Financial Security Symposium 2012. Singapore

Similar documents
Executive Summary P 1. ActivIdentity

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

CRESCENDO SERIES Smart Cards. Smart Card Solutions

Contactless Solutions

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them.

ActivIdentity. Smart Employee ID. Butler Group Subscription Services. Security. Abstract

Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Integrated Identity Management Whitepaper

Take the cost, complexity and frustration out of two-factor authentication

IQS Identity and Access Management

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Strong Authentication for Secure VPN Access

ADDING STRONGER AUTHENTICATION for VPN Access Control

STRONGER AUTHENTICATION for CA SiteMinder

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Using Entrust certificates with VPN

Global Headquarters: 5 Speen Street Framingham, MA USA P F

An Operational Architecture for Federated Identity Management

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

VPN Solutions FAQ North America International Germany Benelux France Spain Israel Asia Pacific Japan

IDaaS: Managed Credentials for Local & State Emergency Responders

Guard All Security Symposium. Identity and Access Management

PCI Data Security Standard

Securing Cloud Computing. Szabolcs Gyorfi Sales manager CEE, CIS & MEA

RSA SecurID Two-factor Authentication

Overview ActivClient for Windows 6.2

Moving to Multi-factor Authentication. Kevin Unthank

5 Day Imprivata Certification Course Agenda

Bridging the Great Divide. The Convergence of Physical and Logical Security

Extending Identity and Access Management

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication

Entrust IdentityGuard

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

The Unique Alternative to the Big Four. Identity and Access Management

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Public Key Applications & Usage A Brief Insight

HID Global Customer Guide to Technical Support and Maintenance

An Overview and Competitive Analysis of the One-Time Password (OTP) Market

NACCU Migrating to Contactless:

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Deriving a Trusted Mobile Identity from an Existing Credential

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Card Personalization Software. Asure ID 7

2003, Rainbow Technologies, Inc.

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Microsoft Windows Server 2003 Integration Guide

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Strengthen security with intelligent identity and access management

PROTECT YOUR WORLD. Identity Management Solutions and Services

THE LEADING EDGE OF BORDER SECURITY

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

The Return on Investment (ROI) for Forefront Identity Manager

nexus Hybrid Access Gateway

Protect Identities for people, workstations, mobiles, networks

WHITE PAPER Identity Management in a Virtual World INTRODUCTION. Sponsored by: Aladdin Knowledge Systems. Charles J.

IT Agility that Drives Business Forward

Enhancing Organizational Security Through the Use of Virtual Smart Cards

SafeNet Authentication Client

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

etoken TMS (Token Management System) Frequently Asked Questions

Comodo Authentication Solutions Overview

ConCERTO Secure Solutions for Converged Systems

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

1 The intersection of IAM and the cloud

Administration Guide ActivClient for Windows 6.2

mcard CPK Supported Solutions

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

Centrify Cloud Connector Deployment Guide

NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

How to Use Your LincPass Credential

How To Protect Your Data From Harm With Safenet

Enrolling with PIV and PIV-I Velocity Enrollment Manager

Using Contactless Smart Cards for Secure Applications

Strong Authentication. Securing Identities and Enabling Business

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

How To Create A Global Signer For The Internet Of Everything

Strong Identity Authentication for First Responders

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Transcription:

Financial Security Symposium 2012 Singapore

Identity Assurance Solutions - Establishing Trust in Online Identities LEE Meng Chuan Regional Sales Manager, ASEAN Identity and Access Management (IAM)

About HID Global Assa Abloy Global leader in door opening solutions Dedicated to satisfying end-user needs for security, safety and convenience Operations in more than 50 countries More than 10 percent of the world market Approximately 32,000 employees Sales of more than $5 billion USD HID Global Part of ASSA ABLOY s Global Technologies Division Global leader in secure identity solutions Top recognized brand in the access control industry worldwide More than 2,100 employees Over 1.5 Billion RFID products sold 3

HID Secure Identity Ecosystem HDP 8500 iclass SE Issuance PIV-I Services Enrollment Authentication Easy Lobby Enablement Secure Identity Solutions Management CMS Appliance UHF Technology 4

HID AI Interoperable With Popular IT Systems & Technologies Client Operating Systems Client Web Browsers Certificate Authorities Identity Management Systems and Directories Server Operating Systems Remote Access and Terminal Services Smart Cards, Readers and USB Tokens and many more! 5

IAM Solutions Customer Segments Government Enterprise FSI Issue credentials (mainly smartcards) to govt employees and citizens. Enable access control and management for authentication, encryption, signing and physical access Issue credentials (smartcards and OTP tokens) to employees Enable access control and management for authentication, encryption, signing and physical access Authenticate customers accessing internet banking, mobile banking... Fraud Detection Service New! 6 6

Customer References Government Enterprise Commerce 7 7

HID Global and ActivIdentity Converged Converged Identity Identity Assurance Solutions Solutions Tim Phipps Vice President Sales Logical Access, Asia Pacific 8 8

Common Security Concerns Convergence - " Our employees have to carry multiple badges and tokens to access different buildings and IT systems, it s a real pain. Why can t we deploy a single badge that gets us access to everything." Mobility - " We are moving to cloud-based computing. We want to give our employees and contractors remote access to applications and data, any time, any place, any where. But how do can I do this securely Compliance - " Our company wants us comply with government / industry regulations that require use of PKI cards how do I do that, it sounds complicated?" 9

Smart Employee ID Credentials 10

What can you do with a Smart Employee ID? 11

But Convergence Is Much More Than Using a Single Card For PACS and LACS 12 12

What happens with a single device? Issuance & Management Processes Digital Identity IT Access Rules & Auditing Issuance & Management Processes Physical Identity PACS Access Rules & Auditing 13

Convergence: the full picture Issuance & Management Processes Digital Identity IT Access Rules & Auditing Issuance & Management Processes Access Rules & Auditing Issuance & Management Processes Physical Identity PACS Access Rules & Auditing 14

What is True Security Convergence? Consolidate credentials for IT and physical access onto a single card. Connect the processes for granting and revoking building and IT access. Onboarding new hires, employee departures, temporary contractors Correlate security events across the physical and IT domains. Location-based authentication, anti-tailgating Unify the auditing of physical and IT rights and events. Compliance, investigations Source: Forrester 'Trends 2005: Security Convergence Gets Real 17

Benefits for the Organization Cost Reduction Only one identity device across the enterprise (physical and logical) Organizational Efficiency No duplication of tasks and processes to manage identities and devices for facility and IT access Employee Productivity Easier access to IT systems and applications (single sign on to improve productivity) Brand / Image Protection Reduce risks of security breach, limit negative impact to reputation Employee Privacy Credentials are secured in the card 18

The navigo Converged Solution Two-factor authentication using the same card employees use every day for facility access Seamless integration into existing infrastructure Fastest access to shared workstations running Citrix XenApp and XenDesktop and VMware View Auditable record of access on systems that were previously difficult or impossible to audit Rapid Return on Investment (Less than one month) 19

Open Doors. For the past two decades, over 400,000,000 users have enjoyed the ease of opening doors with HID cards Open Windows. PACS + LACS Solution HID now brings that same convenience to open Windows 20

LEVEL OF SECURITY Full Convergence Solutions PKI at the door Enables existing 400+M active HID cards to be used for system access - Windows login - Citrix login - VMware login Issue and manage certificates and keys on smart cards Dual interface cards Smartcard chip, with contactless interface Crescendo cards combine Prox/iCLASS with a contact chip pivclass PKI Prox cards iclass cards CAPABILITY 21

In a Nutshell... Complete Identity Lifecycle Management System (PACS+LCAS) 22

HID-IA: ActivIdentity Product Lines Versatile Authentication Authentication Devices Credential Management Security Clients Validation Access Control ActivIdentity 4TRESS AAA Server for Remote Access ActivIdentity 4TRESS Authentication Server ActivIdentity 4TRESS Fraud Detection Service ActivIdentity Smart Card and USB Token ActivIdentity OTP Token ActivIdentity Software Token ActivIdentity ActivID Card Management System ActivIdentity ActivID Batch Management System ActivIdentity Identity Registration System ActivIdentity ActivClient ActivIdentity SecureLogin Single Sign-On CoreStreet PKI Validation and Responder Appliance CoreStreet Desktop Validation Client and Server Extension PACS: ActivEntry, ActviEntry Mobile LACS: navigo, Crescendo, HOTD 23

Thank You. Email: mlee@hidglobal.com 24