SETECS, Inc. SETECS, Inc.
|
|
|
- Lee Rodgers
- 10 years ago
- Views:
Transcription
1 1 SETECS, Inc. Next Generation Security Software for Identity and Access Management Enterprise Group (Collaborative) Applications SETECS, Inc Georgia Avenue Silver Spring, MD Tel: (301) Fax: (301)
2 Identity and Access Management (IAM) 2 a comprehensive set of solutions used to identify users in a system (employees, customers, contractors, etc.) and control their access to resources within that system by associating user rights and restrictions with the established identity. Web SSO, host SSO, user provisioning, advanced authentication, legacy authorization, public key infrastructure (PKI), and directory services are all critical components of identity and access management. [ Worldwide Security Software Forecast and 2003 Vendor Shares, IDC, December 2004] Need for more comprehensive and integrated identity and access management solutions to: Reduce costs, and Increase security and productivity within and across enterprises [ Worldwide Security Software Forecast and 2003 Vendor Shares, IDC, December 2004] The three most important security challenges facing corporations in 2005 are the need to: Beef up threat management capabilities Improve on identity management processes, and Tie IT and physical security capabilities together for greater authentication and access control [ Three Security Imperatives For 2005, Bloor Research, February 2005]
3 Smart Card Emerging as Major Component 3 Large and growing market NIST driving common identification standard for Federal employees s & contractors based on smart card (FIPS 201) $446M in 2003, will reach $1.35B in 2007 [Datamonitor,, Apr 2004] Following recent HSPD-12, multi billion dollar market 40M+ cards to be purchased by NASA, DOD, DHS, DI, VA via new GSA contract Identity and Access Management $2.2B in 2003, will reach $3.5B in 2008 [IDC, Dec 2004] SETECS Integrated IAM System Comprehensive identity and credential management (OneMAN ) Scalable across federated domains (OnePKI ) Strong authentication with smart card out of the box (OneCARD ) Smart card issuing station and middleware Single sign-on and WSS authorization and access control (OneNET )
4 Enterprise Group (Collaborative) Applications 4 Collaboration technologies enable document viewing, sharing and management; Still, real-time collaboration, which is enabled by instant messaging, presence-enabled applications, is the area that s growing the fastest. [ Leveraging Real-Time Communications in the Enterprise, Nemertes, 6 August 2004] Existing solutions with serious security limitations: Identities and documents stored unprotected Identities and transactions data over the network in clear SSL and digital certificates only temporary encryption and not scalables [ Instant Messaging: Time For IT To Pay Attention, Business Communications Review, January 2004] New legislations changing requirements: Sarbanes-Oxley Act and HIPAA Manage, secure and store all information within the enterprise [ Information Management for Compliance", IDC, 2005] ["Worldwide Archiving Applications Forecast and 2003 Vendor Shares: To Be Dedicated Solutions or Not to Be - That Is the Question for the Forecast Scenarios", IDC, December 2004]
5 Security and Collaboration are Converging 5 Large and growing market Enterprise Instant Messaging: 80M business users today, reaching 500M by 2007 $220M in 2004, will reach $624M in 2008 [IDC, Sept 2004] Collaboration Software: $2B in 2002, will be over $2.5B in 2006, with advanced collaboration ation tools from $435M to $923M [Ovum, Mar 2003] Web Application Security: $400M in 2004, will reach $1.8B in 2007 [Yankee Group, Jul 2003] SETECS Secure Enterprise Group Applications System Dynamic real-time key distribution and management system with strong protection of crypto keys (OneGroup Policy & Key Distribution ) Browser-based thin client, no software installation for PC/PDA/ Smartphone clients (OneGroup Web-based based Thin Client) Multiple secure applications Secure sharing and archiving of documents, secure instant messaging and whiteboard
6 Security Problems and Solutions 6 APPLICATIONS INDUSTRY VERTICALS SETECS PRODUCTS PROBLEMS SOLUTIONS (SECURITY SERVICES) Secure Web (epayments, eforms, etaxes) Secure Messages (IM, Whiteboard) Secure Documents (Sharing, Archiving) Secure (Signed, Encrypted) Gov't Financial Health Care Other Commercial SETECS OneMAN SETECS OneNET SETECS OneGroup Identity theft Lack of identity verification Unauthorized transactions and activities Illegal access Spyware, lack of privacy, confidentiality, availability Reliable Identity Management Strong Authentication Authorization Policy-based Access Control Resource Security
7 SETECS Products: Enabling Technologies 7 OneFramework Security Framework for Fixed and Dynamic/Mobile Network Environments Collection of cryptographic objects Collection of security GUI objects Collection of security protocols objects (SSL, PKCS, strong authentication) OneCARD Smart Cards Middleware Platform Smart cards middleware based on Open Card Framework (Java objects) Smart cards middleware based on Government Smart Cards standard Virtual card system based on Government Smart Cards standard OnePKI Scalable Public Key Infrastructure Top CA : CA server at the root of the PKI with self signed signed certificate, certifying Policy CA servers and cross-certifying certifying with other Top CA servers Policy CA : CA server under Top CA server enforcing certification policy Hierarchy CA : Intermediate CA server between Policy CA server and multiple Local CA servers (optional) Local CA : CA server issuing users and application servers rs certificates PKI Client: Performs client certification functions with all CA servers
8 SETECS Products: Modular Applications 8 OneMAN Security Administration and Management OneMAN Security : registration, certification, and strong authentication of all network components and resources OneMAN Console: administrative interface to OneMAN OneNET Security System for Web Services OneNET : security proxy for multiple application servers (Web, SQL, shared documents, etc) with multiple security protocols OneNET Console: administrative interface to OneNET OneGroup Secure Group Applications OneGroup : security server for administrative group functions and key distribution protocol OneGroup Console: administrative interface to OneGroup OneGroup Thin Client: user interface for various secure group applications (secure IM, secure whiteboard, and secure sharing of documents) for PCs and PDAs
9 SETECS OneMAN Security Administration 9 Security Administration and Web Authorization Security Domain Administrator OneMAN Console OneCARD Smart Cards Administration OneMAN Registration DB LDAP/X.500 Directory Local CA User and servers registration and credential management (ID, digital certificates, smart cards)
10 Application: Secure /Secure Web (SSL) 10 OneMAN Console Domain Security (DSS) MySQL (Optional) Registration DB Apache Tomcat LDAP/X.500 Directory CA Web OneMAN Request and receive 1 2 browser s certificate 1 Request and receive Web server s certificate Application/Web 4 Secure Web (SSL) Web Apache Tomcat 3 Secure (signed and encrypted) s
11 SETECS OnePKI Scalable PKI 11 OnePKI PCA TCA TCA Global PKI PCA HCA HCA Security Administration and Web Authorization Security Domain Administrator OneMAN Console OneCARD Smart Cards Administration OneMAN Registration DB LDAP/X.500 Directory Local CA Full PKI management
12 SETECS OnePKI Alternative Topologies 12 Bridge CA Top CA Top CA Policy CA Policy CA Policy CA Hierarchy CA Hierarchy CA Local CA Local CA Single CA Local CA User User User User Web and Other s
13 SETECS OneNET Web Services Security 13 OneNET: Web Services Security Security proxy for multiple web application servers WSS tickets for single sign-on Web authorization Domain Security (DSS) OneMAN and OneNET Console MySQL Registration DB Apache Tomcat (Optional) LDAP/X.500 Directory CA Web Services (SAML) OneNET Web OneMAN
14 Application: Single sign-on and Web authorization 14 OneMAN and OneNET Console Domain Security (DSS) MySQL (Optional) Registration DB Apache Tomcat LDAP/X.500 Directory CA Web Services (SAML) Web OneMAN OneNET 1 Login in OneNET server Web authentication Application/Web 4 WSS ticket 3 Click on any Web server OneNET Application WSS ticket 2 Get master ticket from OneNET server 5 Access and authorization Web Services (SAML) Web
15 SETECS OneGROUP Secure Group Applic. 15 OneGroup Console OneGroup OneGroup Console Group Security Authorization Administration Group Keys Group Offices Protected Documents Secure Applications User N OneGroup Thin Client User 1 User 2 User 3 Protected Messages
16 SETECS End-to-End Security (Single Domain) 16 OnePKI PCA TCA TCA Global PKI PCA HCA HCA Security Administration and Web Authorization Security Domain Administrator OneMAN Console OneCARD Smart Cards Administration OneMAN Registration DB LDAP/X.500 Directory Local CA OneNET Group Security Authorization OneGroup Administration Console OneGroup OneGroup Console Group Offices Secure Applications Users OneGroup Thin Client OneNET Application Web
17 SETECS Technology Advantages 17 Integrated Security System for Identity and Access Management Reliable identity management (registration, certification) Strong authentication (dig cert, smart card, biometrics) Authorization/access based on policy and roles (WSS, SSO, federated domains) Scalable across federated domains Next generation security software for group applications Dynamic group keys Scalable, on-demand user groups with forward and backwards confidentiality Protection of keys Stronger access control Management of keys for long-term access - Archiving of documents/messages for future retrieval Comprehensive Security Framework Written in Java, runs on any platform and communication protocol Extendable to Mobile/Wireless Environments Security software modules encrypted and self-protected Patent application
18 18 SETECS, Inc.
19 SETECS Profile 19 Maryland C-Corp C Corp established in March 2004 But with a long history Located in the Silver Spring Innovation Center Growing rapidly Four principals, four software developers Several sales agents under commission plan Multiple channel partners Significant corporate results Products released in Q SBIR and TEDCO awards; several reseller and technology partnership agreements; product deployments and revenue Focus on company growth Expand customer base
20 SETECS Management Team 20 Industry Experience and Direct Expertise in Technology and Market Development Sead Muftic, President & CEO International expert in internet security technologies Founder, Chairman & CTO of Entegrity Solutions and COST AB PhD in Computer Security from CS/OSU (1976) John McWilliams, III, VP of Sales & Marketing 20+ years IT security industry IPO and acquisition experience V One, Trusted Information Systems, Network Associates, SSP Litronic Held USN Top Secret Clearance, attended GMU Stefano Baroni, VP of Business Development 10+ years in technology and business development Director of Product Management at Corvis; ; Bell Labs/Lucent Technologies PhD in EE from UCL, Georgetown MBA Mark Heffernan, VP of Finance & Administration 20+ years experience in finance and operations management President of DMS, Inc.; VP of Administrative Operations at JHPIEGO/JHU Wharton MBA, Maryland CPA
21 Commercialization and Customers 21 Channel approach with ISV, OEM & Reseller Partners for both Gov t & Commercial Markets ISV: Idea Integration and SCI Group OEM: Operational Research Consultants (ORC) U.S. Reseller: Intelligent Decisions and JB Cubed Intl. Resellers: Finally Software and XianGroup Professional Services agreements with World Bank and Pragmatics
22 Early Projects and Beta Customers 22 Interoperability Projects and Beta Customers NSA/DoD: Federal Bridge CA interoperability project NIST/DoD: smart cards project SSA: Web services project NSA: Secure group communication pilot NOAA: Agency-wide PKI pilot About 20 pilots worldwide (managed by Channel Partners)
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file
1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
NetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004 Stefan Kotes, Engineering Manager Agenda Tumbleweed company overview Certification
HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security
HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security March 2, 2001 Cy D. Ardoin, Ph.D. 2 Agenda Quick View of Security Strategy for Security Quick View
SIGNIFICANT CHANGES DOCUMENT
SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Axway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
Department of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA [email protected] General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security
TM the world s leading PKI www.baltimore.com global e security Bringing Real Business On-Line The Internet is now forming a key part of organizations operating strategy. Although most companies accept
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Public Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013
2013 PKI Made Easy: Managing Certificates with Dogtag Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 Agenda What is PKI? What is Dogtag? Installing Dogtag Interacting with Dogtag using REST Future
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
Oracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman
NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman The Slow Convergence of PKI and Kerberos At Connectathon 1995 Dan Nessett of Sun Microsystems was quoted saying Kerberos will
Controlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
How To Create A Global Signer For The Internet Of Everything
Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
An Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
Angel Dichev RIG, SAP Labs
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL
The Cloud, Mobile and BYOD Security Opportunity with SurePassID
The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio
Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points
Configuring DoD PKI This document describes the procedures to configure an XML Firewall that is interoperable with the United Stated Department of Defense (DoD) Public Key Infrastructure (PKI). High-level
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Identity Relationship and Access Management for the Extended Enterprise
Identity Relationship and Access Management for the Extended Enterprise Benefits in External Identity Management CONTENTS Introduction... 3 Internal vs External identities... 3 Productivity vs Convenience...
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in
at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure
PKI: Public Key Infrastructure
PKI: Public Key Infrastructure What is it, and why should I care? Conference on Higher Education Computing in Kansas June 3, 2004 Wes Hubert Information Services The University of Kansas Why? PKI adoption
Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation
Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role
Comprehensive Endpoint Security
Comprehensive Endpoint Security Protecting Data-at-Rest Compliance with data and security regulations Joseph Belsanti Director, Marketing WinMagic Inc. Agenda Key Messages Company Snapshot Evaluation Criteria
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
GSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Ensuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
PingFederate. Identity Menu Builder. User Guide. Version 1.0
Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite
GFIPM Implementation Guide Version 1.0
About the Document Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The Global Federated Identity and Privilege Management
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Security Services. Benefits. The CA Advantage. Overview
PRODUCT BRIEF: CA SITEMINDER FEDERATION SECURITY SERVICES CA SiteMinder Federation Security Services CA SITEMINDER FEDERATION SECURITY SERVICES EXTENDS THE WEB SINGLE SIGN-ON EXPERIENCE PROVIDED BY CA
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector
Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.
The way the world does business is changing, and corporate security must change accordingly. For instance, e-mail now carries not only memos and notes, but also contracts and sensitive financial information.
Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2
Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
