Securing Cloud Computing. Szabolcs Gyorfi Sales manager CEE, CIS & MEA



Similar documents
ACH fraud: The problem Why ACH? Why now? Security evolution How to protect ACH. Combating the Newest Attack Method ACH Fraud Webinar agenda

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

ADDING STRONGER AUTHENTICATION for VPN Access Control

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Secure your Privacy. jrsys, Inc. All rights reserved.

Adding Stronger Authentication to your Portal and Cloud Apps

STRONGER AUTHENTICATION for CA SiteMinder

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

QR Code for Digital Signature Online/Offline Payment. James Wu 1

Enhancing Web Application Security

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Securing Virtual Desktop Infrastructures with Strong Authentication

Jrsys International Corp.

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

TrustedX - PKI Authentication. Whitepaper

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Windows Phone 8 Security Overview

SafeNet Authentication Service

Entrust IdentityGuard

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Flexible Identity Federation

Protect Everything: Networks, Applications and Cloud Services

WHITE PAPER Usher Mobile Identity Platform

Longmai Mobile PKI Solution

Strong Authentication for Secure VPN Access

How To Make A Multi-Tenant Platform Secure And Secure

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Token User Guide. Version 1.0/ July 2013

nexus Hybrid Access Gateway

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Secure USB Flash Drive. Biometric & Professional Drives

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

etoken TMS (Token Management System) Frequently Asked Questions

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Entrust Managed Services PKI Administrator Guide

Secure Data Exchange Solution

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Strong Authentication in details

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Enhancing IBM SAM E-SSO s Strong Authentication capabilities with smart phones, smart cards and other tokens

A brief on Two-Factor Authentication

Agenda. How to configure

Chapter 1: Introduction

Advanced Authentication

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

A new Secure Remote Access Platform from Giritech. Page 1

Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk

PortWise Access Management Suite

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

SafeNet Authentication Service

Managers Your guts - Our glory. j.dowley@hotmail.com

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Authentication: Password Madness

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

RSA SecurID Two-factor Authentication

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Key & Data Storage on Mobile Devices

CRYPTOCard. Strong Two Factor Authentication

DESIGNING SECURE USB-BASED DONGLES

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Entrust IdentityGuard Comprehensive

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

The following information is provided by ARX, Inc. to aid customers in their evaluation of CoSign for SharePoint (C4SP).

CRESCENDO SERIES Smart Cards. Smart Card Solutions

TABLE OF CONTENTS. Vendor Web & e-registration...2. Usage of Digital Signature Certificate...3. What is an etoken?. 4. General FAQ...

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Rational AppScan & Ounce Products

SAP Single Sign-On 2.0 Overview Presentation

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS as a Service. Product Guide

Moving to Multi-factor Authentication. Kevin Unthank

Scalable Authentication

BlackShield ID Best Practice

Transcription:

Securing Cloud Computing Szabolcs Gyorfi Sales manager CEE, CIS & MEA

Gemalto: Security To Be Free More than just a company tag line it is why we exist Communicate Shop Travel Bank Work In ways that are convenient, enjoyable and secure 2

Gemalto s Secure Personal Devices are in the hands of billions of individuals worldwide 1.5 billion secure devices Produced and personalized in 2009 200 million citizens Received a Gemalto produced e-passport 500 million people Carry a Gemalto produced credit card 400 mobile operators Connecting 2 billion subscribers 30 years experience designing/producing secure personal devices 3

Global Leadership Position Top producer of: SIM cards and UICC (1) Over-The-Air platforms (2) Chip payment cards (4) Chip-based corporate security solutions (1) e-passports (3) Innovation leadership examples First to market with IP based UICC for LTE Ezio optical reader for online banking *Source: (1) Frost & Sullivan; (2) Gemalto (3) Keesing Journal of Identity ; (4) The Nilson Report 4

Defining the Cloud Securing Identities is Key to Success in the Cloud breaks down cloud computing into three different archetypes or models: Software as a Service (SaaS), Platform as a Service (PaaS) Infrastructure as a Service (IaaS). SaaS PaaS IaaS 3 rd party cloud providers deliver a full application service to end-users, uses a cloud-based infrastructure to deliver customer-based applications, enables businesses to deliver their own services by providing them with cloud-based equipment. IDC report, June 2010 5

Market Drivers & Challenge Compliance with regulations and standards Sarbanes-Oxley Act, Health Insurance Portability and Accountability, European Data Protection Directive,... Cloud Services are growing Convenience is a key for Cloud Services adoption: Identity management is painful for organizations and users Single Sign-On: eliminate passwords across cloud services Secure Access is a strong factor Cost Identity theft and phishing attacks are more relevant in cloud world Static Password is Not Secure as cyber criminals are getting smarter, faster and more tenacious about getting at your data and static passwords High TCO for complex password policies Cloud Service 6

The weakest link When you move to the cloud, there may no longer be a PC under the desk, but the user is still the weakest link in the chain. Most people have terrible habits when it comes to passwords, use the same passwords everywhere, and some write them on sticky notes and put them on their monitor. You can have a software provider with the best security on the market, but if one employee happens to choose a bad password that can be guessed in a social engineering attack, it can be catastrophic. 7

Security and convenience Can we have both? Dilbert cartoons "Providers of cloud computing resources are not focused on security in the cloud. Rather, their priority is delivering the features their customers want such as low cost solutions with fast deployment that improves customer service and increases the efficiency of the IT function. As a result, providers in our study conclude that they cannot warrant or provide complete assurance that their products or services are sufficiently secure. Ponemon Institute, 2009 Study 8

Security is a Balancing Act Must balance between Strength and Usability 9

Protiva Confirm: Secure & Convenient Cloud Services enabler Bringing ADAPTABLE TRUST to Cloud Services Strong authentication ensures secure access to Online Services with multiple authentication methods: Password, OTP, PKI Bringing CONVENIENCE to Cloud Services Identity federation/sso Bringing ADVANCED SERVICES to Cloud Services Digital signature service Post Issuance No longer need to choose between SECURITY & CONVENIENCE 10

Adaptable Trust PKI OTP Password.NET, TPC, Cards Display Card, 11

Protiva SA Server The Heart of Protiva Strong Authentication Service Validation server supporting OTP authentication Standards based technology Tokens - OATH event based or time based Mobile App Time based with time stamping Web based administrator interface for user management User self-care portal for registration and password back-up Easily integrates with existing infrastructure Established integrations with leading infrastructure technology Databases MySQL, MS SQL, Oracle, IBM DB2, etc. User Data Repository Microsoft AD, Novel edirectory, Sun One, Open LDAP, etc. Authentication Service HTTP/HTTPS, SOAP, SAML 2.0, XML, RADIUS, Microsoft IAS/NPS, etc. 5/15/2012 12

User On Boarding Mobile OTP User Download and Activate Authentication server URL sent to user by email User enters numeric validation code User establishes personal PIN Mobile OTP application activated 13

Platform for next secure token generation Building Value Together ID-000 (SIM sized) smart card reader Micro SDHC card interface Versatility of smart card and MicroSD Easy to assemble USB High Speed with HID / CCID switch Full exposure of smart card in CCID mode 0footprint in HID mode AES 256 encryption Data can be encrypted CD-ROM emulation Autorun of applications stored in MicroSD USB 2.0 Micro SD Flash ID0 Smart Card Personalization services: graphical, packaging, smart card and flash insertion (MOQ: 1000 units) 15/05/2012 14

Flash memory partitioning SD Partitions Public (X:) Read Only (Y:) Private (Z:) PKI Smart Card Digital signature PKI certificate Controller Firmware: Integrator Key Secure Drive PIN Mass Storage HID / CCID Building Value Together 15/05/2012 15

Use case: secure browsing Where ever you go! Whatever you do! Your browser is protected from permanent infections Using a Secure Browser stored in RO, the malware cannot permanently infect your browser (your browser integrity is maintained) Using a Secure Browser, the server certificates of your corporate trusted websites are stored in your browser and compared to the website you are trying to reach! If this is a phishing website then your browser refuses it! Building Value Together the list of accessible URLs can be restricted USB Shell Pro Token v1 15/05/2012 16

Secure Browsing example Mode HID Portable Firefox (in RO partition) Firefox ProCon add-on Portable P#11 for TPC IM CC RO: Firefox 15/05/2012 17

Data Leakage Protection example Mode CCID Microsoft Bitlocker on the computer Encryption of public partition is done using the smart card Public: Encrypted partition 15/05/2012 18

Fulfillment End User Initiated Fulfilment Fulfillment Process Order Two Factor Auth (2FA) credential or token ordered by end user Receive 2FA credential or token is shipped or made available to end user Use User can start using strong 2FA to protect access to cloud resources 19

Thank You