ProtectID. for Financial Services
|
|
|
- Madeline Singleton
- 10 years ago
- Views:
Transcription
1 ProtectID for Financial Services StrikeForce Technologies, Inc King Georges Post Road #108 Edison, NJ 08837, USA Tel: Fax:
2 Introduction 2 The Financial Services industry is under attack by hackers. The past few years have seen innumerable data breaches, phishing attacks, keyloggers, cross-site scripting attacks, SQL injection attacks, etc. The end result is typically the same stolen user identities. As a result, financial regulators in the U.S. have realized that user identities have to be more secure and that the solution revolves around using two factor authentication, among other things. This has led them to pass the FFIEC recommendation and The Red Flags laws that strongly recommend using two factor authentication. Globally, financial regulators are also pushing for and implementing similar regulations. For Example, even the HIPPA regulations for the medical industry are going to incorporate The Red Flags in Authentication solutions that were accepted and provided in the past were based on hard tokens, biometrics and smartcard/pki. These solutions were cost prohibitive for mass deployment. As a result, many vendors started to offer risk based authentication. Risk based authentication systems assign a risk score based on parameters, such as, the IP header, time of access, geo-location, cookies, etc. If the risk score indicates that the access is coming from a PC which is not recognized, the user is challenged to answer a secret question. This is not a two factor solution because if a hacker tries to access the system, they are invariably challenged by the secret question, which is a single factor what you know. Some financial companies rolled out these solutions and to their dismay ran into two problems (1) Legitimate user access would often trigger a risk score that resulted in a secret question being asked and in some cases they would misspell the answer, resulting in a call to the Call Center to reset their profile. This is an expensive proposition (e.g $30-$75 per call). (2) Phishers started to target the secret question, invalidating the use of a risk based authentication system. As a result, financial companies started to look to augment the risk based authentication systems with a phone-based out-of-band solution. In this scenario, if the risk score justifies a step-up authentication, a one-time password is generated and sent to the user s phone as an SMS or spoken to the user or sent by an . The user will then enter the one-time password into the financial company website to gain access to their account. This is a two factor authentication solution where the second factor, what you have, is the phone and becoming welcomed by consumers. After realizing the cost savings and the ease of achieving compliance with an out-ofband two factor authentication solution for their consumers, financial companies are now seeking to replace their in-house employee hard token (keyfob) authentication systems with the out-of-band solution. This requires an enterprise grade solution.
3 3 Enterprises have many systems which need to be interfaced to. For example, remote access can be via IPSec VPN, SSL VPN, Citrix, Single Sign On systems, such as, CA/SiteMinder or RSA/ClearTrust or Oracle OAM and Reverse Proxies, such as, ISA Server. The solution also needs to interface to existing authentication mechanisms, such as, RADIUS, Active Directory, LDAP, etc. Also, the solution needs to be able to secure access to enterprise applications such as Siebel, PeopleSoft, SAP, Oracle Financial, etc. This is a daunting task. The ProtectID Solution The ProtectID platform is an integrated authentication platform that can be used for inhouse access to enterprise systems as well as offering out-of-band two factor authentication to the customers of the financial institution. Currently the platform supports the following two factor authentication methodologies Out-of-band methodologies Entering a fixed PIN in a phone This scheme works in the following way (1) the user enters their username and password (first factor) into the application. (2) Their phone rings and they are prompted to enter a PIN (second factor) into their phone. Entering OTP in a phone This scheme works in the following way (1) the user enters their username into the application. (2) Their phone rings and they are prompted to enter a PIN (first factor) + OTP (second factor) into their phone. The OTP can be displayed to the user in the application or generated by another device or software program. Sending an OTP to a phone via SMS This scheme works in the following way (1) the user enters their username into the application. (2) An OTP is sent to their phone as a text message. (3) The user then enters a PIN (first factor) + OTP (second factor) into the application. Sending an OTP to a phone via text to speech This scheme works in the following way (1) the user enters their username into the application. (2) Their phone rings and they hear an OTP spoken via text to speech. (3) The user then enters a PIN (first factor) + OTP (second factor) into the application. Sending an OTP via This scheme works in the following way (1) the user enters their username into the application. (2) An OTP is sent to their address. (3) The user then enters a PIN (first factor) + OTP (second factor) into the application. Token methodologies Hard Token OTP (key fob that displays OTP when a button is pressed) Soft Token OTP (OATH compliant software) that can reside on a PC or a BlackBerry or PDA or J2ME compliant cell phone.
4 4 Other Magnetic Stripe Card/Smart Card Biometrics: Fingerprint or Iris print (can be supported if required) Architecture The ProtectID architecture is depicted below - ProtectID Architecture User Population Customers Business Partners System Administrators Remote Workers Office Workers Citrix Application Applications requiring authentication WEB Application VPN Server Desktop GINA ISA Server Management applications Self service Application PID Manager Active Directory PID Authentication s PID Management s Citrix WEB RADIUS GINA ISAPI ISA Self service Provisioning AD PID Servers PID Core PID Databases 9 The ProtectID platform consists of the following components Core This consists of the Controller, the Data Access Layer and the Databases. The Controller interfaces to the other components, processes the messages from the Agents and performs the authentication operations per the profiles and policies stored in the databases. The Data Access Layer abstracts the database operations so that other databases can be used in the future. Currently, SQL Server is the supported database. Active Directory is supported via a directory sync mechanism.
5 Agents 5 Agents interface on one side to the resource that generates the user authentication request and on the other side to the Controller. There are several types of Agents. These include Web Agent The Web Agent interfaces to a web application and processes HTTP messages sent by the application seeking to authenticate a user. RADIUS Agent The RADIUS Agent processes authentication requests sent to a RADIUS server. Currently the Microsoft RADIUS Server (IAS) is supported. Other RADIUS servers, such as Cisco s and Juniper s can be supported via RADIUS proxy. Support for RADIUS, allows ProtectID to be used in a wide variety of environments such as VPN, 802.1x Wi-Fi, and UNIX (Linux, Solaris, AIX, HP-UX, Mac 0S-X) PAM. Citrix Agent The Citrix Agent interfaces to the MSAM/Secure gateway and Web Citrix products and allows remote Citrix users to access enterprise applications. Domain Agent This enables the ProtectID system to be used to authenticate Windows domain logins. This is a custom GINA that hooks into the Microsoft GINA. ISAPI Agent This enables the ProtectID system to be used to secure access to MS Outlook and software such as Siebel and SAP which have web interfaces ISA Agent This enables the ProtectID system to be used to secure access to the Microsoft ISA server (Microsoft s application firewall). RSA Cleartrust Agent This enables the ProtectID system to be used to secure access to RSA s Single Sign On Software - Cleartrust. CA Siteminder Agent This enables the ProtectID system to be used to secure access to CA s Single Sign On Software - Siteminder. Authentication Servers Authentication servers are responsible for the user authentication process according to different methodologies. There are several types of Authentication servers including Telephony Server The Telephony Server is responsible for phone authentication using a PIN/OTP. The server can interface to analog, digital (T1/E1) and VoIP (SIP / H.323) networks. The Server has capabilities for text-to-speech (to deliver custom messages) and a scripting language to create IVR-like call flows. CIS Server The CIS Server enables the use of biometrics and tokens for user authentication.
6 Administration 6 Administration consists of provisioning and managing the system. There are two elements that comprise this. Provisioning Agent This provides an upstream interface to a provisioning system. The provisioning protocol is HTTP based. Using this interface, a web GUI for user selfadministration can be implemented. ProtectID Manager This enables role based, delegated administration of the system. The GUI is web based. The functions include administering users and viewing audit logs. Product Configuration There are two configurations standalone and hosted. In a hosted environment, multiple companies can be supported on the same system with each company having a partitioned database and administration. The system is architected in a modular fashion for high reliability, scalability and availability so as to support millions of users. What makes ProtectID different from other products Platform Approach Unlike other products which typically offer a single authentication method, ProtectID offers multiple authentication methods. This enables an enterprise to have a choice and have different authentication methods for different user populations based on risk level, cost and deployment strategies. Because the platform is extensible, newer authentication methods and interfaces can be added making the platform viable into the future. Out-of-Band Authentication The ProtectID platform supports five different out-ofband authentication methods, making it the most comprehensive out-of-band authentication solution in the market. Backup Authentication ProtectID enables any authentication method to backup any other method. For example, the phone can be used as a backup to a token. Thus existing token installations can deploy ProtectID as a backup authentication scheme and save on help desk costs. Support for Transaction Authentication Due to its text-to-speech capability, ProtectID can deliver a summary of the transaction to be authenticated. This is useful in preventing Man-In-The-Middle attacks.
7 7 Multiple Deployment options ProtectID can be deployed in the following ways On a single server On multiple servers with distributed components As an ASP service where the customer interfaces to the service via HTTP API As an out-of-band service wherein the customer stores the authentication data and uses ProtectID as the out-of-band authentication channel.
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F
External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public
REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers
2 factor + 2. Authentication. way
2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Hosting topology SMS PASSCODE 2015
Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
Moving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
ViSolve Open Source Solutions
ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs
ADAPTIVE USER AUTHENTICATION
ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly
Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant Sam.linford@entrust.
Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments Sam Linford Senior Technical Consultant [email protected] Entrust is a World Leader in Identity Management and Security
Authentication. Authentication in FortiOS. Single Sign-On (SSO)
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Moving Beyond User Names & Passwords Okta Inc. [email protected] 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Moving Beyond
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
Authentication Solutions
Authentication Solutions simplicity security freedom connection and protection on the move Business is going mobile. Today s agile organisations need to give their key people access to all their information
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
Using RD Gateway with Azure Multifactor Authentication
Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.
TMS 5.1 OTP Planning Guide. Version 2
TMS 5.1 OTP Planning Guide Version 2 May 2010 All attempts have been made to make the information in this document complete and accurate. SafeNet is not responsible for any direct or indirect damages or
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
External Authentication with Citrix Access Gateway Advanced Edition
External Authentication with Citrix Access Gateway Advanced Edition Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park Theale Reading RG7 4TY Andy Kemshall
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.
ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE
ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE SMS PASSCODE is the technology leader in a new generation of two-factor authentication systems protecting against the modern Internet threats. The
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
ZyWALL OTPv2 Support Notes
ZyWALL OTPv2 Support Notes Revision 1.00 September, 2010 Written by CSO Table of Contents 1. Introduction... 3 2. Server Installation... 7 2.1 Pre-requisites... 7 2.2 Installations walk through... 7 3.
DIGIPASS Authentication for SonicWALL SSL-VPN
DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
DIGIPASS Authentication for Juniper ScreenOS
DIGIPASS Authentication for Juniper ScreenOS With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 53 Disclaimer Disclaimer of Warranties and Limitations
Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID
Implementation Guide for Juniper SSL VPN SSO with OWA with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved. No part of
CA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Step by step guide to implement SMS authentication to Cisco ASA 5500 - Clientless SSL VPN and Cisco VPN
Installation guide for securing the authentication to your Cisco ASA 5500 Clientless SSL VPN and Cisco VPN Client Solutions with the Nordic Edge One Time Password Server, delivering strong authentication
Siebel Security Guide. Version 8.0, Rev. C February 2011
Siebel Security Guide Version 8.0, Rev. C February 2011 Copyright 2005, 2011 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business
PortWise 4.7. PortWise Sales FAQ. Sales FAQ & Licensing Guide
PortWise 4.7 & Licensing Guide Who is PortWise?... 2 What is the PortWise Product Offering?... 2 PortWise Access Manager... 2 PortWise TruID... 2 What is PortWise 4.7?... 3 What Core Technologies Make
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014
VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware View Radius authentication configuration for SMS PASSCODE With the introduction of RADIUS authentication support in VMware View it is possible
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist
BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.
Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
CRYPTOCard. Strong Two Factor Authentication
CRYPTOCard Strong Two Factor Authentication CRYPTOCard Solutions Overview Cybercrime is a serious, real, and all-to-prevalent threat to networked assests. With the abundance of deployed workers requiring
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Summer Webinar Series
Summer Webinar Series Cisco ASA AnyConnect VPN with AD Christopher Rose Sr. Client Network Engineer [email protected] Webinar Links: www.mcnc.org/cne-webinars Agenda Review the security implications of remote
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach Multi-factor Authentication Layer v.3.2-014 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.
This guide is intended for Derbyshire County Council employees, partners and suppliers who need remote access to the Council s network. This would be primarily from locations not directly on Council property,
Adaptive User Authentication
Multi-Factor Authentication Adaptive User Authentication Easy on Users. Tough on Hackers. Solutions Brief SMS PASSCODE Multi-Factor Authentication balances strong security for your business with high convenience
Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015
SMS PASSCODE 2015 Guide for implementing SMS PASSCODE protection with Palo Alto Networks. This document outlines the process of configuring a Palo Alto Networks GlobalProtect VPN with SMS PASSCODE RADIUS
YubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
REMOTE ACCESS USER GUIDE
REMOTE ACCESS USER GUIDE Document Released by the IT Department [21/11/2013] Content Summary 1. Remote Access User Guide Cover Page 2. Content Summary 3. Website/Portal Accessing 4. Method of Accessing
