
More information> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional
Web Access Management May 2008 CA Canada Seminar > Please fill your survey to be eligible for a prize draw Only contact info is required for prize draw Survey portion is optional > How to Transform Tactical
More informationCase Study. Web Application for Financial & Economic Data Analysis. www.brainvire.com 2013 Brainvire Infotech Pvt. Ltd Page 1 of 1
Case Study Web Application for Financial & Economic Data Analysis www.brainvire.com 2013 Brainvire Infotech Pvt. Ltd Page 1 of 1 Client Requirement This is a highly customized application for financial
More informationCitrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
More informationHOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
More informationSymantec App Center 4.0 Admin Documentation
Symantec App Center 4.0 Admin Documentation Installation Planning Guide September 2012 Symantec Corporation, 2012 Page 1 Table of Contents Purpose of Document... 3 Deployment Options Overview... 3 Public
More informationTG Web. Technical FAQ
TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationMAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More informationContents. Primavera P6 Tested Configurations Release Version: 6.2.1 Date: December 2013 Revision: 6.2.1.0.7
Primavera P6 Tested Configurations Release Version: 6.2.1 Date: December 2013 Revision: 6.2.1.0.7 This document lists the configurations that have been tested for the Primavera P6 version 6.2.1 release.
More informationHP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
More informationTrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
More informationTested configuration for Major versions of Primavera:-
Tested configuration for Major versions of Primavera:- s 7:- This configurations that have been tested for the Primavera P6 version 7.0 release is shown below. s Generic Platform Platform Collation Page/Locale
More informationSystem requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)
Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information
More informationOndřej Výšek Sales Lead, Microsoft MVP. vysek@kpcs.cz
Ondřej Výšek Sales Lead, Microsoft MVP vysek@kpcs.cz Azure Active Directory Features Free edition Basic edition Premium edition Directory as a service User and group management using UI or Windows PowerShell
More informationHow To Choose An Authentication Solution From The Rsa Decision Tree
White paper The RSA Decision Tree: Selecting the Best Solution for Your Business What is the best authentication solution for my business? This is a recurring question being asked by organizations around
More information