Deeper Levels of Security with Intel Identity Protection Technology
|
|
|
- Marilyn Webb
- 10 years ago
- Views:
Transcription
1 WHITE PAPER Intel Identity Protection Technology Deeper Levels of Security with Intel Identity Protection Technology This technology is something you can take advantage of if your web site has a portal for customers or vendors. Your web site can detect Intel IPT, prompt your customers to opt-in, and significantly lower the likelihood of identity theft for your most trusted relationships. Now, with its latest release, Intel Identity Protection Technology (Intel IPT) introduces capabilities that go beyond one-time password (OTP) solutions embedded in silicon and extend secure computing to a broader range of applications. Rick Johnson, Marketing Consultant, writing for Intel Premier IT Professionals Near-field communication (NFC) to facilitate simple and secure sales transactions over the Internet These new capabilities include: Public key infrastructure (PKI) to protect access to business data and bolster communications by means of embedded certificates over a virtual private network (VPN) Protected transaction display (PTD) to minimize risks when entering PINs and passcodes This paper examines the architecture and technology that is the foundation of Intel IPT and the ways in which solutions built around an embedded token model help to minimize fraud and to substantially reduce the risk of identity theft.
2 Table of Contents Expanding the Adoption and Use of Two-Factor Authentication... 2 Fundamentals of Intel OTP Implementations Framework for Intel IPT... 4 Token Provisioning Using Intel IPT... 4 OTP Generation Using Intel IPT... 5 Extending the Intel IPT Framework... 6 Fundamentals of Intel IPT with PKI... 6 Fundamentals of Intel IPT with PTD Fundamentals of Near Field Communication Trusted Partners Expanding the Adoption and Use of Two-Factor Authentication As more and more individuals and businesses communicate online, carry out sales transactions, and conduct financial business, the risk of online identity theft and hacking of online accounts has become an increasing concern. Conventional online transactions that rely on single-factor authentication where the user supplies a username and a password to gain access to accounts are very susceptible to hacking. Two-factor authentication requires both a valid username and password combination, as well as an additional form of identification, such as OTP generated in hardware or software, offering a stronger method for positively validating a user s identity. The challenge, however, has been that provisioning and managing hardware tokens or ensuring adequate security with software tokens, creates a substantial burden for IT professionals. In an enterprise with thousands of employees, the loss, theft, tracking, enabling, and disabling of tokens represents a major commitment in time and money. Intel IPT strengthens security and simplifies IT management by using tokens that are physically embedded in the computer hardware. Collaborative engineering between Intel and top security software providers that specialize in two-factor authentication has established a reliable foundation for creating OTP solutions that are extensible, flexible, and standards-based. The most recent Intel Core processors and Intel Core vpro processors from Intel, shown in Table 1, extend the capabilities of Intel IPT to include support for PKI, PTD, and NFC. Fundamentals of Intel OTP Solutions Two-factor authentication validates a user s identity by taking something the user knows (a username and password) and combining it with something the user has (a hardware or software token, a code sent to a mobile phone, or answers to secret questions). By taking one component of the authentication process a hardware token and embedding it in a restricted access region within the chipset, the authentication process is made stronger. In the case of Intel IPT, the second factor in the authentication process, the OTP, is a random, computer-generated six-digit password that remains valid for only a brief time limit. Using this approach, the OTP can be generated from Intel IPT and used transparently as part of a user s login information, improving security and enhancing the user experience. One-time Password Table 1. Intel Identity Protection Technology capabilities by processor. Public Key Infrastructure Protected Transaction Display NFC on Select Models Featured Processor Platforms All Ultrabooks, all 2nd generation Intel Core vpro processor-based PCs, and select 2nd gen Intel Core processorbased PCs All Ultrabook devices and Ultrabook convertibles; 3rd gen Intel Core vpro processors-based PCs Only 3rd gen Intel Core vpro processorbased PCs Note: NFC (near-field communications) chips are required for communication. 2
3 Toward this end, Intel is collaborating with industry leaders and independent software vendors (ISVs) within the security authentication ecosystem to develop authentication solutions that take advantage of the deeper security that can be achieved through the use of embedded hardware tokens. The extensible OTP framework has these characteristics: Simplified provisioning process. Embedded hardware tokens require less effort to provision on the part of IT groups. The process is easier, faster, and less expensive. Enhanced security. Using embedded, restricted-access components forged in silicon, PIN verification and sensitive operations are performed in a protected chipset that supports the system processor, minimizing the risks of hacking, key logging, or other types of password theft. Figure 1 illustrates the basic components of Intel Identity Protection Technology and the web server that communicates with the Intel chipset to access the service. 3 Credentials are sent to the Authentication Server. Backend Web Server 4 If credentials are authenticated, user can access the web portal. 1 From a web portal, user enters username and password. Internet Ultrabook, Ultrabook convertible, or laptop featuring Intel Identity Protection Technology Authentication Server Intel Service Verification Server Library Flexible implementation support. With support for current industry standards, including the OATH algorithms as well as proprietary algorithms, Intel IPT enables a wide range of ISV approaches and provides a framework for innovative solutions. Exceptional ease-of-use. With a straightforward approach that rivals the simplicity of software tokens, solutions built around Intel IPT in which the computer itself essentially serves as a hardware token run algorithms in a secure, isolated chipset. The user s password can be delivered transparently (without having to be physically typed in), enhancing security while reducing complexity. 2 OTP is generated by Intel IPT from Ultrabook or IPT-enabled PC. Browser Intel Identity Protection Technology Plug-in Intel Identity Protection Technology Middleware Embedded Intel IPT App in the chipset Host OS Chipset Intel-provided component ISV component Strong validation. The framework for server-based token provisioning ensures that each token corresponds with a valid Intel processor-based computer with Intel IPT. Figure 1. Overview of the Intel Identity Protection Technology components. 3
4 Flexible access options. Although the hardware of a PC is linked to an individual account for authentication, most authentication solutions provide additional options that let users access their accounts from other devices, such as tablets or smartphones. One way to do this is to link more than one Intel IPT-equipped PC to an account. Another method is for an account provider to use additional challenge scenarios to confirm identity or to send an SMS message to the user with instructions about how to authenticate the logon to the account. The supporting architecture for Intel IPT uses specialized components embedded in silicon. These components are included in all Ultrabook devices, Ultrabook convertibles, select 2nd and 3rd generation Intel Core processorsbased PCs and 2nd and 3rd generation Intel Core vpro processor-based PCs. Intel IPT generates time-based OTPs, running the algorithms in a secure area isolated from the operating system. The OTP remains transparent to the operating system throughout transmission to the authentication server, which is synchronized to verify the incoming code against an equivalent internally generated code within a precise time period. Used in combination with a username and password, the OTP provides exceptionally robust logon authentication to web sites. With its ease of integration and flexible support for multiple use cases, Intel IPT can be used with OTP solutions that provide web site access, software as a service (SaaS), virtual private networks (VPNs) anywhere strong, two-factor user authentication is a priority. Framework for Intel IPT The end-to-end architecture for an authentication solution based on Intel IPT includes components that reside on: A PC equipped with Intel IPT running the client application that links the PC to the authentication solution on a target web site or cloud server. The client-based components enable the generation of OTPs. OTPs can be produced using the solution provider s choice of algorithms. The web server that contains the authentication software solution. This server is either within an onpremise environment or based on a cloud service. The server extension components provide the necessary support for token provisioning. The client-side components of an OTP solution based on Intel IPT include: Embedded Intel IPT App. The OTP algorithm(s) are implemented as an Embedded OTP (eotp) App. Intel IPT Middleware. These components facilitate communication between the Embedded IPT App and both the Browser Application (with the IPT Plug-In) and the Windows application for the client. Windows* Application. This application uses the Intel IPT Middleware to communicate with the Embedded Intel IPT App. Browser Application with IPT Plug-in. This component enables web sites to access Intel IPT client components without requiring a standalone client application. The components on the web server side of an OTP solution using Intel IPT include: Intel Service Verification Server. Provided as reference code, this component adds confidentiality and integrity to the authentication solution provider s provisioning protocol. It is required to use Intel IPT functionality. Intel OATH Server Library. This set of components is provided as reference code, providing OATH provisioning and Intel OTP verification functionality. Token Provisioning Using Intel Identity Protection Technology Intel IPT has been developed to work in concert with a wide range of protocols and authentication methods. Solution providers developing an OTP solution that incorporates Intel IPT can select whatever communication protocol best suits their software for communicating with the Intel IPT provisioning components. The technology does not impose the use of a specific communication protocol. Typically, the solution provider s OTP Web Server includes these components: OTP Provisioning Service Application. Handles provisioning of OTP tokens on the client end, implementing the solution provider s provisioning protocol. Intel Service Verification Server. Interfaces with the OTP Provisioning Service Application, running the Intel Service Verification Protocol. OTP Verification Server. Validates the OTPs generated by the Intel IPTenabled PC clients. Token Storage. Stores the OTP tokens that are provisioned on the Intel IPTbased client system. The token provisioning process is secured by always ensuring that communication is taking place with Intel IPT-based hardware. The Intel Service Verification Server, a software component installed on the solution provider s Token Provisioning Service Application, runs the Service Verification Protocol (SVP) in parallel with the solution provider s protocol to perform the communication verification. The SVP also ensures the integrity and 4
5 confidentiality of solution providerspecific data transferred to the Intel IPTbased chipset. Based on the Intel SIGMA protocol, the SVP helps create a mutually authenticated connection between the chipset and solution-provider server. The token encryption on the client PC relies on a machine-specific key that the Intel chipset generates (see Figure 2). The solution provider software must handle token storage and retrieval on both the OTP Web Server and the client. After an OTP is generated and sent to the solution provider s OTP Web Server, the solution provider s software assumes the responsibility of completing the authentication or validation of that OTP. The use of the four components described in this section is typical, but there is no requirement that ISVs configure their server-side components in the same manner. Developers have the flexibility to make use of the Intel IPT capabilities in a way that extends and strengthens the authentication features of their existing software. Intel IPT is engineered to minimize any re-coding of the software with which it interoperates. OTP Generation Using Intel Identity Protection Technology The approach used for OTP generation with Intel IPT is to install the eotp algorithms once and then load them on demand into the restricted access chipset as needed. If an ISV is not using the OATH algorithm, the preferred algorithm that they use can be delivered as part of a software installer or made available for download from a web page. For example, if someone is browsing on a computer and accesses a page that uses an OTP solution based on the OATH algorithm, the OATH algorithm gets loaded and run in the embedded environment to generate an OTP. If the next site accessed is using a proprietary algorithm, the Intel IPT components manage the use of that algorithm, loading it into the embedded environment to generate the token. Intel IPT does not dictate the deployment method used for the algorithms. Solution providers can accomplish this task using Microsoft Windows applications or browser plug-ins to manage the tokens and generate OTPs. Because the OTP can be submitted directly to the server back-end components for validation, authentication solutions can be designed so that the password (OTP) is not exposed for possible theft by a screen scraper. The user does not have to physically enter the password on a web page, where a key logger could extract it during entry. The OTP can be programmatically entered into a hidden field on a web page or programmatically entered so that the user never actually sees the password. Using a method where the OTP is directly submitted to the back end is more secure than alternate methods where a user types an OTP from a hardware token or receives an SMS with the OTP and then must enter it. Intel IPT helps provide Ultrabook Device or Desktop Computer Featuring Intel Identity Protection Technology (Intel IPT) Intel-provided component Intel IPT Middleware Web Page Intel IPT Plug-in OTP ISV-provided component OTP Web Server Windows* Application Host OS Internet OTP Provisioning Service Application Intel Service Verfication Server Library Chipset Embedded Intel IPT App Dynamic Application Loader Machine-specific Key Token Storage Figure 2. A machine-specific key is used in the one-time password provisioning process. 5
6 Ultrabook or PC Featuring Intel Identity Protection Technology (Intel IPT) Web Browser-based Application HTML/JavaScript* intelwebapis.js Windows* Application Windows Application The standards-based model that Intel IPT uses also simplifies interoperability with other third-party components. The open framework of Intel IPT provides a versatile, extensible platform for innovation and a solid platform for implementing strong, two-factor authentication solutions. Intel IPT Plug-in Intel IPT Middleware Services COM/JNI IPT Middleware To work with the embedded token to develop an OTP solution, Intel offers complete documentation of the functions exposed by the Intel IPT programming interfaces. As the OTP ecosystem expands and the importance of strong authentication increases, Intel will continue to work with the development community to help engineer secure solutions that match the latest processor architectures to the leading software advances. Intel-provided Component Figure 3. Secure submission of one-time password takes place through middleware. deeper protection through use of the restricted access chipset. Time-based OTP implementations are supported by a built-in clock within the Intel chipset that cannot be accessed or modified by the OS, placing it beyond the reach of hacking tools that might compromise the approach. Software tokens, of course, are less secure than a hardware-based solution because they are exposed and accessible through the OS, making them subject to various forms of attack. Extending the Intel IPT Framework The extensible framework that Intel IPT supports gives developers broad flexibility in crafting OTP solutions. Because Intel IPT does not impose a communications protocol between the server and the back end, developers are free to use the communication protocol that best complements their OTP solution. ISV/Relying Party Component Provisioning can be accomplished in an on-premise environment or using a cloudbased model. Intel IPT also does not dictate the use of specific algorithms in an OTP solution. Developers can use algorithms that they have used previously in solutions or incorporate the industry-standard OATH algorithm. Intel IPT is not involved with the validation of OTPs. Similarly, the Intel software does not handle or gain access to the areas where tokens are stored. Intel IPT provides mechanisms to complement and bolster existing OTP solutions bringing the benefit of embedded hardware to protect and conceal operations without becoming intrusive or placing demands on developers to adapt their code to fit the model. This approach has the flexibility and ease of use of a software token, while providing the extra security of a dedicated, protected-hardware solution. Fundamentals of Intel Identity Protection Technology with PKI The addition of Intel IPT with PKI capabilities to 3rd gen Intel Core vpro processors provides hardware-based RSA private key protection. Business-class Ultrabook devices and other systems equipped with this technology can securely engage in transactions, including VPN authentication, Secure Sockets Layer web site authentication, and and document signing. Through a system of digital certificates, certificate authorities, and other registration authorities, PKI positively verifies and authenticates Internet transactions conducted between two parties, ensuring the credentials of the user and server are valid. Intel IPT stores PKI certificates in a tamper-resistant region in firmware where they can be accessed for authentication, as well as to encrypt and digitally sign documents. Ultrabook devices and other PCs equipped 6
7 with Intel IPT with PKI can be integrated into an IT infrastructure that is already enabled for PKI operations without requiring any additional tokens or smart cards. The PC itself serves as the hardware device representing the second factor. The Microsoft CryptoAPI software layer can access Intel IPT with PKI software as a cryptographic service provider (CSP) component in a manner similar to software-based CSPs, but with the additional security afforded by having the algorithms embedded in hardware. Using the software functions that are exposed through Intel IPT with PKI, the CryptoAPI can: Generate persistent, tamper-resistant RSA key pairs securely within the Intel Management Engine Generate PKI certificates from RSA key pairs that are protected in hardware Perform RSA private key operations within a protected area in the hardware This functionality also enables protected PIN transactions when using the PTD capabilities that are also part of Intel IPT with PKI. The solution stack for Intel IPT with PKI consists of the following components: Third Party Applications. Includes all applications developed for this platform that access Intel IPT with PKI to access routines within the Intel IPT CSP, using Microsoft CryptoAPI. Microsoft CryptoAPI. Software that uses the CryptoAPI can select the Intel IPT CSP to perform cryptographic operations. The CryptoAPI itself is a Dynamic Link Loader (DLL) developed by Microsoft to serve as a framework of creating CSPs. Intel components do not replace the CryptoAPI or modify it. Windows Application Third-Party Application CryptoAPI from Microsoft Intel IPT Cryptographic Service Provider Intel IPT Libraries Secure PIN PAD Intel Dynamic Application Loader Host Interface Service Intel IPT Applet Dynamic Application Loader Management Engine Components provided by Intel as: Platform Software Microsoft Windows* Core Capabilities Binaries Figure 4. PKI solution stack components available through Intel Identity Protection Technology (Intel IPT). Intel IPT CSP. When the Intel IPT CSP is installed in a system, it becomes visible and available. Applications can then designate the CSP for cryptographic operations. Intel IPT Library. This DLL provides the core Intel IPT capabilities and Secure PIN Pad capabilities. Intel Dynamic Application Loader (DAL) Host Interface Service. This Intel IPT component is installed as a part of the Intel Manageability Engine firmware tool- kit installation. Functionality that was developed for the Intel IPT with OTP features is being reused for Intel IPT with PKI. The component serves as a communication pipeline for sending commands and receiving responses through an applet running in the DAL environment. The applet operates at a higher level through the Intel DAL Host Interface Service so that developers need not be concerned with the details of low-level communication operations. Intel IPT Applet. This Java* applet runs in the Intel Manageability Engine and performs many of the operations involved with Intel IPT with PKI. For example, to send a key as part of an operation, you send a command through the Intel IPT DAL Host Interface Service to the applet with the key wrapped in a protective layer. The applet decrypts the key, completes the operation, and returns a response. 7
8 Fundamentals of Intel Identity Protection Technology with PTD The PTD capabilities of Intel IPT are available on 3rd gen Intel Core processors and Intel Core vpro processors in systems featuring the built-in graphics chipset from Intel. In a system equipped in this manner, such as a business-class Ultrabook, display information involving PINs can be protected from tampering, and the presence of a human operating the PC can be confirmed, minimizing the risks associated with a number of sophisticated hacker attack methods. This PTD technology can be incorporated into solutions using either Intel IPT with PKI or Intel IPT with OTP. When this technology is in use, the Intel Manageability Engine draws the PIN input window on the display and accepts mouse clicks as input, as shown in Figure 5. This shields the PIN entry from the operating system and application that is running, but allows the user to see the input and complete the entry process. A potential hacker sees the blacked out screen shown on the right side of Figure 5. Numbers appearing on the PIN pad appear in different positions each time the PIN pad is launched to further conceal the specifics of the entry, preventing malware from identifying a PIN based on a pattern of mouse clicks at points on the display. Key protections provided by Intel IPT with PTD include: Randomized keypad display. The keypad is generated by the graphics chipset, so the keypad is not visible to malware or hackers. The numbers in the PIN window appear in different positions each time the keypad is launched, preventing pattern recognition. PTD technology. Intel IPT with PTD foils attempts by screen scrapers or malware to perform a screen capture of the PIN window or numbers. Secure number entry. PIN entries on the keypad are handled by a protected area in hardware that is never exposed to the running applications or operating system. Prevention of brute force attacks. After a set number of incorrect PIN entries, additional entries are shut down for a fixed period, minimizing the risk of a brute force attack detecting the valid PIN. Fundamentals of NFC NFC a short-range wireless communication technology describes a protocol for handling peer-to-peer data exchanges between a pair of end points. Intel IPT has a built-in function to provide positive identity confirmation by means of cryptographic binding between Intel IPT and the data that is communicated through the NFC sensor from an NFCenabled credit card, identity cards, or device. To facilitate easy and secure sales transactions over the Internet using an Intel IPT-equipped computer, the NFC feature lets users connect to a merchant pay site, pay for a product by tapping an NFC-enabled credit card against an NFC sensor in the computer, and complete the transaction with positive identity authentication. Trusted Partners Intel works with a number of solution providers and online web properties to integrate Intel IPT into end-toend authentication solutions. These partners include: BR Token ChangingTec Feitian Data Security System Solutions DynamiCode IBM Security Services InfoSERVER Nordic Edge (now part of McAfee) Symantec VASCO Corporate USA NET Corporate USA NET Figure 5. Example of PIN pad protection shows what the user sees compared to what a potential hacker sees. 8
9 For More Information To obtain a copy of the Intel Identity Protection External Product Specification for One-Time Password, contact your Intel customer representative. For a current list of PCs that feature Intel Identity Protection Technology, visit To watch a video that explains how Intel Identity Protection Technology works, go to For additional details about Intel IPT with Public Key Infrastructure, visit To download a technology overview of Intel IPT with Public Key Infrastructure, go to 1 No system can provide absolute security under all conditions. Requires an Intel IPT-enabled system, including a 2nd generation or 3rd generation Intel Core processor, enabled chipset, firmware, and software. Available only on participating web sites. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel s terms and conditions of sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Unless otherwise agreed in writing by Intel, the Intel products are not designed nor intended for any application in which the failure of the Intel product could create a situation where personal injury or death may occur. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web site at Copyright 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Core, Intel vpro, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Printed in USA 1112/JK/MESH/PDF Please Recycle US
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
with PKI Use Case Guide
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
Software Token Security & Provisioning: Innovation Galore!
Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,
Hormuzd Khosravi, Principal Engineer, Intel Corporation
Hormuzd Khosravi, Principal Engineer, Intel Corporation Legal Information Intel technologies, features and benefits depend on system configuration and may require enabled hardware, software or service
Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems
WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and
Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
How To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
How To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
How To Reduce Pci Dss Scope
WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS
Fast, Low-Overhead Encryption for Apache Hadoop*
Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Intel Remote Configuration Certificate Utility Frequently Asked Questions
Intel Remote Configuration Certificate Utility Frequently Asked Questions General Info 1. What operating system do I have to use to run the wizard? 2. What configurations are required prior to running
Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Intel Internet of Things (IoT) Developer Kit
Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Intel Media SDK Library Distribution and Dispatching Process
Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Security in the Cloud
solution brief Cloud Computing Security in the Cloud Intel Xeon Processor E5-4600/2600/2400/1600 Intel Technologies Enable More Secure Business Computing in the Cloud Would you like to begin transforming
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
How CA Arcot Solutions Protect Against Internet Threats
TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security
Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide
Opal* Compatibility Guide 1.0 Order Number: 331049-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
CA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
Affordable Building Automation System Enabled by the Internet of Things (IoT)
Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,
Software Solutions for Multi-Display Setups
White Paper Bruce Bao Graphics Application Engineer Intel Corporation Software Solutions for Multi-Display Setups January 2013 328563-001 Executive Summary Multi-display systems are growing in popularity.
Chrome OS*-Based Devices in the Enterprise
White Paper Client Virtualization Enterprise Mobility Chrome OS*-Based Devices in the Enterprise Being Able to Access Windows* Applications from a Chrome OS Client Significantly Increases their Versatility
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Cloud based Holdfast Electronic Sports Game Platform
Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Intel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Intel Management Engine BIOS Extension (Intel MEBX) User s Guide
Intel Management Engine BIOS Extension (Intel MEBX) User s Guide User s Guide For systems based on Intel B75 Chipset August 2012 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Moving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Managing Wireless Clients with the Administrator Tool. Intel PROSet/Wireless Software 10.1
Managing Wireless Clients with the Administrator Tool Intel PROSet/Wireless Software 10.1 This document is provided as is with no warranties whatsoever, including any warranty of merchantability, noninfringement
expanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
* * * Intel RealSense SDK Architecture
Multiple Implementations Intel RealSense SDK Architecture Introduction The Intel RealSense SDK is architecturally different from its predecessor, the Intel Perceptual Computing SDK. If you re a developer
Intel: a Thought Leader Helping IoT Scale Out
Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal
Moving Beyond User Names & Passwords Okta Inc. [email protected] 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Moving Beyond
Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study
Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To
Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology
Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Preface Intel has developed a series of unique Solution Recipes designed for channel
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)
Intel HTML5 Development Environment Tutorial Test & Submit a Microsoft Windows Phone 8* App v1.00 : 04.09.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
WHITE PAPER. Mobile Document Management. with eakte2go*
WHITE PAPER Mobile Document Management with eakte2go* Contents The New World of Apps... 3 Electronic files for businesses... 3 Government Agencies as a Modern Employer... 4 The eakte2go App... 5 An Opportunity:
Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and
Swivel Multi-factor Authentication
Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Protect Your Customers and Brands with Multichannel Two-Factor Authentication
SAP Brief Mobile Services from SAP SAP Authentication 365 Objectives Protect Your Customers and Brands with Multichannel Two-Factor Authentication Protecting your most valuable asset your customers Protecting
How To Comply With Ffiec
SOLUTION BRIEF authentication in the internet banking environment: The solution for FFIEC compliance from CA Technologies agility made possible Introduction to FFIEC Compliance In October of 2005, the
BlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary
Intel HTML5 Development Environment Tutorial Building an Apple ios* Application Binary V1.02 : 08.08.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013
Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Revision History. Revision Revision History Date
G001 Revision History Revision Revision History Date 1.0 First release of the Intel NUC Home Theatre Personal Computer on the Linux* Mint Platform using XBMC May 2013 2.0 Second release of the Intel NUC
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration
SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge
Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
iscsi Quick-Connect Guide for Red Hat Linux
iscsi Quick-Connect Guide for Red Hat Linux A supplement for Network Administrators The Intel Networking Division Revision 1.0 March 2013 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH
A Superior Hardware Platform for Server Virtualization
A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Intel Small Business Advantage (Intel SBA) Release Notes for OEMs
Intel Small Business Advantage (Intel SBA) Release Notes for OEMs Document Release Date: October 16, 2015 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR
SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
