WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
|
|
|
- Constance Gordon
- 10 years ago
- Views:
Transcription
1 WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
2 EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user experience. 2FaaS enables both enterprises and OEMs to implement 2-Factor Authentication without servers, on-premises hardware, coding, or data synchronization while still maintaining internal control of data and users access. With 2FaaS, no user information, PHI, PII, or password credentials are ever stored with SecureAuth or in the cloud. SecureAuth has two 2FaaS offerings: 2FaaS RADIUS is aimed to protect VPNs and websites utilizing RADIUS or RESTful protocols with one type of 2-Factor Authentication called PUSH (Accept or Deny). This is a very simple to install application (or mobile app) for your company to provide a 2-Factor login solution with corporate-provided or BYOD mobile devices that become the something you have for 2-Factor Authentication. This means that you are no longer required to administer and distribute tokens, smart cards, USB keys, or any other physical token to your users for 2-Factor Authentication. All they need is the web and a smartphone or tablet device. The product scales from as few as one user to hundreds of thousands of users. Self-enrollment of the profile information is also a part of the 2FaaS solution. 2FaaS is a system in which enterprises can point their RADIUS-compliant devices to a SecureAuth 2FaaS hosted RADIUS server for the purpose for conducting secure second factor authentication. 2FaaS RADIUS is very easy to integrate and works with many existing RADIUS products and supports the 2FaaS PUSH 2-Factor Authentication app that runs on ios, Android, and Windows Phone. 2FaaS WEB also scales from a few as one user to millions of thousands users. Self-enrollment of the profile information is included in the 2FaaS WEB solution, as well as a Device Fingerprinting solution that will recognize whether a user has successfully authenticated previously on a certain device (mobile or desktop). This helps the login process to remember the user and to subsequently, not keep prompting the user for second factor authentication until the fingerprint changes significantly (e.g.. IP change, a browser upgrade, or Wi-Fi location change). WHITEPAPER 2
3 2FaaS WEB is a system in which enterprises can point their existing web services or devices to a SecureAuth 2FaaS / 2-Factor Authorization server in the cloud. 2FaaS WEB is very easy to integrate and works with many existing web product (and customer) websites to provide multiple 2-Factor mechanisms, including SMS, Voice, and One-time Passwords (OTPs). Cloud Apps Mobile Apps INTERNET External Users VPN / Gateway Internal Users Enterprise Web Apps Enterprise Directory(s) TABLE OF CONTENTS Whitepaper... 1 Executive Overview... 2 Introduction: What is 2FaaS and Why Use It? FaaS RADIUS PUSH Authentication Use Cases FaaS RADIUS PUSH Authentication Advantages FaaS RADIUS PUSH Registration Workflow... 5 What is 2FaaS WEB and Why Use It? FaaS WEB Use Cases FaaS WEB Advantages FaaS WEB Workflow Yet Another Security Product? Why Use 2FaaS: Five Reasons Free Trial WHITEPAPER 3
4 INTRODUCTION: WHAT IS 2FaaS AND WHY USE IT? 2-Factor as a Service is a cloud-based solution that deploys within mobile, cloud, or web applications, enabling secure and effortless out-of-band 2- Factor Authentication for your enterprise without hardware, servers, or moving your identities to the cloud. 2FaaS employs standard protocols, is simple to configure, and upholds strong security for all of your resources and convenience for your end-users. 2FaaS does not integrate with your first factor of authentication by design, meaning that 2FaaS does not touch or replicate any user data or passwords or personally identifiable information to data stores on-premises or in the cloud. 2FaaS is an agentless product that does not require downloads, virtual system installations, plugins, or filters (e.g. Java applets or ISAPI filters). 2FaaS RADIUS is the first 2-Factor Authentication solution in the industry to provide a RADIUS Server in the Cloud so that organizations are not required to purchase an expensive and complex RADIUS on-premises 2-Factor Authentication server for its own network. Included in the 2FaaS WEB solution are Voice, SMS Text, or OTPs for authentication without requiring any installations on the network. Both products perform simple Target Redirects to send users to the 2FaaS services in the cloud for secure 2-Factor Authentication and then back to the onsite VPN or website. 2FaaS RADIUS PUSH AUTHENTICATION USE CASES Network Components VPN, Wi-Fi Any Solution that Supports RADIUS Applications Cloud, Web, Mobile Simple RESTful SDK for Web Services Integration 2FaaS RADIUS PUSH AUTHENTICATION ADVANTAGES 100% Cloud-based No Servers, Hardware, or Thick Clients Required No Synchronization (2FaaS is not an LDAP Proxy ) or Replication of PII/Passwords to Cloud Services No Administrative Requirements for RADIUS WHITEPAPER 4
5 Rapid Deployment 2-Factor Authentication in Hours Simple Acknowledgement Authentication User Experience True RADIUS Integration Web-based and Agentless No Installations Required Unlimited Scalability Low Cost due to Web-based Authentication Methods and Architecture 2FaaS RADIUS PUSH REGISTRATION WORKFLOW 2FaaS RADIUS Cloud Server 4 2FaaS Authentication Sequence 5 3 Firewall 1. SSL VPN Connection Initiated 2. Primary Authentication (can be LDAP, LOCAL, SQL, etc.) 3. RADIUS Request to 2FaaS RADIUS Server in the Cloud 4. Secondary Authentication Security s Service (2FaaS PUSH) 5. SSL VPN Receives Authentication Response 6. SSL VPN Connection Established Username Login 1 2 Password Submit 6 SSL VPN Primary Authentication 1. The 2FaaS Administrator sends a registration to user s address 2. User opens up the in the mobile device. It contains two (2) links: Link 1 is to App Store to download the app Link 2 is to launch the app with certain encrypted data (User ID, Customer ID, Validity Period, GUID). This includes a QR code for rapid enrollment to verify the device. WHITEPAPER 5
6 2FaaS will push down the Activation Code (e.g. GUID) to be passed inside the URL; therefore, 2FaaS does not require encryption, as it is not passing down User ID and Customer ID. The link can be time sensitive (e.g. only valid for 24 hours), usage sensitive (e.g. can only be used to register 1 device), or both. 3. The mobile app opens and the user clicks Accept or Deny button to complete the registration. The app then makes a call back to 2FaaS server with the Mobile Device ID and Token ID to complete the registration (Optional) If the same user has multiple 2FaaS accounts with different companies, s/he can go through this multiple times, and the same Mobile Device ID + Token ID can be registered with multiple 2FaaS user accounts. For example, if the same user first registers with an iphone 4 and then iphone 5, 2FaaS will always send PUSH notifications to the last registered device, so it will be iphone 5 WHITEPAPER 6
7 Image: Example of 2FaaS PUSH Enrollment WHITEPAPER 7
8 2FaaS + _ User 01 User 02 User 03 Image: 2FaaS RADIUS App Installed Image: 2FaaS PUSH App Enrollments Image: Accept or Deny Request at Login WHITEPAPER 8
9 Image: 2FaaS Account Registration Log into this website and complete the signup registration process: WHAT IS 2FaaS WEB AND WHY USE IT? WHITEPAPER 9
10 2FaaS WEB is a cloud-based solution that deploys within mobile, cloud, or web applications, enabling secure and effortless out-of-band 2-Factor Authentication for any enterprise without hardware, servers, or moving identities to the cloud. 2-Factor Authentication is as easy as selecting a choice of SMS Text, Phone, or OTPs as second factors of authentication. It employs standard protocols, is simple to configure, and upholds strong security for all resources and convenience for end-users. 2FaaS WEB USE CASES Network Components Internet, VPN, Wi-Fi Any Solution that Supports the 2FaaS WEB API o Including but not limited to:.net, J2EE, RESTFUL, HTML5, PYTON, and others. Applications Cloud, Web, Mobile, Portal, OEM, and White Label Simple SDK for Integration 2FaaS WEB ADVANTAGES 100% Cloud-based No Servers, Hardware, or Thick Clients Required No User Information Synchronization PHI / PII, Password Credentials, and User Information Never Stored in the Cloud Rapid Deployment 2-Factor Authentication in Hours 100% Web-based and Agentless No Installations Required on Client, Server, or Edge Devices Unlimited Scalability Low Cost due to Web-based Authentication Methods and Architecture SMS, Voice, and 2-Factor Authentication Device Fingerprinting WHITEPAPER 10
11 2FaaS WEB WORKFLOW 5 2FaaS WEB 2-Factor Cloud Service 4 3 2FaaS WEB Authentication Sequence 1. Web Login Initiated 2. Primary Authentication (can be LDAP, LOCAL, SQL, etc.) 3. Request to 2FaaS RADIUS 2-Factor WEB Service in the Cloud 4. Secondary Authentication Security s Service (2FaaS Voice, SMS, or ) 5. 2-Factor Verified and Web Login Permitted Username Login Password Submit Firewall Web App User Database 1. User opens up a web browser on their desktop or mobile device and logs into web application 2. The user is redirected to the 2FaaS cloud 2-Factor Authentication service and verifies their desktop or mobile device by selecting a Voice, SMS, or verification 3. (Optional) To minimize the number of times that the user is required to enter a second factor of authentication, incorporate the 2FaaS WEB Device Fingerprinting 4. After the user verifies the identity via 2-Factor Authentication (Voice, SMS, or ), the user is redirected back into the website or resource WHITEPAPER 11
12 YET ANOTHER SECURITY PRODUCT? 2FaaS should be thought of as an underlying ability. Most organizations will be required to purchase 2FaaS or similar products to help them acquire the ability to secure their critical data and logins and to comply with the increasingly strict PII regulations. It s not necessary to do so, but it s a long, cumbersome, and error-prone process if you use custom programming. Most organizations will find it more cost-effective to turn to market-tested solutions such as 2FaaS that streamline the 2-Factor Authentication process and strengthen their core identity foundation. WHY USE 2FaaS: FIVE REASONS 1. Mitigate Common Threats The most important reason to use 2FaaS is to start mitigating the many online risks that assault organizations VPNs or portal webs each day. It is no longer sufficient to rely solely on single factor of authentication (usually username and password); instead, 2FaaS provides the ability to start protecting critical access logins with a 2-Factor solution as soon as possible, requiring only hours to setup configuration without requiring installation on devices. 2. Embrace Cloud and Mobile As businesses move to embrace cloud and mobile environments, identity becomes the linchpin of any security effort. It is impossible to avoid working in the cloud and mobile environments, as many software providers are moving into SaaS and cloud models. Behemoths like Microsoft, Apple, Google, and VMware are all heavily invested in cloud computing and mobility. 3. Protect Existing Identity Investments Using 2FaaS helps preserve investments in existing identity tools like Active Directory. Most enterprises have sunk a lot of money into Active Directory, and they ve spent a ton of time tailoring AD to fit their organizations needs. In fact, most enterprises have structured their roles and policies according to AD concepts such as groups and attributes. Translating and migrating this lexicon of policies is more than just synching identities. Any identity solution that requires abandonment of those investments should be viewed cautiously. With that said, the first factor of authentication with Active Directory (or similar login) can be very easily compromised from the Internet if the something you have is not added into the mix. 2FaaS enables a very rapid way to deliver a second factor of authentication to your critical user logins and to protect critical information by WHITEPAPER 12
13 incorporating the corporate-provided or users BYOD devices, SMS, Voice, or as the second factor of authentication. 4. Keep Identities Safe and In-house There are major risks with outsourcing 2-Factor Authentication to Service Providers (SPs). In a heavily regulated industry, outsourcing identities also complicates compliance. This forces organizations to rely on third-party solutions to manage their identities, but what they fail or are breached? 2FaaS does not integrate with the first factor authentication at all, enabling enterprises to continue controlling logins on-premises. 5. Guard Against Expanding Insider Risks Outsourcing identities leads to worrying about insider threats from that Identity Service Provider. 2FaaS gives organizations a layer of security that is not controlled by insiders, but instead by the user. This workflow protects enterprises from any insider threats. Moreover, in this age of outsourcing and partnering, organizations of all sizes must grant access to contractors, partners, guests, and temporary employees. Without strong identity management tools in place, insider threats grow exponentially. FREE TRIAL Find out for yourself with a 30-day free trial of 2FaaS. Experience how straightforward and swift the process of enabling regulation-compliant 2- Factor Authentication for your cloud, mobile, and network/vpn applications can be. Start with the user directory you already have in place and immediately you ll be easily and securely connecting users to VPN resources and web portal applications. WHITEPAPER 13
14 InNet innetworktech.com
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
SECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION
WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION Executive Overview The explosion of devices laptops, desktops and now the plethora of mobile devices has left enterprises
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Employee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
How To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
Self Service Portal and 2FA User Guide
Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
McAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
mobilecho: 5-Step Deployment Plan for Mobile File Management
mobilecho: 5-Step Deployment Plan for Mobile File Management Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT
Frequently Asked Questions Aerohive ID Manager
Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
Setting Up and Accessing VPN
Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
The Cloud, Mobile and BYOD Security Opportunity with SurePassID
The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,
E-commerce: Competing the Advantages of a Mobile Enterprise
Addressing the Challenges of Going Mobile Mobile Data Collection Using COMMANDmobile Table of Contents Introduction... 3 Challenges of Going Mobile... 4 Existing Infrastructures... 4 Configuration Management...
EMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at [email protected], or call
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist
BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Remote Access Services Apple Macintosh - Installation Guide
Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Sophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
Identity in the Cloud
White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4
Vodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix
Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
BlackShield ID Best Practice
BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication
How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F
External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading
Using RD Gateway with Azure Multifactor Authentication
Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Zenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
ACCESS MANAGEMENT UTILITY SERVICE via SECOND FACTOR AUTHENTICATION (2FA)
ACCESS MANAGEMENT UTILITY SERVICE via SECOND FACTOR AUTHENTICATION (2FA) Things You Should Know About Cyber Crime 1 Industry Cyber crimes are headlining everyday and everywhere. 2 Cyber hackers do not
Initial DUO 2 Factor Setup, Install, Login and Verification
Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-3waysad-113012 Table
