Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management



Similar documents
Secure Your Enterprise with Usher Mobile Identity

How To Use Usher For Business

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Frequently asked questions

STRONGER AUTHENTICATION for CA SiteMinder

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

Improving Online Security with Strong, Personalized User Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide to Evaluating Multi-Factor Authentication Solutions

MicroStrategy Desktop MicroStrategy 10.2: New features overview. microstrategy.com 1

Business Banking Customer Login Experience for Enhanced Login Security

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Microsoft Enterprise Mobility Suite

Multi-Factor Authentication Job Aide

WHITE PAPER Usher Mobile Identity Platform

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Online Courses. Version 9 Comprehensive Series. What's New Series

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

Security Upgrade FAQs

Using Usher at MicroStrategy FAQ

Advanced Authentication

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Software Token Security & Provisioning: Innovation Galore!

LEARNING SOLUTIONS website milner.com/learning phone

Biometric SSO Authentication Using Java Enterprise System

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

MicroStrategy Course Catalog

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

Multi-Factor Authentication FAQs

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

This release bulletin relates to Version build 2701 of the Swivel Authentication Platform and other new capabilities.

ADDING STRONGER AUTHENTICATION for VPN Access Control

Multi-Factor Authentication of Online Transactions

A brief on Two-Factor Authentication

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Multi-Factor Authentication for first time users

Building Secure Multi-Factor Authentication

AWS Account Management Guidance

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

The Convergence of IT Security and Physical Access Control

Defender Token Deployment System Quick Start Guide

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

Employee Active Directory Self-Service Quick Setup Guide

PROTECT YOUR WORLD. Identity Management Solutions and Services

NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0

LEARNING SOLUTIONS website milner.com/learning phone

Two-Factor Authentication

MS 20467: Designing Business Intelligence Solutions with Microsoft SQL Server 2012

FREEDOM ACCESS CONTROL

PMDP is simple to set up, start using, and maintain

ForeScout MDM Enterprise

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

The ForeScout Difference

NetIQ Advanced Authentication Framework

Modern two-factor authentication: Easy. Affordable. Secure.

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Securing your Mobile Workforce with Okta and Espion

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Banking in the Mobile Age: MicroStrategy s Mobile Solutions. Stephen Bruggers VP Financial Services Solutions

Getting Started with Clearlogin A Guide for Administrators V1.01

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Moving to Multi-factor Authentication. Kevin Unthank

Vodafone Secure Device Manager Administration User Guide

Role of Multi-biometrics in Usable Multi- Factor Authentication

The Benefits of an Industry Standard Platform for Enterprise Sign-On

IBM Cognos Mobile Overview

Multi-factor authentication

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

FileCloud Security FAQ

Comodo Mobile Device Manager Software Version 3.0

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Cash Management 5.0 User Guide

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Initial DUO 2 Factor Setup, Install, Login and Verification

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Multi-Factor Authentication Core User Policy and Procedures

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Mobile Device Management Version 8. Last updated:

Total Enterprise Mobility. Norbert Elek

Copyright 2013, 3CX Ltd.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

The Convergence of IT Security and Physical Access Control

Usher: a comprehensive. enterprise security guide

Setting up Office 365 for Multi-Factor Authentication

Business Mobile App User Guide

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

NetIQ Advanced Authentication Framework - Smartphone Applications

Product Guide Addendum. SafeWord Check Point User Management Console Version 2.1

The Redesigned SAT. SAT Score Reporting Portal and Managing Access

Transcription:

Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1

Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge Authentication Policy Provisioning Users A real world example Setting it up for your Analytics App Raise Security level with a click, Deploy World Wide 2

Multi-Factor Authentication What is it and Why it s important

Multi-Factor Authentication What is multi-factor authentication Multi-factor authentication is a characteristic of an authentication system or a token that uses more than one authentication factor. The three types of authentication factors are something you know, something you have, and something you are. NIST SP 800-63-2 4

Three Factors of Authentication Secret, Possession, Biometrics Something YOU KNOW Something YOU HAVE Something YOU ARE Password, PIN, Secret Questions Tokens, Keys, ID Badges Biometrics: Fingerprint, Voice, Behavior 5

Passwords are a Poor Security Factor Common Knowledge, now in realm of Comedy What is Your Password? - Jimmy Kimmel Live clip Top 5 passwords of 2015: 1. 2. 3. 4. 5. 123456 password 12345 12345678 qwerty SplashData 6

Why Multi-Factor Authentication The more factors, the more secure The strength of authentication systems is largely determined by the number of factors incorporated by the system. Implementations that use two factors are considered to be stronger than those that use only one factor; systems that incorporate all three factors are stronger than systems that only incorporate two of the factors. NIST SP 800-63-2 7

Weaknesses of Relying on Passwords & Tokens Poor Usability, Poor Security, Expensive Passwords: Poor Usability, Poor Security Tokens: Poor Usability, Expensive 46% Routinely+forget+their+passwords $$$ Expensive to Distribute 51% Reuse+passwords Difficult to Use 37% Write+passwords+down 9% Save+them+on+their+computer 25+ Avg.+number+of+personal+passwords+=+17 Avg.+number+of+business+passwords+=+8.5 8

Usher Security Mobile Based Multi-Factor Authentication

Usher Security Securely access any system with your smartphone Physical)badges Passwords Replace with Usher Digital Badge Hardware tokens Keys 10

Logical Authentication Methods Multiple Methods of Logical Access 1 2 3 Scan QR Push Notifications Proximity Usher Analytics 6th Floor Lobby USHER 11

Access Any Enterprise Resource One mobile app, many authentication options Access*Digital*Assets Interactive* 1018 Portals.&.Applications Enter.or.speak. onedtime.passcode Biometrics Tap.a.digital.key. Workstations VPNs Respond.to.push. notification Scan. QR.code Tap.NFC.tag Access*Physical*Assets Proximity4based Doors Bluetooth.reader Beacons Elevators Behavioral Gates Limit.by.location. (geodfencing) Limit.by.time window. (time.fencing) 12

Deployment Steps Deploying MFA for your Analytics Implementation Define Badge Policy Provision Users Enable Usher for your App 13

Configure the Digital Badge Design & Define Authentication Policy

Configure Your Badge Design your Badge Aesthetics and Authentication Policies Define Badge Policy Provision Users Enable Usher for your App Design Authentication Policy 15

Define Your Badge Fully customize the Badge Design 16

Configure Authentication Policy Require Fingerprint 17

Configure Authentication Policy Require App Passcode 18

Configure your Badge s Conditions Geo-fence, Time-fence, Device Conditions of MicroStrategy HQ 19

Configure Device Security Requirements Require Phone Number Enrollment and Verification (Available in 10.3) Body Copy Bullet 1 o Bullet 2 - Bullet 3 20

Provisioning Flexible, Powerful methods for provisioning Users & Devices

Powerful and Flexible Methods for User Provisioning Delivering Badges to your Users Define Badge Policy Provision Users Enable Usher for your App Email Ownership IDM Integration Phone Number Verification SDK 22

Securely Deliver the Usher Digital Badge Connect to your User Repository 23

Email Ownership Push Badges to Users via a Unique Link Email is Delivered Enforce Badge Policy Badge is Available 24

IDM Integration Connect your Badge to an Enterprise Identity Management System 25

Usher SDK Customize your User Provisioning with Usher SDK Usher Security Server Your Organization Backend SDK User Information Badge 26

Case Study Innovative Implementation of Usher

Success Story : Vendor Portal Password-less Access to a MicroStrategy Web Project Customer: Major Grocery Chain Analytics Project: Vendor Portal External facing MicroStrategy Web Project for thousands of Vendors Business Problem: Secure the Vendor Portal with means better than password Concerns that Vendors may be sharing UID/PWD Password Policy maintenance expensive 28

Solution: Usher Digital Badge Vendors were issued Digital Badges Why Usher Was Selected Elegant user-provisioning method Usher prevented un-authorized access by eliminating password-sharing Replaced the need for a captcha 29 Vendor Portal VENDOR BADGE

Usher for your Analytics App Turn On MFA on your Analytics App

Native Integration with MicroStrategy 1. Setup on Usher Instance 31

Native Integration with MicroStrategy 2. MicroStrategy Intelligence Server Setup 32

Mobile Authentication Ready to Use Your Project is Usherized in 2 simple steps 33

Multiple Access Methods Access Using Push or Scan 6th Floor Lobby USHER 34

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm 35

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigmbio-factor Verification Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigmbio-factor Verification Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Device Verification Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Device Verification Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Raise Security with a Click, Deploy Worldwide Upgrade to the modern security paradigm Bio-factor Verification Device Verification Location Restriction Time Restriction 36

Secure Access to Logical Applications Deploy Multi-Factor Authentication for Every Application in your Enterprise 37

Usher Analytics Comprehensive Security Reporting, Native ETL

Identity & Access Schema Campus Device Type Year Month of Year Facility User Device Week Day of Week Month Floor Space Date FACT ACCESS TRANSACTIONS Action Action Type Action Group Address User Application Unit City Group State Sub-domain Division Department Country Domain Network 39

Native ETL + Out of the box Reporting Objects Built-in Identity & Security Objects 93 Attributes 144 Metrics 70 Filters 25 Cubes 60 Reports and Dashboards 40

System Access Report 41

System Access Report 41

It s included in MicroStrategy 10 Enabling MFA for MicroStrategy Apps is available for free

Questions?

Thank you Siamak Ziraknejad sziraknejad@microstrategy.com