Why MobilityGuard OneGate?

Size: px
Start display at page:

Download "Why MobilityGuard OneGate?"

Transcription

1 Any Scenario for Access Just One Solution Why MobilityGuard OneGate? Scenarios 1 Access from Anywhere 2 Strongly Identify Your Users 3 No more Post-IT notes with Single Sign-On 4 Three Click Access Administration 5 Encapsulate Unsecure Systems 6 Organizational Collaboration 7 Access Management as a Service 8 Secure your eservices & ebusiness The clientless SSL VPN included in the MobilityGuard OneGate is advanced technology that delivers real business value by allowing users to access applications and information from any location, using any device, without the need to install any client software. Clientless For maximum productivity, MobilityGuard s clientless access enables organizations to offer remote or internal access to mission-critical information and applications. These include , intranet, extranet, client/server applications, collaboration tools, terminal services and many more while maintaining a high level of security. Users only require an Internet connection and a web browser to get instant access. MobilityGuard OneGate does not require any additional hardware or software on the client device, making it easy and affordable to deploy and maintain. An optional VPN-client is also available with MobilityGuard OneGate, if required. Strong User Authentication More than 15 different authentication methods (incl. two factor authentication) are included in the MobilityGuard OneGate which gives organizations a unique and cost efficient solution for securely identifying any user. The solution provides support for both internal user e.g. employees and external user groups e.g. partners, suppliers, customers etc. All the available authentication methods can be used simultaneously so the solution perfectly fits the organizations business needs. Strong Encryption By using industry standard encryption, user data and transactions are secured from unauthorized access. MobilityGuard uses 128 to 256 bit encryption using military accepted encryption algorithms like AES (Advanced Encryption System) User-Friendly Application Launcher Using any web browser, the MobilityGuard OneGate Launcher greatly simplifies the user experience by bringing the applications and information to the user s fingertips. When combined with Single Sign-On technology from MobilityGuard, users no longer need to enter their username or password for each of their applications once they have logged into MobilityGuard.

2 SECURE ANY APPLICATION The MobilityGuard OneGate Launcher is fully customizable allowing administrators to provide individual menus based upon the logged in user, where the user is connecting from, the authentication level used, and much more. The Portal can also auto-detect the client device and adapt the user interface accordingly. The options are limitless. The Application Launcher gives the users personalized access to applications quickly and easily. Support for any application MobilityGuard supports virtually all applications including Web, client/server, mainframe, terminal server, bi-directional (VoIP, online collaboration tools), and file servers. As a software solution, the MobilityGuard OneGate is uniquely customizable to support virtually any class of application. Scalability & Performance By connecting multiple MobilityGuard OneGate nodes the solution is easily scalable to support even the largest network environments and cross-regional deployments. Built-in High Availability Any number of MobilityGuard OneGate can be installed in your network at no additional cost, to guarantee 24x7 access. MobilityGuard High Availability Functionality gives scalability and high performance that guarantees 24x7 access.

3 ACCESS FROM ANYWHERE Access from Anywhere Give any user category secure access to your resources How can your users get secure access to the applications, irrespective of time, place and which device they use? How do you simplify the variety of remote access methods for people in the field or at home as well as those located at headquarter or branch offices? With MobilityGuard OneGate, authorized users can securely access all types of sensitive internal systems and information, irrespective of time and place. Typical users may be employees, partners and customers. They may be located at the office, at home or in the field using whichever computer is available to them. Only a web browser is needed Users only require an Internet connection and a standard web browser to get instant access. MobilityGuard provides very high mobility, since there is no need to install client software on the connecting computer. MobilityGuard have even support for mobile devices such as smart phones and tablets. No additional hardware or software MobilityGuard OneGate does not require any additional hardware or software on the client device, making it easy and affordable to deploy and maintain. Customers Partner Remote Access Mobile Users Branch Office Firewall Internet Headquarter Firewall Web Client/Server Applications Streaming Media FTP Instant Messaging Application Servers (Terminal Server/Citrix) File File Shares & DB DB Services VoIP (Phone Service) Directory Service Work at Home Access Any Application For maximum productivity, the MobilityGuard clientless VPN enables organizations to offer remote or internal access to mission-critical information and applications while maintaining a high level of security. This includes , intranet, extranet, client/server applications, collaboration tools, terminal services, and much more. No customization of the applications is needed, which means installation and configuration of MobilityGuard OneGate can normally be completed within one hour. Everything in a box MobilityGuard OneGate provides Strong User Identification, Dynamic Access Control, Central Single Sign-On, and an Engine for integration of any web portal or application. The OneGate solution is available as physical or logical appliance running on VMware, Hyper-V or XEN-server. Zero Footprints on the connecting device There are no footprints" left on the connecting client computer after use. This means that no other client computer user can get access to the information received from the application. For example, an containing sensitive information will not be visible to other users who may have access to the same PC. Malicious code filtering by Secure Session Handling By using True SSL-VPN technology with secure session handling MobilityGuard OneGate provides a first level of protection against malicious code installed on the connecting computer.

4 STRONGLY IDENTIFY THE USERS Strongly Identify Your Users Different User Categories and many Access Scenarios Different users need different ways to securely identify themselves before accessing your applications. Different access situations also require different methods for identification. An employee may use secure identification methods or devices such as hardware tokens provided by the organization. But how can you best manage user categories that are loosely connected to the organization, such as partners, customers or even contractors? Deploying Secure Identification methods or devices is not usually the preferred solution for many organizations due to the cost and management overheads. However, nowadays these users do need the best security protection and a solution that strongly identifies them when they access their applications. Combine more than 15 Built-In secure authentication methods With the MobilityGuard OneGate solution you get access more than 15 secure, built-in authentication methods. This includes amongst others, a two-factor authentication method through a unique software-based hardware token known as the MobilityGuard Web Token. Another built-in secure authentication method is MobilityGuard SMS token which delivers a one-time password sent to the user s mobile phone as an SMS Text message. The users mobile phone becomes a physical Hard Token. Reduce the costs and solve the Identification Puzzle Using OneGate s built-in authentication methods, reduces the need for additional thirdparty solutions, such as physical Hard tokens. You can also combine different types of authentication methods such as Hard Tokens, including RSA and Vasco, electronic ID, local certificates, Enigma Code Matrix and USB- Keys. Customers Partner Remote Access Mobile Users User authenticates with Hard Token Webmail CRM System Partner Office Firewall User authenticates with OTP to mobile phone Internet User authenticates with Web Token Firewall Intranet Authentication & Granular Access Control Terminal Server Files Time Tracker Internal Services Organization X Work at Home Granular access based on the authentication method used How do you differentiate access levels based on how strongly the user has been identified? Traditionally this works rather like an on and off switch. If appropriately identified, the user has access to the entire network. However, MobilityGuard OneGate includes a mechanism for giving granular access to any system based on a policy set, which ranks the methods used for identification. In practice this means that if the user is identified with a stronger authentication method then they will automatically have access to a wider set of applications.

5 NO MORE POST-IT NOTES No More Post-it Notes Users do forget their password Users frequently forget their passwords, simply because they have a large number of passwords to remember nowadays. So, how do users solve this problem? Often they use the same password for both sensitive and nonsensitive applications, a few create an organized system to remember them and others even resort to Yellow Post-it notes stuck to their computers! Organization Streaming Media Internet Login Login Web MobilityGuard logs in to applications MobilityGuard stores the login information in an encrypted database Client/Server Applications Application Servers (Terminal Server Citrix) File File Shares & DB DB Services Centralized Single Sign-On By using the MobilityGuard dynamic centralized Single Sign-On/Sign-Off function, your employees have a simple and secure method for logging on to all the applications that they need. Simplicity is the key to success MobilityGuard OneGate creates a Single Sign-on (SSO) entry automatically, the first time the users login to the application. MobilityGuard stores this SSO information in a central encrypted database and uses it the next time the users are authorized and request access to the application. The MobilityGuard OneGate solution provides the option to easily allow or disallow Single Sign-On to the application based on the security policy. The security policy is simply defined by five security criteria in the OneGate Control Center. No more Post-It yellow Notes By using MobilityGuard OneGate you can eliminate the use of yellow Post-it notes" for remembering passwords.

6 THREE CLICK ACCESS ADMINISTRATION Three Click Access Administration Complex secure access limits your business How do you provide secure access to your IT environment? Many organizations have extremely complex IT environments. In order to manage users and provide access to applications, the organization needs to deploy multiple solutions to deliver the access required. Multiple solutions often also mean that access to multiple administration interfaces is required and this is not cost effective. They are also very complex to set up and it is difficult to manage and maintain security levels. Single Point of Administration Using MobilityGuard OneGate, which is a centralized Security Platform, you have a single point of administration for all access methods that you need to support. With three mouse clicks you can securely deliver applications such as web based, terminal server and even client-server applications to any user in any situation. Three steps to developing your business A typical access option is set up using these three steps: 1. Define your application 2. Create an access control list 3. Create a menu entry All your Security Functions in a Single solution MobilityGuard OneGate provides a full portfolio of security functions in a single solution. Some examples of the functionality are: Secure Login with two-factor authentication Secure Communications with secure session handling Intelligent centralized Single Sign-On Dynamic Authorization Control for granular access Support for easy integration with any application or web portal Federation of User Identities for collaboration Self-Service functions for users e.g. password reset Digital Signing of any electronic information Open up Your Business Deploying a MobilityGuard OneGate Appliance, means that security issues and access control need no longer limit the expansion of your business. MobilityGuard OneGate is available as: 19 Rack server, 3000-, and 6000-Series, scalable up to 3000 concurrent users per appliance Logical appliances, VMware-, Hyper-V and XEN-Server

7 ENCAPSULATE UNSECURE APPLICATIONS Encapsulate Unsecure Applications Encapsulate any unsecure application or service It is unusual for applications to be designed with security in mind from the beginning. However it is important to take security into consideration from an early stage when planning any new project. Security is crucial regardless of whether the project is for internal use or an electronic service provided to external or anonymous users but it is much more difficult to try to add security counter-measures in the latter stages of an IT security project. Security Shell MobilityGuard OneGate solves this security problem by enabling you to create a secure shell around an already developed or implemented application. The shell is an easy way to ensure that the application is fully protected with the necessary security measures, without the need for any redesign or modification of the application itself. All Security Functions in one solution MobilityGuard is a single solution that protects any application or electronic service with: Secured communication Strong user identification Dynamic Access Control All service functions are configured by a few mouse clicks and no changes need to be made to the target applications. Take a broad view It is important to take a holistic view of your network and application security. It is all too easy to focus too narrowly on securing a single service and to miss other important security weaknesses elsewhere in your network. MobilityGuard OneGate delivers a homogeneous secure IT environment which will provide the highest security performance for all, rather than single, applications. OneGate achieves your goal of providing a holistic secure IT environment at the lowest Total Cost of Ownership. Your Organization Web Streaming Media FTP Instant Messaging Internet Firewall CRM Application Application Servers (Citrix) MobilityGuard OneGate Storage & DB DB Services SAP R3 R3 Hypernet VoIP (Phone Service) Certified Applications Your Application & eservices Directory Service

8 ORGANIZATIONAL COLLABORATION Organizational Collaboration Make Collaboration Easy and Secure Do you encounter difficulties with IT and IT security problems when setting up collaboration with business partners? Do you see the need for complex VPN (Virtual Private Network) connections that are difficult to administer, in order to maintain your security level? When connecting business partners to your IT environment by means of VPNs you may unintentionally expose your internal network to your partners network. It is only possible to maintain the required security levels for VPNs through advanced administration and a huge amount of work. MobilityGuard OneGate makes it much easier and more secure to collaborate with partners by means of built-in Identity Federation functionality. What is Identity Federation? The basis for federated identities is Trust. Trust means that one organization relies on another organization to identify the users in a secure and reliable manner. Once you or your collaborating network partner have verified the user s identity, the required application will be accessible to him. By using Identity Federation, you can even create a cross-organizational border solution for Single Sign-On (SSO) that will greatly simplify access for your users. The access to internal and external applications is transparent and the users have no need to know where the resources are located. Why use Federation? MobilityGuard OneGate Federation provides an easy way to collaborate with your partners. Benefits include: No VPN connection needs to be set up Improved security levels Minimal administration and cost of management Extended functionality Seamless integration with your business partners network and services Easy use of widely available Cloud Services, such as Google Apps and Microsoft Internet based services. A little about the Technology MobilityGuard OneGate Federation technology is based on SAML (Security Assertion Markup Language) version 2 which is the European standardized protocol for Identity Federation, MobilityGuard OneGate can act as the Identity Provider or alternatively as the Service Provider within an Identity Federation set up.

9 ACCESS MANAGEMENT AS A SERVICE Access Management as a Service Why does security have to be so difficult and complicated? Creating secure and easy access solutions usually entails a large investment as well as complicated and costly operations and management. MobilityGuard Datacenter Edition enables you to easily deliver Access Management as a Service to your end user customers. By means of Access Management you can administer the whole operation and management of the security functionality that your end customers and partners require. Five key benefits The 5 key benefits of the MobilityGuard Datacenter are: Low initial cost since no investment in hardware or software is needed Very fast installation and minimal set up times Continuous support and maintenance programs provide access to the latest security standards and technology Easy budgeting with minimal additional costs Charges are based on effective usage only The full range of Secure Access Services MobilityGuard Datacenter Edition includes a wide range of security services: Secure Login with strong authentication usually with SMS or certificates Secure communication with secure session handling Intelligent centralized Single Sign-On Dynamic Authorization Control Support for easy integration with any application or web portal User Identity Federation Self-Service for users, e.g. password reset Digital Signing of any electronic information Datacenter Appliances The solution for Access as Service is available as a fully configured appliance: The MobilityGuard 3000, 4000-and 6000 Series, 19 rack server Appliances, scalable up to 5000 concurrent users per appliance Virtual Appliances running on VMware, Hyper-V or XEN-Server

10 SECURE YOUR ESERVICES AND EBUSINESS Secure your eservices and ebusiness How do you deliver your eservices and ebusiness securely? How can I deliver eservices, web and non-web based in a secure way to any of my customers and partners? How shall I deal with the management of all user accounts and all security issues on the connecting computer and my application or service? How can I protect my network against malicious code from remotely connected devices? How can I manage the necessary security functions required for identifying users, securing communications and other security issues arising from my eservice or ebusiness application? How can I protect all my eservices and ebusiness Solutions in a cost effective way? Secure everything in ONE single product MobilityGuard OneGate solves all security issues for your services and business in a single product. With MobilityGuard OneGate your business is protected with all the required functions. At the same time OneGate enables a closer and better cooperation with your customers or partners through functionality such as identity federation, digital signing Single Sign-On etc. Make it happen The OneGate solution is available as physical or virtual appliances. The physical appliances are available in three models (MOG3000, MOG4000 and MOG6000) designed for small, medium and large organizations. MobilityGuard OneGate Virtual appliances are delivered for virtual environments such as VMware, Microsoft Hyper-V and XEN Server. Take off within an hour No modifications are needed to the eservice or ebusiness application so that you are ready to take off within an hour. Why not make a test flight?

11 SALES OFFICES Sales Offices MobilityGuard HQ (Sweden) August Barks gata 23B Västra Frölunda Sweden Phone: MobilityGuard UK Crowthorne Enterprise Centre Old Wokingham Rd, Crowthorne RG45 6AW United Kingdom Phone: MobilityGuard Europe 3, rue Gustave Eiffel Espace Media Le Technoparc Poissy Cedex MobilityGuard Deutschland Bülowstraße Hamburg Germany Phone: France Phone: MobilityGuard Italia Via Ildebrando Vivanti, Roma Italy Phone:

Copyright Giritech A/S. Secure Mobile Access

Copyright Giritech A/S. Secure Mobile Access Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction. TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and

More information

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

Secure Authentication Managed Service Portfolio

Secure Authentication Managed Service Portfolio Secure Authentication Managed Service Portfolio Combating Corporate Identity Theft Signify Managed Authentication Services Signify offers a complete range of Secure Authentication and Identity Management

More information

Secure Remote Access Give users in office remote access anytime, anywhere

Secure Remote Access Give users in office remote access anytime, anywhere Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Secure Access Gateway 3000er Serie

Secure Access Gateway 3000er Serie Produktinformationen Secure Access Gateway 3000er Serie Haben Sie Fragen oder wünschen eine Beratung, eine kostenlose Teststellung oder weitere Informationen? kh.hoeschen@xnc.com Tel.: 02203 96960 Mobil:

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Extranet Access Management Web Access Control for New Business Services

Extranet Access Management Web Access Control for New Business Services Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS WHITE PAPER Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS Emerging trend: SaaS and Online Applications for every market Software deployments are shifting from

More information

IQS Identity and Access Management

IQS Identity and Access Management IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Astaro Gateway Software Applications

Astaro Gateway Software Applications Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

expanding web single sign-on to cloud and mobile environments agility made possible

expanding web single sign-on to cloud and mobile environments agility made possible expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online

More information

2003, Rainbow Technologies, Inc.

2003, Rainbow Technologies, Inc. Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

Secure Communication Made Easy

Secure Communication Made Easy Secure Communication Made Easy Remote Access to Industrial Equipment Easy Setup Central Administration Firewall Friendly State-of-Art Security Fast Return On Investment PROGRAMMING CONTROL LOGGING INFRASTRUCTURE

More information

The Essential Security Checklist. for Enterprise Endpoint Backup

The Essential Security Checklist. for Enterprise Endpoint Backup The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

The Cloud, Mobile and BYOD Security Opportunity with SurePassID The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,

More information

etoken Single Sign-On 3.0

etoken Single Sign-On 3.0 etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to

More information

Increase the Security of Your Box Account With Single Sign-On

Increase the Security of Your Box Account With Single Sign-On A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

Proposal Document TitleDocument Version 1.0 TitleDocument

Proposal Document TitleDocument Version 1.0 TitleDocument G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public

More information

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................

More information

Citrix Access Gateway

Citrix Access Gateway F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome

More information

Overview and use-cases

Overview and use-cases Overview and use-cases 1. Install applications into Virtual Workspace VOIP and Comm apps Chat Workspace system Regular installation into workspace Cloud storage Document editors Deploy workspace to any

More information

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to

More information

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security Secure your business DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Secure Your Business A secure and flexible work environment Today s workforce needs to use

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

Best Practices for Secure Remote Access. Aventail Technical White Paper

Best Practices for Secure Remote Access. Aventail Technical White Paper Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.

More information

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003 Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled

More information

Keeping your VPN protected

Keeping your VPN protected Keeping your VPN protected Overview The increasing use of remote access is driving businesses to look for an easy to manage, secure solution for providing access to sensitive company assets. There are

More information

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper! Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013 MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

A new Secure Remote Access Platform from Giritech. Page 1

A new Secure Remote Access Platform from Giritech. Page 1 A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users

More information

WatchGuard SSL 2.0 New Features

WatchGuard SSL 2.0 New Features WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

The BiGuard SSL VPN Appliances

The BiGuard SSL VPN Appliances The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium

More information

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Ensuring the Security of Your Company s Data & Identities. a best practices guide a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management

More information

Secure and simple authentication via mobile phone

Secure and simple authentication via mobile phone Mobile ID Secure and simple authentication via mobile phone Mobile ID provides your employees and customers with a convenient and secure way to login to applications and online portals. It also makes it

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Family Datasheet AEP Series A

Family Datasheet AEP Series A Trusted Security Everywhere Family Datasheet AEP Series A Covering: Hardware Edition Virtual Edition Load Balancer AEP Networks, Inc. All rights reserved. Secure Application Access 2500. 4500. 6500. 8500

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

Top Three Reasons to Deliver Web Apps with App Virtualization

Top Three Reasons to Deliver Web Apps with App Virtualization Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Everything you need to know!

Everything you need to know! Everything you need to know! 1 Our Facilities Redback Conferencing is at the forefront of the industry in terms of security for your conferencing services. We use Equinix Sydney IBX Data Centres which

More information

How to reduce the cost and complexity of two factor authentication

How to reduce the cost and complexity of two factor authentication WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Securing Citrix with SSL VPN Technology

Securing Citrix with SSL VPN Technology Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information