Securing the Connection with Remote Users Leveraging Strong Authentication and VPNs to Secure Access to the Enterprise
|
|
|
- Andrea George
- 10 years ago
- Views:
Transcription
1 Securing the Connection with Remote Users Leveraging Strong Authentication and VPNs to Secure Access to the Enterprise Organizations today are feeling increased pressure to lower the costs of doing business. As a part of addressing that pressure, many organizations have implemented Virtual Private Networks (VPNs) to provide remote users with the access to the corporate resources that they need at dramatic cost-savings over previous methods. This whitepaper discusses the various authentication mechanisms available for VPNs and outlines how strong authentication based on digital IDs can help organizations realize cost savings and increase service levels for users while maintaining high levels of security. June 2004 Copyright 2004 Entrust.
2 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company and product names are trademarks or registered trademarks of their respective owners. The material provided in this document is for information purposes only. It is not intended to be advice. You shall be solely responsible for acting or abstaining from acting based upon the information in this document. ENTRUST DOES NOT WARRANT THE QUALITY, ACCURACY OR COMPLETENESS OF THE INFORMATION CONTAINED IN THIS DOCUMENT. SUCH INFORMATION IS PROVIDED "AS IS" WITHOUT ANY REPRESENTATIONS, WARRANTIES AND/OR CONDITIONS OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, BY USAGE OF TRADE, OR OTHERWISE, AND ENTRUST SPECIFICALLY DISCLAIMS ANY AND ALL REPRESENTATIONS, WARRANTIES, AND/OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, OR FITNESS FOR A SPECIFIC PURPOSE. Copyright 2004 Entrust.
3 Table of Contents 1 Introduction Virtual Private Networks for Remote Access Private Networks The Internet a Public Network Virtual Private Networks VPN Challenges Basic and Strong Authentication Weaknesses in Password Authentication Alternatives Time-synchronous Tokens Certificate-based Authentication Entrust Secure Identity Management Solution Strong Authentication for VPN Solutions The Business Benefits Entrust Solution Components Strong Authentication for VPN Secure User Provisioning The Need to Act Now About Entrust...10 Page i
4 1 Introduction In today's competitive environment real-time communication between subsidiaries, offices and employees around the world is imperative. Additionally, an ever-growing remote workforce requires access to the corporate applications and information they need to perform their jobs. As a result, organizations have implemented Virtual Private Networks (VPNs), which leverage secure connections over the Internet. VPNs provide remote workers and offices with anytime, anywhere access to the corporate network at dramatic cost-savings versus dial-up access or leased lines from telecommunications carriers. VPNs allow an organization to easily build, manage and operate low-cost private networks using the Internet to connect mobile and remote workers, remote offices and branch offices more efficiently. Leveraging the Internet allows the organization to extend remote access to more employees, helping to improve overall employee productivity and ultimately helping to drive greater efficiencies and returns. VPNs are a particularly attractive option for organizations that have large numbers of remote users and /or multiple locations to connect to the main corporate network. Since VPNs provide a door from the Internet into the corporate network and all its resources, security is of the utmost importance. The security of the network is only as strong as the method used to identify the users or devices at each end of the communication. Many options are available to verify the identity of the user accessing the VPN, each of which provide different levels of security and manageability. These range from username/passwords to timesynchronous passwords and tokens and certificate/private key based digital IDs. By delivering and managing digital IDs for strong identification of users and devices communicating and exchanging information over a VPN, Entrust products provide security for organizations deploying VPNs Entrust products allows them to provide access to a full range of sensitive information, enabling organizations to unlock the promise of VPNs, while reducing user deployment and maintenance costs. This paper outlines the value of VPNs as a remote access solution. It highlights the benefits and drawbacks of enabling remote access over the Internet as opposed to using a private network. The discussion will then focus on the challenges found in simply using commercial off-the-shelf VPN solutions from two perspectives: 1. the security of the off-the-shelf solution with a focus on authentication security, and 2. the deployment of the VPN solution with a focus on user management. After discussing the challenges, the available solutions will be outlined with a focus on strong authentication and the role it plays in securing access to an organization s sensitive applications and data. The paper will conclude with an overview of how Entrust products deliver strong authentication for VPN deployments, and the role these products play in the Entrust Secure Identity Management Solution. 2 Virtual Private Networks for Remote Access The benefits of allowing mobile and remote employees to access their corporate infrastructure while working from home or while on the road are widely recognized for the added productivity it delivers. Remote access delivers the applications and information that employees need to continue the flow of business information wherever they are, whenever they need it. Page 1
5 2.1 Private Networks Traditional methods of providing mobile and remote employees with access to corporate systems and information made use of leased lines and dial-up infrastructures. Costs incurred from the deployment of such systems comprise the cost of permanent leased lines, local or long-distance telephone connections, and the internal systems required to handle access to the corporate network. These costs are substantial and the performance of these connections is lackluster. However, since these connections establish a private connection between the remote or mobile user and the corporate infrastructure, security threats are minimal. 2.2 The Internet a Public Network The emergence of the Internet provided an excellent alternative to point-to-point private networks outlined above for electronic communications and information exchange. The network is supported by a robust, high-performance and highly available infrastructure that is available to anyone, anywhere, at anytime. The beauty of the Internet is that it is a public network; however, the Internet s design has security flaws and is fraught with peril as demonstrated by regular reports about security vulnerabilities and threats. CERT, a reputable centre of Internet security expertise hosted by Carnegie Mellon University, reports that: Internet security incidents rose from 6 in 1988 to 137,529 in 2003, and Reported vulnerabilities rose from 171 in 1995 to 3,784 in (For more information on the top security vulnerabilities see The Twenty Most Critical Internet Security Vulnerabilities, SANS Institute, , Virtual Private Networks Virtual Private Networks address some of the security problems associated with communicating and exchanging information over the public Internet by securing the communications between the two end-points. In fact, VPNs establish a secure tunnel between these two points so that information exchanged is protected against being intercepted, modified, stolen or otherwise compromised. It does this over the Internet by establishing a virtual secure channel; a virtual private network protecting internal networks and the applications and information they contain. Increased Productivity and Cost Benefits The significant benefit of VPNs is that they allow organizations to take advantage of the Internet to help reduce the communication costs of remote users and branch offices. Internet access is relatively inexpensive compared to that of dedicated leased lines or the cost of establishing local and long-distance telephone connections. In addition, a single corporate infrastructure is required to accommodate VPN access, regardless of the method used by the mobile or remote user to connect to the Internet such as dial-up, cable modem, ISDN, ADSL, etc. These lower costs combined with the productivity benefits of having resources available from anywhere, anytime to all mobile or remote users translate to definite savings and a high return on investment. 2.4 VPN Challenges Although VPN technology promises to resolve a number of the issues related to Internet security, and reduce the cost of deploying a remote access system to mobile and remote users, its inherent capabilities out -of-the-box introduce some challenges: Default authentication mechanisms offer limited security, and User enrollment and management functionality can become cumbersome and costly as the number of deployed users and remote offices increases. Page 2
6 2.4.1 Basic and Strong Authentication One of the keys to Internet security is authentication: making sure that users accessing your corporate network are indeed who they say they are. Basic VPN authentication often only uses a username/password. Usernames and passwords are considered to be single factor for authentication and one of the weakest forms of authentication used today. The more difficult it is to impersonate a user by forging or faking the means of authentication, the stronger the authentication mechanism is. Authentication Categories What you know - Knowledge-based authentication mechanisms rely on users memories, requiring them to memorize secret information that can be used to prove their identities to an authentication system. In its most popular form this knowledge takes the shape of a username/password. Close relatives include the Personal Identification Number (PIN) and passphrase. Such methods of authentication are also classified as single-factor authentication and offer very basic security. Adding security to authentication requires the addition of other factors to the authentication process. What you have - Possession-based authentication mechanisms require users to physically control an object or device. This device may connect directly to an authentication system, or it may require users to input information. Examples range from magnetic and radio frequency (RF) cards to smart cards. Also included in this category are one-time password tokens, USB tokens, and digital certificate/private key pairs. These methods of authentication are also referred to as 2-factor authentication. What you are - Biometric-based authentication mechanisms work by taking measurements of unique physical or psychological human traits. Popular mechanisms include fingerprints, hand geometry, iris patterns, voiceprints, and facial geometry. Mechanisms that require physical characteristics are referred to as 3-factor authentication Weaknesses in Password Authentication Password-based authentication mechanisms contain a number of inherent security weaknesses as well as significant challenges in deployment (user registration and provisioning, and single-application authentication) and ongoing management (such as password resets and password change policies). Compromised passwords are among the most common security vulnerabilities to systems that base user authentication on this single factor. Users are often careless with their passwords and password policies are difficult to enforce. Attackers have plenty of tools for defeating password protection and these can be both technical and social. Once an attacker has a user's password, he or she has all of the rightful user's privileges. Should the user have access to corporate resources via a VPN, the compromised password will give an attacker access to those same resources. The selection of a weak password is the most common security vulnerability and will likely be the primary source of security breaches. Adding strength to passwords will somewhat mitigate the risk, but tools are readily accessible to compromise these. The following are the most common threats and attacks on password security: Lack of user care leads users who either have multiple passwords to write the passwords down on paper or other readily accessible media. Page 3
7 Poor password selection: The selection of a weak password, such as a favorite pet s name, leaves passwords vulnerable to guesses and dictionary attacks. Password guessing involves entering common passwords either manually or through programmed scripts. Passwords are stored in cleartext on local and network devices, and thus are often easy for administrators and rogue users to find. Temptation exists for users to use the same password/shared secret across multiple devices and applications to simplify management -- this increases the likelihood of compromise and the scope of risk. Social engineering attacks demonstrate that it is still surprisingly easy to obtain users' passwords by simply asking them. Social engineers masquerade as administrators or other authoritative roles to convince users to tell them passwords. Brute-force logon attacks follow the same basic logic as password guessing but are much faster and more powerful. Very large dictionaries and user lists are available as well as the tools to automate the process. Brute-force attacks are more efficient than password guessing but both techniques are essentially the same. Password sniffing uses tools that grab passwords "off-the-wire" as they are passed from the desktop to the authenticating server. VPNs and Web authentication are particularly vulnerable to this type of attack because passwords are often passed in cleartext over the public Internet. Password cracking is a much more effective method for discovering passwords and circumvents the lockout defense by enabling the offline brute-force cracking of passwords. This commonly requires an attacker to penetrate the access device and then gaining elevated privileges. It is to be noted that a number of readily available tools Lp0phtcrack, LC3 and John The Ripper have made the process of cracking passwords quite trivial unless users are very careful to use very difficult passwords to crack. These would likely include special characters such as "@&#. Password Alternatives Time-synchronous Tokens Alternatives such as time-synchronous hardware tokens are available to address the weaknesses of simple password authentication. These proprietary hardware tokens are used to authenticate to the VPN by leveraging a synchronized time code. Such schemes provide greater security than passwords alone, as they require users to be in physical possession of the token. However, this greater security comes at the price of ease of use, requiring the physical distribution, use and management of hardware devices. In addition to significant usability issues, hardware tokens are also limited in terms of flexibility: Page 4
8 Most organizations will assign specific access rights to users to reflect the groups to which they belong and the importance of the resources to which they have access. As such, some users will require higher authentication security than others given their job responsibilities. With token-based authentication solutions, each user would have the same level of authentication strength regardless of requirements. Digital IDs provide much more flexibility while still providing greater security than passwordbased authentication. Users performing more sensitive operations can use their digital IDs that are stored on a smart card to enhance the security, while others may simply use their digital IDs stored on their local hard drives. Another limitation of tokens is their inability to be used for anything other than authentication. As discussed previously, the accountability of users actions pertaining to their access to important information and applications is critical. Increasingly, digital signatures and encryption will be used to enhance accountability for each part of the workflow required for issuing identities and application access rights. This includes functionality, such as secure , to protect automated workflow among administrators, or digitally signed transactions and audit logs for integrity. Digital IDs can be used by administrators for these functions, while tokens remain restricted to authentication. For organizations deploying identity management, digital IDs provide the immediate benefit of strong authentication, with the added benefit of being able to implement additional security measures over time without the need to deploy additional systems. 2.5 Certificate-based Authentication Because a VPN can open access to sensitive and valuable corporate data, applications and other resources, it is important to be able to securely identify each end of the communications tunnel. Recognizing that passwords are not sufficient to protect the sensitive and valuable corporate resources made accessible by a VPN, a secure solution must provide: Strong and secure identification of users/devices; Verification of communications; and Comprehensive and secure management of the user/device identities, including enrollment and ongoing management. Authentication based on a digital ID composed of certificates and private keys is widely recognized as one of the most secure means of authentication available today. As an organization's VPN requirements grow to involve more users and more devices, Entrust products help manage the security of these users and devices in a way that can allow for ongoing cost savings and reduced risk of unauthorized access or misuse. Leading VPN product vendors support certificate-based authentication and the infrastructures that issue and manage certificates and their associated keys. This integration is the key to delivering certificate-based strong authentication to remote access. A digital ID addresses the weaknesses of password authentication as follows: A digital ID includes cryptographic keys and certificates that must be physically in the possession of the user in order for him or her to authenticate it is a second factor for authentication. As such, even if someone was to obtain a user s password through one of the vulnerabilities cited above, the attacker could not exploit it in the same way as with just a user s name and password. The attacker would require physical access to the Page 5
9 digital ID. A rogue employee or attacker cannot simply take the password and attempt to access the VPN and corporate network from another workstation. Although there is a password associated with a digital ID, it is only used locally on the user s workstation to authenticate it never travels over the network. In addition, the fact that a digital ID is not centrally stored eliminates the vulnerability of a rogue user accessing the central store to obtain information that could be used to subsequently impersonate another user or even an administrator. Digital ID In summary, digital IDs provide strong security to protect resources made available to mobile and remote users through a VPN, while addressing the weaknesses of password authentication and enabling a flexible approach to the security requirements of identity management. 3 Entrust Secure Identity Management Solution Entrust provides a comprehensive, highly-scalable secure identity management solution that can help customers easily deploy and manage identities for strong authentication to VPN infrastructures for a broad range of client-server, Web, and Web services environments including for strong authentication to VPN infrastructures. Focused on addressing the challenges of commercial and government organizations, the solution enables organizations to lower the costs associated with managing user, application, and device identities across heterogeneous, complex environments. Through best-of-breed capabilities for securely deploying and managing identities, the solution helps to improve return on investment for organizations, providing rapid deployment, easy and secure administration, and scalability to address the large user populations. With the Entrust Secure Identity Management Solution, IT administrators can provision a unique ID to every VPN user and to every application within the enterprise. One single identity management systems allows individual permissions, privileges and profile data to be managed across a complex matrix of applications and systems. Furthermore, access to the identity management system is strongly secured, user data is protected, and information workflow can be audited for overall accountability. No less important than a clear understanding of the security requirements of a VPN deployment and the inherent weaknesses of the basic authentication offered out-of-the-box by VPN vendors is the cost of deploying and ongoing maintenance of usernames/passwords as a means of authentication. By design, usernames and passwords offer very little scalability and place Page 6
10 infrastructure and application administrators in the face of serious management challenges. A strong identity management solution can allow organizations to enable VPN users quickly by addressing issues such as: User Enrollment In order to make VPN user enrollment simple and cost-effective, administrators need tools to manage user registration and the distribution of digital identities for authentication. VPN products do not offer tools to easily distribute usernames and passwords to users. Administrators must assign usernames and passwords manually to each VPN user and device. Self-service Enrollment If administrators want to accelerate enrollment, enable enrollment from anywhere, anytime, and reduce costs even more by reducing administrative duties, they require Web-based self-service tools. VPN products do not offer such products for user self-registration. Forgotten Passwords The help-desk costs associated with the reset of forgotten passwords are widely documented and a potential burden on any organization that chooses to use password authentication. VPN products do not offer self-service tools for password recovery. 3.1 Strong Authentication for VPN Solutions As an inherent part of the Entrust Secure Identity Management Solution, Entrust delivers the ability to leverage digital IDs for VPN authentication, adding critical strong authentication to offthe-shelf VPN products to provide: Increased security: through strong identification of VPN users and devices, including verification that the user/device is currently authorized to connect to the VPN. Strong certificate-based authentication is achieved through Entrust digital identities (digital IDs). Flexibility in private key protection: The Entrust digital IDs composed of certificates and keys can be stored on desktops, smart cards or tokens, or on a central directory for roaming access. Reduced user administration: users are able to register and perform basic selfadministration tasks independently and securely, including password resets and the recovery of digital IDs. Increased scalability: the use of Entrust digital IDs for strong authentication of users can reduce VPN security administration when compared to using username/password or pre-shared key implementations. Ease of use: security functions are transparent and easy to use for the end user and security management tasks are automated for administrators. A single security infrastructure for various VPN products: the award-winning Entrust public-key infrastructure can provide enhanced security and secure identity management for today's market leading VPN products. A single security infrastructure for strong authentication to multiple applications: Entrust digital IDs can be used with authentication applications that support certificate and key-based authentication, including Windows Smart Card Logon, 802.1x certificate-based authentication, and two-way SSL authentication to Web servers. A single security infrastructure for digital signatures and data encryption across applications: the same Entrust digital ID can also be used with applications that support x.509 certificates for encryption and digital signatures. These security features are supported by leading and data protection applications. Page 7
11 3.2 The Business Benefits Working closely with customers to understand and recommend how to address identity and access management challenges within the enterprise, Entrust delivers a solution that can help to: Increase organizational efficiencies and reduce IT costs Moving away from traditional 'stove-pipe' systems management to centralized management of identities across all applications can help reduce IT administration cycles. Dedicated VPN user management systems and processes are no longer necessary. Entrust s Secure Identity Management Solution provides enterprise single sign-on and automated identity lifecycle management to ease Help desk costs and increase user satisfaction. Entrust s unique architecture and tightly integrated identity management components can help enable rapid deployment of applications and thus improve project delivery. Improve compliance with legislative and corporate governance requirements centralized provisioning and single point of access control for applications can help to enforce corporate policies strong authentication and access controls management can help enable organizations to deploy sensitive applications with the confidence that authorized users and applications will have the ability to retrieve the information the ability to add digital signatures and encryption through the same authentication point can help allow organizations to grow to new applications without deploying a new infrastructure Increase service levels and user satisfaction single sign-on can help enable users to easily and more rapidly access their applications and data, regardless of where they are - on-site or accessing the corporate network remotely Page 8
12 user self-service for identities (for tasks such as password reset or user profile updates) empowers users to act on needs themselves without relying on the Help desk Enable secure collaboration among employees leading authentication capabilities (including two-factor authentication using Entrust USB Tokens) help to provide positive identification of user and application identities strong authorization functionality manages res ource access control across both internal networks and over the WLAN/VPN digital signatures and encryption can help improve accountability and privacy for information and transactions 4 Entrust Solution Components 4.1 Strong Authentication for VPN Working with leading VPN vendor products, Entrust VPN Security utilizes the strong security capabilities that are provided by two flagship Entrust product portfolios: The Entrust Entelligence portfolio of desktop security products delivers a managed Entrust digital ID, allowing all key and certificate updates, maintenance of key histories, key backups, revocation checks and name changes to occur automatically, without the user s involvement. The managed digital ID enables digital signature, encryption and authentication capabilities across a wide variety of desktop applications that allow organizations to protect the privacy and integrity of corporate data. The Entrust Entelligence portfolio also secures the Entrust digital ID so that only the authorized trusted user can access it to conduct secure operations. Entrust USB Tokens work seamlessly with Entrust digital IDs to deliver strong two-factor authentication of users to the Web/Web Services environment. Entrust digital IDs can also be stored and managed on smart cards from the leading vendors. Entrust Authority provides the backbone of the PKI. They issue digital identities to users and devices and deliver the security management capabilities that can help make VPN security deployments more scalable and easier to manage. 4.2 Secure User Provisioning Sun Identity Manager provides centralized identity administration across the Web/Web services architecture. It can securely and efficiently deploy and manage identities, and delivers automated identity provisioning, centralized password management, single-step identity profile management, robust auditing of the identity infrastructure and flexible workflow. Entrust GetAccess delivers policy-based access control and Web Single Sign on (SSO) for Web portals. It is used across both administrator and user environments to secure and streamline access to identity information. Proven in deployments with millions of users, Entrust GetAccess also provides robust access controls to both internal and external portal applications. Entrust TruePass is a zero-footprint that leverages Entrust digital IDs to provide easy-to-use, integrated strong authentication of users to sensitive applications, including the identity administration portal. Page 9
13 5 The Need to Act Now Organizations today are feeling increased pressure to lower the costs of doing business. As they leverage the Internet and enterprise networks to streamline business processes, they are experiencing an increasing need to find new ways to service employees, partners, suppliers, and customers who are demanding real-time, personalized access to information. Whether this means allowing partners to deeply integrate with their supply chain management system, or allowing customers to access confidential account information online, organizations must effectively extend the boundaries of their enterprise to remain competitive, without compromising the security of their net works and resources. At the same time, organizations need to manage the identities of the increasing number of end-users that are accessing applications. Building on over 10 years of experience with Global 1000 companies, Entrust has assembled a comprehensive solution that is unmatched in the industry. The Entrust Secure Identity Management Solution is the right choice when it comes to giving employees, customers and partners secure access to information and resources needed to conduct business. Entrust products are unique in their ability to manage identities and access across the enterprise, delivering strong authentication capabilities for remote access and other applications. These capabilities can easily be enhanced by the modular capabilities of the Entrust Secure Identity Management Solution for authorization and SSO, and provisioning capabilities for users, applications, and devices. The solution includes features that enhance security and overall accountability for organizations, including a robust auditing system that enables organizations to review transactions. The longer an organization waits to adopt a secure solution for remote access, the greater the risk of compromising secure information and putting the company in a state of non-compliance with legislation that has severe penalties for both individuals and corporations. The Entrust Secure Identity Management Solution delivers a comprehensive set of best-of-breed capabilities for secure, effective control over users and their access to enterprise resources. Furthermore, Entrust services and supports this tightly integrated solution through its specialized best-in-class global support organization, helping to enable organizations to rapidly deploy and utilize the solution. The enterprise that acts quickly to incorporate these capabilities in its operations can reduce its risk, and lower its costs while improving relationships with employees, partners, suppliers and customers. For more information on the Entrust Secure Identity Management Solution, please visit: 6 About Entrust Entrust, Inc. [Nasdaq: ENTU] is a world-leading provider of Identity and Access Management solutions. Entrust software enables enterprises and governments to extend their business reach to customers, partners and employees. Entrust s solutions for secure identity management, secure messaging and secure data increases productivity and improves extended relationships by helping to transform the way transactions are done online. Over 1,250 organizations in more than 50 countries use Entrust s proven software and services to turn business and security challenges into secure business opportunities. For more information, please visit: Page 10
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)
Overview November, 2006 Copyright 2006 Entrust. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. All other Entrust product names and service names are
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside
Help protect your data and brand, and maintain compliance from the outside September 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
An Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Closing the Biggest Security Hole in Web Application Delivery
WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security
WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW. Entrust 2003. All rights reserved.
WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW Entrust 2003. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain
Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Implementing a Secure Virtual Private Network
IMPLEMENTING A SECURE WHITE VIRTUAL PAPER PRIVATE NETWORK Implementing a Secure Virtual Private Network WHITE PAPER Virtual Private Networks (VPNs) are quickly becoming the most universal method for remote
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
IBM Data Security Services for endpoint data protection endpoint encryption solution
Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Security management solutions White paper. Extend business reach with a robust security infrastructure.
Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end
RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access
RSA SECURITY SOLUTIONS Secure Mobile & Remote Access SECURE MOBILE & REMOTE ACCESS empower workforce mobility strengthen relationships & create new opportunities reduce exposure to network breaches support
Building Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Choosing an SSO Solution Ten Smart Questions
Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
BlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management.
RSA ClearTrust Web Access Management Enhancing control. Widening access. Driving e-business growth. Identity Management Authentication Centralized Security Policy SSO Access Management RSA ClearTrust Web
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
Simplifying Security with Datakey Axis Single Sign-On. White Paper
Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Two-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk
VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
