The Ultimate Authentication Technology



Similar documents
Introducing etoken. What is etoken?

VPN Solutions FAQ North America International Germany Benelux France Spain Israel Asia Pacific Japan

etoken Single Sign-On 3.0

WHITE PAPER Identity Management in a Virtual World INTRODUCTION. Sponsored by: Aladdin Knowledge Systems. Charles J.

White Paper for Software Publishers. Strong Authentication: Securing Identities and Enabling Business

Using Entrust certificates with VPN

IdenTrust Partner WebSummit March 19, 2008

Innovative Secure Boot System (SBS) with a smartcard.

FEITIAN PKI Authentication Token. epass2003 with FIPS Cer tification

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

RSA Digital Certificate Solution

IBM Client Security Solutions. Client Security User's Guide

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)

SafeNet Authentication Client (Windows)

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

SafeNet Authentication Client (Mac)

CRESCENDO SERIES Smart Cards. Smart Card Solutions

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

Secure Data Exchange Solution

etoken TMS (Token Management System) Frequently Asked Questions

CardOS API V3.2. Standard cryptographic interface for using applications with CardOS smart cards

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Managed Portable Security Devices

Using etoken for SSL Web Authentication. SSL V3.0 Overview

SafeNet Authentication Client (Windows)

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

IQS Identity and Access Management

Use of any trademarks in this report is not intended in any way to infringe upon the rights of the trademark holder.

Check Point FDE integration with Digipass Key devices

Moving to Multi-factor Authentication. Kevin Unthank

Customer Whitepaper. Motion Tablet PC Security Basics. Table of Contents. Whitepaper Goals and Intended Audience...2

2 factor + 2. Authentication. way

Strong Authentication. Securing Identities and Enabling Business

WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW. Entrust All rights reserved.

Corporate Presentation

Xerox DocuShare Security Features. Security White Paper

etoken PKI Client Version 4.5 Reference Guide

Two-Factor Authentication

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

SSL VPN Technical Primer

Using etoken for Securing s Using Outlook and Outlook Express

TFS ApplicationControl White Paper

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

White Paper. The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications

USB etoken and USB Flash Features Support

Yale Software Library

IMS Health Secure Outlook Web Access Portal. Quick Setup

Deploying Smart Cards in Your Enterprise

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication

SafeNet Authentication Client (Windows)

Managed Services PKI 60-day Trial Quick Start Guide

Deriving a Trusted Mobile Identity from an Existing Credential

Overview ActivClient for Windows 6.2

Already working or still authenticating again, again, and again? Smart Enterprise Single Sign-On

Convenience and security

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

CRYPTOCard. Strong Two Factor Authentication

Simplifying Security with Datakey Axis Single Sign-On. White Paper

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

Understanding the Cisco VPN Client

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Ensuring the security of your mobile business intelligence

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

WHITE PAPER Usher Mobile Identity Platform

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

RSA SecurID Ready Implementation Guide

ipad in Business Security

INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0

DIGIPASS CertiID. Getting Started 3.1.0

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Salesforce1 Mobile Security Guide

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Google Identity Services for work

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Securely Delivering Applications Over the Internet. White Paper

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Entrust Managed Services PKI

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

Endpoint Security VPN for Windows 32-bit/64-bit

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Feature and Technical

Ensuring the security of your mobile business intelligence

Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk

DRAFT Standard Statement Encryption

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Advanced Authentication

22 nd NISS Conference

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Transcription:

"USB tokens will be widely adopted into the market because of their low price and greater convenience." IDC, 2003 The Ultimate Authentication Technology

The Digital Identity Paradigm Network security and information access both are critical to the successful enterprise. In this world of ecommerce, strategic partnerships, and road warriors, the demand for remote access to company resources is dissolving the traditional boundary of the enterprise. While the opportunities have never been greater, the risks have also multiplied with the potential that unauthorized individuals access the wrong information. As a result, controlling the digital identity of those accessing key resources is more important than ever. Passwords, the primary tool for user authentication, can be easily stolen, lost, shared or even cracked. Due to the need to manage multiple passwords and to ensure the effectiveness of passwords used, organizations have adopted stringent password policies. This has translated into more complex passwords and consequently, made them more difficult to remember. To cope, users are writing their passwords down, compromising the security they were meant to improve. etoken - The Digital Identity Organizer The Aladdin etoken is a fully portable, cost-effective USB device to authenticate users and digitally sign sensitive business transactions. It enables both users and IT/security administrators to more effectively manage the authentication process by securely storing and generating passwords, digital certificates, and encrypting all logon information both public and private keys. etoken thus ensures that users keys are never exposed to the hostile PC environment. More than password authentication is necessary to protect sensitive information... users not only compromise security by writing their passwords down, but 67 percent of users rarely or never change their passwords. NTA Monitor, 2002 80% of help desk calls are password related. www.silicon.com 2003 Password reset costs are estimated between $40 to $140 per call. Gartner, 2003 etoken Key Benefits High Comparison of Authentication Means By Security and User Acceptance Provides enhanced security and ensures safe information access Smartcards USB Tokens Enables mobility of keys and digital credentials/certificates Security One Time Password Tokens Provides improved password and ID management Low Low Passwords High User Acceptance (Usability) IDC, June 2003

010100101001010100101010010101000100101001 1 1 0 0 0 1 0 0 0 0 1 0 Solutions and Applications Today s IT environment demands that you do more with less. etoken delivers a broad platform of solutions to enable greater standardization, with lower deployment and management costs. One etoken enables all of these solutions and more: YOUR VPN ACCESS. YOUR NETWORK ACCESS. YOUR WEB ACCESS. YOUR E- MAIL ACCESS & CONIDENTIALITY. YOUR COMPUTER BOOT & ILES PROTECTION. YOUR SECURE KEY STORAGE. YOUR SECURE CERTIICATE STORAGE. YOUR SECURE PASSWORD STORAGE. YOUR SECURE KEY GENERATOR. It s your digital identity organizer. VPN Security (Secure Remote Access) etoken enables enterprises to strongly authenticate their remote users when accessing the organizational network, offering seamless integration with mainstream VPN systems such as: Cisco, Check Point, Microsoft, SSH and many others. Web Access etoken enables strong user authentication when accessing protected web resources and signing sensitive digital transactions. Using standard browser technology and digital certificates, users can also verify that the websites they are accessing are what they claim to be. Network Log-on etoken enables organizations to add strong user authentication when logging on to protected network resources supporting Smartcard logon technology using PKI and also the native Microsoft (GINA) logon mechanism by storing users passwords and access credentials. Proximity Access (Doors/badges) etoken enables the integration of a variety of proximity technologies combined with network access for both, with its traditional Smartcard and USB token form factors, depending on organizational needs. Printing of a user s picture and identification details on the Smartcard offers an ideal solution for organizations requiring visual user verification. ile & Data Encryption etoken offers advanced connectivity to many types of data protection systems, ranging from full hard drive encryption and boot protection, to specific file encryption and signing. Secure Email etoken offers seamless connectivity to major email clients using standard security features. Advanced Password Management With etoken, a user no longer needs to remember passwords for different accounts their single etoken password combined with their etoken is all they need. etoken manages the user s credentials and automatically submits them to different log-on applications. Transaction and Document Signing (Non-repudiation) Transactions and documents can be digitally signed with etoken through PKI technology, ensuring the authenticity of electronic transactions.

0101100100010001000100001000100010 010100101001010100101010010101000100101001 1 1 0 0 0 1 0 0 0 0 1 0 etoken Product Offerings etoken offers a robust framework for integration with many of today s leading technology companies, providing organizations with a variety of applications to meet their specific needs. Management Management Utilities MS CA Entrust Net Logon Token Management System (TMS) Other Applications Windows Network Logon (GINA) Credential Caching Check Point SAA Web Sign On (WSO) Simple Sign On (SSO) PKI Third Party Security Applications PC Security, Encryption VPNs, Signing APIs Tokens / Devices CAPI / PKCS#11 / CTAPI / PCSC / APDU etoken " R2 etoken PRO " PRO Smartcard Proximity Add On " " ID " Badge etoken Enterprise Security Solutions PKI Solutions etoken provides strong 2-factor challenge/response authentication using PKI keys and certificates. It operates with any standard PKI aware application, using either PKCS#11 or Microsoft CAPI. ull support is available for applications such as: Network Logon via Microsoft Smartcard Logon, Novell NMAS or Entrust Entelligence Security; Secure Web Access via standard web browser security using advanced Secure Sockets Layer V3; Remote Access VPN Authentication with Cisco, Check Point, Microsoft, SSH and many other leading systems; Signed and Encrypted Emails using mainstream email systems such as Outlook, Netscape, and Eudora; Document Signing using Adobe Acrobat and other document signing systems. WSO (Web Simple Sign On) etoken s WSO application securely stores and manages a user s web logon credentials, IDs and passwords. It automatically fills in logon details after their etoken password has been entered. No changes need to be made to the web application and only authorized people are granted access to sensitive online information. SSO (Simple Sign On) Secure Credential Caching Solutions etoken SSO simplifies the logon process to restricted applications by securely storing and presenting digital identity credentials when required. This greatly simplifies the logon process, reduces password management time and enhances user productivity. The etoken SSO enables the caching of access credentials to any standard Windows logon screen such as Notes, RAS Dialers, VPN Clients, etc. All a user needs to do is present one simple etoken password to access all his login credentials. etoken for Network Logon The etoken Network Logon solution provides a low-cost method for implementing hardware-based network authentication. This includes domain name combinations, usernames, and authentication passwords, as well as PKI keys and certificates. A user authentication password can be randomly generated and users will not need to remember it (supporting both Microsoft GINA and Novell Netware).

etoken Management Solutions TMS (Token Management System) The Aladdin Token Management System is a complete framework for managing all aspects of token assignment, deployment and personalization within an organization. Built on open standards and Active Directory, TMS allows you to manage your authentication tokens through simple plug-ins, centrally push software updates, and inject and revoke etoken credentials. Linked directly to the existing organizational user management systems, the TMS offers a robust and flexible link between the user, the security application, the authentication device used and the organizational rules. etoken Utilities etoken Utilities provide administrators with a basic set of applications to administrate and set token policies. The utilities include: a properties tool, enabling users to perform basic token management such as password changes, viewing of information, etc; an application viewer tool, allowing users and administrators to view profiles and certificates on the etoken; a formatting tool, allowing administrators to format the etoken according to specific organizational requirements or security modes; a certificate converter tool, providing users and administrators a quick and easy way to transfer digital certificates and keys between a computer and an etoken; a password quality tool, enabling the manipulation of the parameters which calculate an etoken s password quality rating; and a vendor ID tool, allowing the signing of the etoken with corporate signatures. etoken Development Tools etoken SDK (Software Developer s Kit) allows software developers to integrate etoken security functionality into their applications. This user-friendly SDK includes a set of industry standard APIs and supporting documentation, enabling seamless integration with third-party applications. The etoken SDK uses standard security interfaces for Windows, Linux, Microsoft CAPI, and PKCS#11 interfaces. Special 16-bit libraries enable integration with boot protection security solutions requiring logon prior to operating system loading. etoken-enabled Third-Party Applications etoken integrates with a variety of third-party applications from leading security companies. The etoken Enabled designation given to our partners' applications means that through integration with the etoken, they offer a complete security solution for that specific need. Partner Check Point Cisco CA IBM Microsoft Novell PGP Pointsec RSA SAP Utimaco VeriSign Entrust Boot Protection Disk Encryption ile/ older Encryption Email Encryption PKI Infrastructure Single Sign On VPN Client Web & Remote Access Network/ Workstation Logon *Partial list

0101100100010001000100001000100010 0101100100010001000100001000100010 010100101001010100101010010101000100101001 010100101001010100101010010101000100101001 1 1 0 0 0 1 0 0 0 0 1 0 Choosing the Right etoken etoken s interchangeable form factors allow organizations complete flexibility to meet their individual needs. rom USB tokens for PCs and remote environments, to Smartcards for access control and identity badges etoken s accessibility, efficiency and portability mean it s the smart choice for organizations looking to stay ahead in today s ever changing, digitalized world. All devices support the same security interfaces and work seamlessly with both Enterprise and SDK security applications. etoken Pro (USB) etoken PRO is a USB, readerless Smartcard. It is a low cost device that enables strong, 2-factor authentication and is easy to deploy. etoken PRO's secure, on-board RSA 1024-bit key operations enable seamless integration into any security or PKI architectures. etoken Pro (Smartcard) etoken Pro Smartcard offers the same functionality as etoken Pro USB, but its shape is that of a traditional credit card form factor. The etoken Smartcard is operable with a standard Smartcard reader. etoken R2 etoken R2 is a USB device that is ideal for secure storage of users private keys and access credentials. eaturing onboard 120-bit DESX encryption, the R2 combines high security with ease of use. Proximity (Physical) Access The etoken Smartcard is ideal for combining ID badges for visual identification, with physical access and logical access to networks. Proximity technology can be integrated with both Token and Smartcard form factor 1 1 0 0 0 1 0 0 0 0 1 0 etoken Certifications The Aladdin etoken meets the highest industry standards and certifications. Product Certifications:

0101100100010001000100001000100010 010100101001010100101010010101000100101001 1 1 0 0 0 1 0 0 0 0 1 0 Technical Specifications etoken PRO USB Specifications Operating systems Windows 95(OSR2)/98/98SE/Me/2000/XP, and Windows NT4.0 SP4 and later API & Standards Support PKCS#11 v2.01, CAPI (Microsoft Crypto API), Siemens/Infineon APDU commands PC/SC, X.509 v3 certificate storage, SSL v3, IPSec/IKE Models (by memory size) 16K, 32K On board security algorithms RSA 1024-bit, DES, 3DES (Triple DES), SHA1, (MD5 - optional) Security level ITSEC LE4 (Infineon and Siemens), IPS 140-1 level 2 & 3 Speed RSA 1024-bit signature approx. 1 second RSA 1024-bit key generation approx. 11 seconds Dimensions 47 x 16 x 8 mm (1.85 x 0.63 x 0.31 inches) ISO specification support Support for ISO 7816-1 to 4 specifications Weight 5g Power dissipation 120mW Operating temperature 0 C to 70 C (32 to 158 ) Storage temperature -40 C to 85 C (-40 to 185 ) Humidity rating 0-100% without condensation Water resistance certification IP X8 IEC 529 USB type A (Universal Serial Bus) Casing Hard molded plastic, tamper evident Memory data retention At least 10 years Memory cell rewrites At least 500,000 etoken PRO Smartcard Specifications Operating systems Windows 95(OSR2)/98/98SE/Me/2000/XP, and Windows NT4.0 SP4 and later API & Standards Support PKCS#11 v2.01, CAPI (Microsoft Crypto API), Siemens/Infineon APDU commands PC/SC, X.509 v3 certificate storage, SSL v3, IPSec/IKE Models (by memory size) 32K On board security algorithms RSA 1024-bit, DES, 3DES (Triple DES), SHA1, (MD5 - optional) Security level ITSEC LE4 Smartcard security certification (Infineon and Siemens) Speed RSA 1024 bit signature approx. 1 second RSA 1024 bit key generation approx. 11 seconds ISO specification support Support for ISO 7816 1 to 4 specifications Memory data retention At least 10 years Memory cell rewrites At least 500,000 etoken R2 USB Specifications Operating systems Windows 95(OSR2)/98/98SE/Me/2000/XP, Windows NT4.0 SP4 and later API & Standards Support PKCS#11 v2.01, CAPI (Microsoft Crypto API), PC/SC, X.509 v3 certificate storage, SSL v3, IPSec/IKE Models (by memory size) 16K, 32K On board security algorithms DES-X 120-bit Smartcard Chip security level Secured and encrypted EEPROM memory chip Dimensions 47 x 16 x 8 mm (1.85 x 0.63 x 0.31 inches) Weight 5g Power dissipation 120mW Operating temperature 0 C to 70 C (32 to 158 ) Storage temperature -40 C to 85 C (-40 to 185 ) Humidity rating 0-100% without condensation Water resistance certification IP X8 IEC 529 USB type A (Universal Serial Bus) Casing Hard molded plastic, tamper evident Memory data retention At least 10 years Memory cell rewrites At least 100,000

About Aladdin About Aladdin Aladdin (NASDAQ: ALDN) has been a leader in digital security since 1985, providing solutions for software commerce and Internet/network security. Aladdin has been granted 18 patents, with 60 pending. Internet and Enterprise Security: etoken, a USB-based device for cost effective, strong user authentication and ecommerce security; esafe, a proactive content security solution, protects PCs and networks against malicious, inappropriate and non-productive Internet-borne content. Software Commerce: Over 25,000 developers/publishers worldwide use Aladdin to protect and distribute their software. Privilege, a leading software licensing and distribution platform; HASP and Hardlock, hardware-based software security systems, protect developer revenues. Printed in Israel (7/ 2003) Aladdin Knowledge Systems, Ltd., and etoken are registered trademarks of Aladdin Knowledge Systems Ltd. All other product names are trademarks or registered trademarks of their respective owners. or more info: ealaddin.com/etoken International North America UK Germany Benelux rance Israel Japan Spain T: +972-3-6362222, : + 972-3-5375796, etoken@ealaddin.com T: 1-800-562-2543, 1-847-818-3800, : 1-847-818-3810, etoken.us@ealaddin.com T: +44-1753-622266, : +44-1753-622262, etoken.uk@ealaddin.com T: +49-89-89-4221-0, : +49-89-89-4221-40, etoken.de@ealaddin.com T: +31-30-688-0800, : +31-30-688-0700, etoken.nl@ealaddin.com T: +33-1-41-37-70-30, : +33-1-41-37-70-39, etoken.fr@ealaddin.com T: +972-3-6362313, : +972-3-6362318, etoken.il@ealaddin.com T: +81-426-607-191, : +81-426-607-194, etoken.jp@ealaddin.com T: +34-91-375-99-00, : +34-91-754-26-71, etoken.es@ealaddin.com