RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Similar documents
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview

BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Citrix desktop virtualization and Microsoft System Center 2012: better together

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync citrix.com

The Office Reinvented: Mobile Workspaces are the Future of Work

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Citrix Lifecycle Management

Advanced Service Desk Security

Deploying NetScaler Gateway in ICA Proxy Mode

Provisioning ShareFile on Microsoft Azure Storage

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

How To Use Netscaler As An Afs Proxy

Desktop virtualization for all

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform Reference Architecture

Bring-Your-Own-Device Freedom

Secure Data Sharing in the Enterprise

Redefining IT for federal healthcare agencies

Desktop virtualization for all

The top 5 truths behind what the cloud is not

White paper. Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications

Microsoft SharePoint 2013 with Citrix NetScaler

How To Get Cloud Services To Work For You

Optimizing service assurance for XenServer virtual infrastructures with Xangati

Effective hosted desktops

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

Mobility and cloud transform access and delivery of apps, desktops and data

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

Enterprise- Grade MDM

icrosoft TMG Replacement with NetScaler

Design and deliver cloudbased apps and data for flexible, on-demand IT

Trend Micro Cloud Security for Citrix CloudPlatform

Secure SSL, Fast SSL

Using Vasco IDENTIKEY Server with NetScaler

Windows XP Application Migration Checklist

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

NetScaler carriergrade network

Solution Guide for Citrix NetScaler and Cisco APIC EM

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Taking Windows Mobile on Any Device

Secure remote access

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

The falling cost and rising value of desktop virtualization

Configuring Citrix NetScaler for IBM WebSphere Application Services

Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath

Single Sign On for ShareFile with NetScaler. Deployment Guide

Data Center Consolidation for Federal Government

Citrix ShareFile Enterprise: a technical overview citrix.com

Mobilize with Enterprise-Grade Security and a Great Experience

Building success in the cloud

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com

The Always-on Enterprise: Business Continuity Scenarios that Work

Comprehensive Enterprise Mobile Management for ios 8

Bring your own device freedom

Citrix ShareFile Enterprise technical overview

Defend hidden mobile web properties

Top Three Reasons to Deliver Web Apps with App Virtualization

Deploying XenApp on a Microsoft Azure cloud

Citrix Enterprise Mobility Report

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Deploying NetScaler with Microsoft Exchange 2016

Maximizing Flexibility and Productivity for Mobile MacBook Users

The fastest, most secure path to mobile employee productivity

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

SECURING IDENTITIES IN CONSUMER PORTALS

Citrix Solutions. Overview

Safeguard Protected Health Information With Citrix ShareFile

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

What is an application delivery controller?

Powering real-time mobile access to critical information with ShareFile

5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together

Securing virtual desktop infrastructure with Citrix NetScaler

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

Solve the application visibility challenge with NetScaler Insight Center

A revolution in cloud networking: Citrix TriScale Technology

Virtual desktops in hospitals: streamlining clinical workflows

Enterprise mobility management: Embracing BYOD through secure app and data delivery

Put the IoT to Work in Your Store

Design Your Cloud Strategy for Long-term Success

Modernize your business with Citrix XenApp 7.6

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video

Remote access to enterprise PCs

Mobile Application Management with XenMobile and the Worx App SDK

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com

RSA Solution Brief. RSA Adaptive Authentication. Balancing Risk, Cost and Convenience

Microsoft TMG Replacement with NetScaler

Citrix Support and Maintenance Services

Transcription:

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler application delivery solutions. The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable consolidating multiple NetScaler instances onto a single purposebuilt appliance. Working together, RSA and Citrix will jointly deliver RSA Adaptive Authentication on the next generation NetScaler SDX platform. This enables RSA and Citrix to jointly deliver consolidated, best-in-class L4-7 networking services on an open, unified platform. Citrix NetScaler Next Generation SDX Overview The next generation of the NetScaler SDX platform provides an open platform that makes the whole network app-driven. Unlike monolithic approaches that compromise functional depth for functional breadth by adding piecemeal extensions to existing products NetScaler SDX consolidates best-in-class application delivery services onto an open, unified platform. The next generation of SDX platform unifies best-in-class L4-7 network services into an application control layer, and can integrate this application control with both existing transport networks and emerging SDN technologies. This application control layer can make emerging L2-3 SDN architectures completely app-driven by using app-centric definitions and policies to simplify network design while making the whole network more intelligent. The next-generation of SDX provides: Control by creating a unified application control layer composed from best-in-class L4-L7 network services. Simplified administration by using a prescriptive, app-driven approach for defining networking policy and topology and automating network configuration. Consolidation of network services while preserving best-in-class network functionality. Intelligence by ingraining application intelligence and comprehensive control into both existing L2-3 infrastructures and emerging SDN architectures. The dynamic nature of cloud services requires a level of app-awareness, control and flexibility and that go beyond the capabilities of today s data center networks. Together, by integrating RSA Adaptive Authentication and NetScaler SDX, RSA and Citrix are delivering this app-awareness, control and flexibility to today s networks and tomorrow s SDNs in an open and unified manner.

3 RSA Adaptive Authentication Solution Overview RSA Adaptive Authentication is a comprehensive risk-based authentication and risk management platform that balances security, usability and cost. Adaptive Authentication offers a layer of security on top of existing user credentials that is convenient for any client type of location. Adaptive Authentication monitors and authenticates user activities based on risk levels, institutional policies and user segmentation. Adaptive Authentication protects against the risk of unauthorized access without compromising the user experience. Adaptive Authentication is powered by the RSA Risk Engine. The Risk Engine measures a series of indicators behind the scenes to validate user identities and behaviors. The majority of logins are invisibly authenticated by using analytics. This transparent authentication creates a superior user experience as users are only challenged in the highest risk scenarios. In addition, RSA Adaptive Authentication is self-learning and thus constantly improves detection accuracy. RSA Risk Engine Figure 1: RSA Risk Engine The RSA Risk Engine measures over 100 different risk indicators for every login. These risk indicators typically involve device identification, behavioral profile, and a check against the RSA efraudnetwork TM. The RSA Risk Engine is a self-learning technology. It recognizes and adjusts to threat patterns using a Naïve Bayesian Algorithm. A unique risk score, between 0 and 1000, is generated for each activity. The higher the risk score, the greater the likelihood that an activity is fraudulent.

4 Device identification analyzes the device from which the user accesses a web site or mobile application. Several devices can be associated with each end-user. The behavioral profile is a record of what activities the end-user usually performs. Both the device identification and behavior profile match behavior and profiles of typical users against themselves as well as against global profiles. Once the degree of risk has been assessed, the Policy Manager determines what action to take. Depending on the level or risk, an organization can decide to block, monitor, allow or force a step up authentication. The Policy Manager enables organizations to instantly react to emerging localized fraud patterns according to their business policies, and effectively investigate activities flagged as high risk. The Policy Manager is used to translate organizational risk policy into decisions and actions through the use of a comprehensive rules framework that can be configured in real time. The RSA efraudnetwork service is a cross organization repository of threat patterns gleaned from RSA s extensive network of customers, internal research lags, ISPs and third party contributors across the globe. When a threat pattern is identified, the threat data, transaction profile and device fingerprints are moved to a shared data repository. The efraudnetwork provides direct feeds to the Risk Engine so that when activity is attempted from a device or IP that appears in the efraudnetwork, it will be deemed high risk and prompt a request for additional authentication. When a particular user activity crosses the risk threshold as defined by the RSA Risk Engine and the Policy Manager, Adaptive Authentication can further assure the identity of the user by initiating a step up authentication. A step up authentication is an additional factor or procedure that validates user identities. Following are some examples of step up authentication methods: Challenge questions Secret questions that have been selected and answered previously by the end user. Out-of-band (OOB) phone authentication Via SMS, phone and email. When properly utilized, OOB authentication can stop MITB and MITM attacks. Multi-credential framework Adaptive Authentication is integrates with existing and 3rd party authentication methods. The Multi-credential Framework allows organizations to develop authentication methods via RSA Professional Services, in-house, or to integrate with existing or new 3rd party authentication methods.

5 RSA Adaptive Authentication 7.0 features a unique and dedicated risk model to analyze mobile channel activity. Mobile browser activity is detected automatically and analyzed by the mobile risk model. The analysis performed by the mobile risk model is enhanced by such features as location awareness and mobile device identification. Location awareness detects the location of the device using a series of time and geography based algorithms and can access location data gathered through Wi-Fi, cell-tower triangulation, and GPS. Anomalies such as locations which are new to the user, or impossible user ground speeds, are flagged. Device characteristics can be gathered either through JavaScript if the end user is accessing via a mobile browser or directly through an API. Mobile applications feature enhanced device identification, including device name, device model, language, screen size, and number of address book entries. Finally, Adaptive Authentication 7.0 protects against threats from hackers who set up proxy attacks to log on to institutions from proxy IP addresses. These attacks allow hackers to penetrate user accounts via the genuine end user IP and thus gain positive device identification. Proxy attacks install malicious code on the victim s device and open a back door that allows the hacker to connect. Adaptive Authentication 7.0 is able to determine when a log on or transaction is being performed via a proxy which is anomalous to the user and IP, and adjust the risk score appropriately. The Adaptive Authentication customer can use the policy manager to either deny, challenge, or monitor activity coming from a proxy address. RSA Adaptive Authentication is a proven solution that is currently deployed at over 8,000 organizations worldwide and across multiple industries including financial services, healthcare, and government. It is currently being used to protect over 200 million online users and has processed and protected over 20 billion transactions to date. Customer Value Integrating the advanced authentication features in RSA s Adaptive Authentication services with The next-generation SDX platform substantially enhances the security of the enterprise and cloud applications delivered through the NetScaler while providing a seamless end user experience. Added Agility: Organizations become more agile by providing on-demand, anytime, anywhere secure remote access to systems and applications. Strong Layered Security: Extend user identity across enterprise and SaaS applications with strong, multifactor security beyond username and password. Superior User Experience: Transparent authentication methods offer the lowest impact on genuine users providing a convenient online experience as users are only challenged when suspicious activities are identified and/or an organizational policy is violated. Low Total Cost of Ownership: Enables user self-enrollment with no need to deploy additional hardware.

6 Integration Strategy and Use-Cases Figure 2: RSA Adaptive Authentication

7 Corporate Headquarters Fort Lauderdale, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA EMEA Headquarters Schaffhausen, Switzerland India Development Center Bangalore, India Online Division Headquarters Santa Barbara, CA, USA Pacific Headquarters Hong Kong, China Latin America Headquarters Coral Gables, FL, USA UK Development Center Chalfont, United Kingdom About Citrix Citrix (NASDAQ:CTXS) transforms how businesses and IT work and people collaborate in the cloud era. With market-leading cloud, collaboration, networking and virtualization technologies, Citrix powers mobile workstyles and cloud services, making complex enterprise IT simpler and more accessible for 260,000 organizations. Citrix products touch 75 percent of Internet users each day and it partners with more than 10,000 companies in 100 countries. Annual revenue in 2011 was $2.21 billion. Learn more at www.. About RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading egrc capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.emc.com/rsa. Copyright 2012 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, Citrix NetScaler, and other Citrix product names are trademarks of Citrix Systems, Inc. All other product names, company names, marks, logos, and symbols are trademarks of their respective owners.. 0112/PDF