How Secure is your Authentication Technology?
|
|
|
- Hilary Perry
- 10 years ago
- Views:
Transcription
1 How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any secure environment is being able to ensure that only the people that should have access to an area has access to that area and those that shouldn t, don t. This truism applies to IT environments as much as, if not more so, to offices, buildings and army bases etc. The first step of any security solution is proper identification of the person ensuring that they are actually who they claim to be. Initial computer systems relied upon the simple username and password to identify the user to the system. This identification and authentication technology has proven to be very weak as it is simply something that someone knows but there is little or nothing to stop multiple people knowing the same thing. Sometimes this information is shared deliberately, other times it is shared maliciously. In either event, when a system requires a password for authentication, the user is replaying the full unabridged secret information which could and often is intercepted. Effectively, a single attack will reveal the secret information permanently. The following are examples of attacks levied against single factor authentication solutions: Shoulder surfing Key logging Screen scraping Replay attacks Reverse engineering Brute force attacks Man in the middle attacks (transaction authorisation) Highlights Traditional single username and password access is no longer enough to keep your environment secure Today there is a diverse range of multi-factor solutions available from hard tokens, SMS text messages to fingerprint and retinal scans It is for the above mentioned reasons, additional layers or factors have been introduced so as to mitigate the inherent security limitations of the ubiquitous username and password combination. As the years have progressed, the number of multi-factor solutions have increased exponentially with a whole host of companies providing various forms of authentication technologies ranging from physical key-fob tokens and SMS text messages to fingerprint and retinal scans. These diverse technologies are broken down into sub-sections called factors with each factor having its own specific functionality. The 1 st factor as (discussed above with passwords) is something you know; 2 nd factors are something you possess, such as a mobile phone or key fob, 3 rd factors are something you are, such as a fingerprint or retinal scan which is unique to every individual. The following white-paper has been created to discuss the merits and susceptibility of attacks levied against 1.5 Factor Authentication technologies available on the market which is a form factor that sits in between 1 and 2 factor authentication in terms of security, convenience and functionality. 1
2 1.5 Factor Authentication 1.5 Factor authentication is a technology class unique to a small group of companies which technically relies on a single factor for authentication, that being something you know, however for the most part limits or mitigates the attacks that traditional passwords are susceptible to. 1.5 Factor technology requires no additional physical devices or tokens, nor are biometric scanners required for completion of the authentication process. Where 1.5 factor authentication technologies differ from the traditional 1 factor technologies is in the fact that the secret information is never replayed in its entirety and the same information is not entered during each logon. In essence, when prompted, a user will use the something they know in combination with another element provided to them at logon to determine a One Time Code required for that authentication session. If either parts of the combination are incorrect then authentication will fail. The power of 1.5 factor authentication is that, as no additional devices are required and the challenge prompts can be displayed on the logon page, deployment is both cost effective and rapid. In essence, 1.5 Factor produces a One Time Code similar to traditional 2 Factor solutions, but with the portability of a password. However, to satisfy high-security requirements, 2 Factor authentication is still recommended. Benefits of 1.5 Factor Authentication Requires no additional physical devices or tokens A user will use something they know in combination with another element to generate a One Time Code 1.5 Factor Authentication Solutions and Characteristics Simple and portable security solution for the user The following three solutions provide 1.5 Factor Authentication where the authentication prompts/challenges are displayed on the same logon page used for authenticating a user to a system. In all cases, no additional hardware devices or scanners are required. In this section, we will evaluate the technologies, describing how they operate and assess their susceptibility to standard attacks. Swivel Secure TURing Image Authenticating using Swivel Secure s PINsafe, a TURing image displays the user s security string. The user then combines this security string with their PIN to derive a one-time code. They then use this one-time code to authenticate themselves. The user needs both the security string and their PIN in order to authenticate, yet the PIN is never entered as part of the authentication process. The one-time code extraction protocol is simple to use, the PIN determines which characters are to be used and in which order, for the one-time code. As an example, using the TURing image above, if the user s PIN is 1, 3, 5,7 then the onetime-code will be
3 Susceptibility to Attack Unfortunately, the issue with a TURing technology is an attacker will only require a single successful logon to decipher the user s PIN as the numbers displayed in the TURing image are unique. Using the example above, 8 is only found in position 1, 4 is only on position 3, 7 in 5 and 9 at position 7. The simplicity of the PIN (usually 4 digits) coupled to the displayed TURing image means that a single shoulder-surf attack is often enough to compromise the system. In fact, this solution turns out to be less secure than a complex password. Additional Limitations PINsafe does have a 2 Factor configuration where the equivalent of the TURing image is ed or sent via a SMS Text message to the user. As with the TURing image, the user uses a combination of the PIN and character string to determine the one time code. However, the TURing image is displayed in a CAPTCHA format so as to try and obfuscate the numbers against Optical Character Recognition attacks, whereas the 2 factor deployment doesn t use this feature. As such, the user experience differs between 1 and 2 factor deployments. The CAPTCHA style of the TURing image also cause other issues for users as the symbols are often difficult to read which results in multiple failed logons and frustrated users. CRYPTOCard BlackShield ID GrIDsure GrIDsure presents the end-user with a grid of cells containing random characters from which the end-user selects their 'personal identification pattern' (PIP). Each time the enduser needs to authenticate a grid will be displayed containing a random set of characters. The end-user then just needs to remember their PIP and provide the specific characters within those cells that make up their One Time Code in order to securely authenticate to the protected resource. The size of GrIDsure grid can be increased (e.g. 6x6 or 7x7), however its default size is a 5x5 grid consisting of 25 cells with a user s pattern being configurable from a minimum 3 characters. Naturally, the longer the minimum lengths, the harder it is to compromise the pattern. Susceptibility to Attack In order to compromise a GrIDsure logon, an attacker will most likely only be required to capture a maximum of 3 valid logons (in most cases 2 logons will suffice) if the length of the pattern is 6 digits. If the user s pattern is 3 or 4 characters then a single logon most likely will be sufficient. The reason for this is that GrIDsure utilises 10 unique numbers/characters/symbols when populating a challenge grid. So in a 5x5 grid comprising of 25 cells, there will be 5 characters repeated 3 times and 5 of the characters repeated only twice. With reference to the grid above, characters 0,1,2,5 and 6 appear 3 times and 3,4,7,8 and 9 twice. By overlaying 2 grids with their valid login information, an attacker will very likely be able to determine the cells in the grid the user has selected for the pattern as the character re-occurrence is small. 3
4 Other Issues GrIDsure does not have a 2 factor option so users can only be provisioned for 1.5 factor authentication. GrIDsure does include the functionality of restricting trivial patterns to disallow the selection of diagonal lines, straight lines and four corner selections however the complexity does not enforce gaps between cells and limiting of using the same cell for almost the entire pattern so trivial patterns can always be selected. Authlogics PINgrid Similar to GrIDsure, a user is presented with a unique one time Challenge Authentication Prompt (CAP) delivered in a grid. The digits within the CAP are repeated equally throughout the grid. This repetition ensures that any attempt to shoulder-surf or a once off capture of the user s entered OTP will be useless as there would be no way of reversing this back to the original pattern. PINgrid Highlights Secure logon on to Windows Desktops on premise or for remote access Secure Emergency Override Access Free Soft Token download from all major phone app stores Active Directory or LDAP database storage (no schema extensions) RADIUS & Web Services interface for universal integration Susceptibility to Attack A single vector attack, e.g.a screen-scrape on its own or a key log, will not reveal the secret pattern. With PINgrid authentication, the attacker would need to have a multi-vector attack on multiple occasions. This means that in conjunction with a screen scrape of the area where the challenge grid is displayed, the attacker must also, at the same time key-log the user s valid OTP. This process would need to be repeated 4 or 5 times on average (max 6 times) to be able to reverse engineer the pattern when the minimum of a 6 digit pattern is required. The longer the pattern, the more captured logons would be required to launch an attack. In all cases, the screen-scrape and key-log operations will need to be synchronised, marrying up what is required for a valid logon which can be a fairly complicated process and requires moderate to high level hacker skills. Additional Considerations Simplified user provisioning Web-based Operator portal for help-desk dayto-day operations User self service portal Theme and colour options FIPS 198 & compliant Patent-approved technology PINgrid includes pattern complexity enforcement which ensure that patterns cannot be comprised of a single cell repeated an excessive number of times (controls can limit a single cell to be used 2 or 3 times maximum), straight lines whether they are vertical, horizontal or diagonal as well as ensuring that patterns use cells that do not touch previously used cells. This complexity increases security significantly. Unlike other technologies, the user experience for PINgrid in a 1 and 2 factor solution does not vary as the challenge grids are identical in all scenarios with the only difference being where the Grid is displayed. As such, usage is consistent across factors. PINgrid utilises a combination of FIPS compliant and standards based algorithms and patent approved methodologies to generate the numbers in the grid complying industry best practices. 4
5 Summary The three technologies described in this document attempt to provide a mid-way solution between traditional 2 Factor authentication and passwords. As this type of authentication is based only on a single factor, i.e. something you know, for it to be more secure than a password it must provide an effective way of protecting the secret. PINgrid GrIDsure Swivel Secure Successful logon captures required 6 attempts 2 attempts 1 attempt to reverse engineer secret Number of available patterns 2.1 billion 390 thousand 10 thousand Character repetition in challenge 6 times 2.5 times 0 times (average) Possibility of guessing an OTP 1 : 46,656 1 : 10,000 1 : 10,000 Data based on each product using default settings. Each solution provides slightly different methods and benefits, however PINgrid is statistically proven to provide the highest level of protection again reverse engineering the secret something you know information and thwarting theoretical attacks. Conclusion PINgrid utilises proven techniques to generate the numbers in the grid and, for flexibility, provides numerous methods of deployment. Based on use case scenarios, convenience and cost, adopters have a variant of choices of how to implement PINgrid. 2 Factor authentication is more secure and addresses the few theoretical vulnerabilities associated with 1.5 factor authentication. Once a PINgrid 1.5 factor authentication solution is in place it can be changed to, or co-exist with, a full 2 factor PINgrid solution with minimal back end application changes thus preserving the initial 1.5 factor investment. Ocean House, The Ring, Bracknell, Berkshire, RG12 1AX, United Kingdom [email protected] Tel: 44 (0) The information contained in this document represents the current view of Winfrasoft on the issues discussed as of the date of publication. Because Winfrasoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Winfrasoft, and Winfrasoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. WINFRASOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS Document Winfrasoft. All rights reserved. 5 The names of actual companies and products mentioned herein may be the trademarks of their respective owners,
Swivel Multi-factor Authentication
Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
Authentication Solutions
Authentication Solutions simplicity security freedom connection and protection on the move Business is going mobile. Today s agile organisations need to give their key people access to all their information
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Strong Authentication for Cisco ASA 5500 Series
Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Implementation Guide for protecting
Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com
Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
BlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F
External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Strong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007
White Paper Options for Two Factor Authentication Authors: Andrew Kemshall Phil Underwood Date: July 2007 Page 1 Table of Contents 1. Problems with passwords 2 2. Issues with Certificates (without Smartcards)
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
Defender Configuring for Use with GrIDsure Tokens
Defender Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). This guide provides information for the
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading
Cisco ASA Authentication QUICKStart Guide
Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
ProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
How to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
Juniper SSL VPN Authentication QUICKStart Guide
Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
MBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
HP ProtectTools Windows Mobile
HP ProtectTools Windows Mobile White Paper Introduction... 2 Risks... 2 Features... 3 Password Hashing... 4 Password Generation... 5 Password Types... 5 Strong Alphanumeric Passwords... 5 Password Lifetime...5
Security Token User Guide
TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 FUNCTIONS OF THE TOKEN... 3 1.2 SECURITY FEATURES OF THE TOKENS... 3 1.3 TOKEN INTERFACE... 3 1.4 VASCO TOKEN REPLACEMENT... 4 1.5 DEFINITIONS AND ACRONYMS...
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
CA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Entrust. Entrust IdentityGuard 8.1. Deployment Guide. Document issue: 2.0. Date of Issue: April 2007
Entrust Entrust IdentityGuard 8.1 Deployment Guide Document issue: 2.0 Date of Issue: April 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust,
Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication
Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication As the world increasingly depends on computers to do business, the need for safeguarding computer resources also increases.
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
BlackShield ID Best Practice
BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID
Implementation Guide for Juniper SSL VPN SSO with OWA with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved. No part of
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Remote Access Instructions
document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN
Building Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION
QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION Who are SecurEnvoy? As the original inventors of tokenless authentication, our goal is to continue to design innovative solutions that take advantage of
External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
Self-Service Portal Registering, downloading & activating a soft token
Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016
Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 The World s Changed What is my account balance? The World s Changed Internal Security Standards
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
