SETECS, Inc. SETECS, Inc.



Similar documents
The Security Framework 4.1 Programming and Design

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

CryptoNET: Security Management Protocols

NetworkingPS Federated Identity Solution Solutions Overview

API-Security Gateway Dirk Krafzig

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

SIGNIFICANT CHANGES DOCUMENT

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

The increasing popularity of mobile devices is rapidly changing how and where we

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Axway Validation Authority Suite

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

How To Protect Your Data From Harm With Safenet

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Identity and Access Management Initiatives in the United States Government

PortWise Access Management Suite

The Convergence of IT Security and Physical Access Control

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Department of Defense SHA-256 Migration Overview

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

PortWise Access Management Suite

Using Entrust certificates with VPN

Enabling SSL and Client Certificates on the SAP J2EE Engine

SAP Single Sign-On 2.0 Overview Presentation

Baltimore UniCERT. the world s leading PKI. global e security

PRIVACY, SECURITY AND THE VOLLY SERVICE

Alliance Key Manager Solution Brief

Public Key Applications & Usage A Brief Insight

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

How can Identity and Access Management help me to improve compliance and drive business performance?

Symantec Managed PKI Service Deployment Options

Take Control of Identities & Data Loss. Vipul Kumra

Oracle IDM Integration with E-Business Suite & Middleware Technologies

SAML SSO Configuration

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

Controlling Web Access with BMC Web Access Manager WHITE PAPER

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

FileCloud Security FAQ

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

How To Create A Global Signer For The Internet Of Everything

Secure web transactions system

Perceptive Experience Single Sign-On Solutions

CA SiteMinder SSO Agents for ERP Systems

Scalable Authentication

Audio: This overview module contains an introduction, five lessons, and a conclusion.

An Introduction to Entrust PKI. Last updated: September 14, 2004

Thales ncipher modules. Version: 1.2. Date: 22 December Copyright 2009 ncipher Corporation Ltd. All rights reserved.

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

Alliance Key Manager A Solution Brief for Technical Implementers

Angel Dichev RIG, SAP Labs

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Centrify Cloud Connector Deployment Guide

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Using PIV Smart Cards on Linux for Authentication to Windows Active Directory

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

How To Achieve Pca Compliance With Redhat Enterprise Linux

Identity Relationship and Access Management for the Extended Enterprise

Agenda. How to configure

Contents at a Glance. 1 Introduction Basic Principles of IT Security Authentication and Authorization in

PKI: Public Key Infrastructure

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Comprehensive Endpoint Security

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

GSA FIPS 201 Evaluation Program

WHITE PAPER Usher Mobile Identity Platform

Authentication and Single Sign On

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

Ensuring the Security of Your Company s Data & Identities. a best practices guide

SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.

PingFederate. Identity Menu Builder. User Guide. Version 1.0

GFIPM Implementation Guide Version 1.0

Ensuring the security of your mobile business intelligence

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

Security Services. Benefits. The CA Advantage. Overview

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

TIBCO Spotfire Platform IT Brief

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Entrust IdentityGuard Comprehensive

Copyright

Transcription:

1 SETECS, Inc. Next Generation Security Software for Identity and Access Management Enterprise Group (Collaborative) Applications SETECS, Inc. 8070 Georgia Avenue Silver Spring, MD 20910 Tel: (301) 587-3000 Fax: (301) 587-7877 7877 info@setecs.com www.setecs.com

Identity and Access Management (IAM) 2 a comprehensive set of solutions used to identify users in a system (employees, customers, contractors, etc.) and control their access to resources within that system by associating user rights and restrictions with the established identity. Web SSO, host SSO, user provisioning, advanced authentication, legacy authorization, public key infrastructure (PKI), and directory services are all critical components of identity and access management. [ Worldwide Security Software 2004-2008 Forecast and 2003 Vendor Shares, IDC, December 2004] Need for more comprehensive and integrated identity and access management solutions to: Reduce costs, and Increase security and productivity within and across enterprises [ Worldwide Security Software 2004-2008 Forecast and 2003 Vendor Shares, IDC, December 2004] The three most important security challenges facing corporations in 2005 are the need to: Beef up threat management capabilities Improve on identity management processes, and Tie IT and physical security capabilities together for greater authentication and access control [ Three Security Imperatives For 2005, Bloor Research, February 2005]

Smart Card Emerging as Major Component 3 Large and growing market NIST driving common identification standard for Federal employees s & contractors based on smart card (FIPS 201) $446M in 2003, will reach $1.35B in 2007 [Datamonitor,, Apr 2004] Following recent HSPD-12, multi billion dollar market 40M+ cards to be purchased by NASA, DOD, DHS, DI, VA via new GSA contract Identity and Access Management $2.2B in 2003, will reach $3.5B in 2008 [IDC, Dec 2004] SETECS Integrated IAM System Comprehensive identity and credential management (OneMAN ) Scalable across federated domains (OnePKI ) Strong authentication with smart card out of the box (OneCARD ) Smart card issuing station and middleware Single sign-on and WSS authorization and access control (OneNET )

Enterprise Group (Collaborative) Applications 4 Collaboration technologies enable document viewing, sharing and management; Still, real-time collaboration, which is enabled by instant messaging, presence-enabled applications, is the area that s growing the fastest. [ Leveraging Real-Time Communications in the Enterprise, Nemertes, 6 August 2004] Existing solutions with serious security limitations: Identities and documents stored unprotected Identities and transactions data over the network in clear SSL and digital certificates only temporary encryption and not scalables [ Instant Messaging: Time For IT To Pay Attention, Business Communications Review, January 2004] New legislations changing requirements: Sarbanes-Oxley Act and HIPAA Manage, secure and store all information within the enterprise [ Information Management for Compliance", IDC, 2005] ["Worldwide Email Archiving Applications 2004-2008 Forecast and 2003 Vendor Shares: To Be Dedicated Solutions or Not to Be - That Is the Question for the Forecast Scenarios", IDC, December 2004]

Security and Collaboration are Converging 5 Large and growing market Enterprise Instant Messaging: 80M business users today, reaching 500M by 2007 $220M in 2004, will reach $624M in 2008 [IDC, Sept 2004] Collaboration Software: $2B in 2002, will be over $2.5B in 2006, with advanced collaboration ation tools from $435M to $923M [Ovum, Mar 2003] Web Application Security: $400M in 2004, will reach $1.8B in 2007 [Yankee Group, Jul 2003] SETECS Secure Enterprise Group Applications System Dynamic real-time key distribution and management system with strong protection of crypto keys (OneGroup Policy & Key Distribution ) Browser-based thin client, no software installation for PC/PDA/ Smartphone clients (OneGroup Web-based based Thin Client) Multiple secure applications Secure sharing and archiving of documents, secure instant messaging and whiteboard

Security Problems and Solutions 6 APPLICATIONS INDUSTRY VERTICALS SETECS PRODUCTS PROBLEMS SOLUTIONS (SECURITY SERVICES) Secure Web (epayments, eforms, etaxes) Secure Messages (IM, Whiteboard) Secure Documents (Sharing, Archiving) Secure E-mail (Signed, Encrypted) Gov't Financial Health Care Other Commercial SETECS OneMAN SETECS OneNET SETECS OneGroup Identity theft Lack of identity verification Unauthorized transactions and activities Illegal access Spyware, lack of privacy, confidentiality, availability Reliable Identity Management Strong Authentication Authorization Policy-based Access Control Resource Security

SETECS Products: Enabling Technologies 7 OneFramework Security Framework for Fixed and Dynamic/Mobile Network Environments Collection of cryptographic objects Collection of security GUI objects Collection of security protocols objects (SSL, PKCS, strong authentication) OneCARD Smart Cards Middleware Platform Smart cards middleware based on Open Card Framework (Java objects) Smart cards middleware based on Government Smart Cards standard Virtual card system based on Government Smart Cards standard OnePKI Scalable Public Key Infrastructure Top CA : CA server at the root of the PKI with self signed signed certificate, certifying Policy CA servers and cross-certifying certifying with other Top CA servers Policy CA : CA server under Top CA server enforcing certification policy Hierarchy CA : Intermediate CA server between Policy CA server and multiple Local CA servers (optional) Local CA : CA server issuing users and application servers rs certificates PKI Client: Performs client certification functions with all CA servers

SETECS Products: Modular Applications 8 OneMAN Security Administration and Management OneMAN Security : registration, certification, and strong authentication of all network components and resources OneMAN Console: administrative interface to OneMAN OneNET Security System for Web Services OneNET : security proxy for multiple application servers (Web, SQL, shared documents, etc) with multiple security protocols OneNET Console: administrative interface to OneNET OneGroup Secure Group Applications OneGroup : security server for administrative group functions and key distribution protocol OneGroup Console: administrative interface to OneGroup OneGroup Thin Client: user interface for various secure group applications (secure IM, secure whiteboard, and secure sharing of documents) for PCs and PDAs

SETECS OneMAN Security Administration 9 Security Administration and Web Authorization Security Domain Administrator OneMAN Console OneCARD Smart Cards Administration OneMAN Registration DB LDAP/X.500 Directory Local CA User and servers registration and credential management (ID, digital certificates, smart cards)

Application: Secure E-mail/Secure Web (SSL) 10 OneMAN Console Domain Security (DSS) MySQL (Optional) Registration DB Apache Tomcat LDAP/X.500 Directory CA Web OneMAN Request and receive 1 2 browser s certificate 1 Request and receive Web server s certificate Application/Web 4 Secure Web (SSL) Web Apache Tomcat 3 Secure (signed and encrypted) E-mails

SETECS OnePKI Scalable PKI 11 OnePKI PCA TCA TCA Global PKI PCA HCA HCA Security Administration and Web Authorization Security Domain Administrator OneMAN Console OneCARD Smart Cards Administration OneMAN Registration DB LDAP/X.500 Directory Local CA Full PKI management

SETECS OnePKI Alternative Topologies 12 Bridge CA Top CA Top CA Policy CA Policy CA Policy CA Hierarchy CA Hierarchy CA Local CA Local CA Single CA Local CA User User User User Web and Other s

SETECS OneNET Web Services Security 13 OneNET: Web Services Security Security proxy for multiple web application servers WSS tickets for single sign-on Web authorization Domain Security (DSS) OneMAN and OneNET Console MySQL Registration DB Apache Tomcat (Optional) LDAP/X.500 Directory CA Web Services (SAML) OneNET Web OneMAN

Application: Single sign-on and Web authorization 14 OneMAN and OneNET Console Domain Security (DSS) MySQL (Optional) Registration DB Apache Tomcat LDAP/X.500 Directory CA Web Services (SAML) Web OneMAN OneNET 1 Login in OneNET server Web authentication Application/Web 4 WSS ticket 3 Click on any Web server OneNET Application WSS ticket 2 Get master ticket from OneNET server 5 Access and authorization Web Services (SAML) Web

SETECS OneGROUP Secure Group Applic. 15 OneGroup Console OneGroup OneGroup Console Group Security Authorization Administration Group Keys Group Offices Protected Documents Secure Applications User N OneGroup Thin Client User 1 User 2 User 3 Protected Messages

SETECS End-to-End Security (Single Domain) 16 OnePKI PCA TCA TCA Global PKI PCA HCA HCA Security Administration and Web Authorization Security Domain Administrator OneMAN Console OneCARD Smart Cards Administration OneMAN Registration DB LDAP/X.500 Directory Local CA OneNET Group Security Authorization OneGroup Administration Console OneGroup OneGroup Console Group Offices Secure Applications Users OneGroup Thin Client OneNET Application Web

SETECS Technology Advantages 17 Integrated Security System for Identity and Access Management Reliable identity management (registration, certification) Strong authentication (dig cert, smart card, biometrics) Authorization/access based on policy and roles (WSS, SSO, federated domains) Scalable across federated domains Next generation security software for group applications Dynamic group keys Scalable, on-demand user groups with forward and backwards confidentiality Protection of keys Stronger access control Management of keys for long-term access - Archiving of documents/messages for future retrieval Comprehensive Security Framework Written in Java, runs on any platform and communication protocol Extendable to Mobile/Wireless Environments Security software modules encrypted and self-protected Patent application

18 SETECS, Inc.

SETECS Profile 19 Maryland C-Corp C Corp established in March 2004 But with a long history Located in the Silver Spring Innovation Center Growing rapidly Four principals, four software developers Several sales agents under commission plan Multiple channel partners Significant corporate results Products released in Q1 2004 SBIR and TEDCO awards; several reseller and technology partnership agreements; product deployments and revenue Focus on company growth Expand customer base

SETECS Management Team 20 Industry Experience and Direct Expertise in Technology and Market Development Sead Muftic, President & CEO International expert in internet security technologies Founder, Chairman & CTO of Entegrity Solutions and COST AB PhD in Computer Security from CS/OSU (1976) John McWilliams, III, VP of Sales & Marketing 20+ years IT security industry IPO and acquisition experience V One, Trusted Information Systems, Network Associates, SSP Litronic Held USN Top Secret Clearance, attended GMU Stefano Baroni, VP of Business Development 10+ years in technology and business development Director of Product Management at Corvis; ; Bell Labs/Lucent Technologies PhD in EE from UCL, Georgetown MBA Mark Heffernan, VP of Finance & Administration 20+ years experience in finance and operations management President of DMS, Inc.; VP of Administrative Operations at JHPIEGO/JHU Wharton MBA, Maryland CPA

Commercialization and Customers 21 Channel approach with ISV, OEM & Reseller Partners for both Gov t & Commercial Markets ISV: Idea Integration and SCI Group OEM: Operational Research Consultants (ORC) U.S. Reseller: Intelligent Decisions and JB Cubed Intl. Resellers: Finally Software and XianGroup Professional Services agreements with World Bank and Pragmatics

Early Projects and Beta Customers 22 Interoperability Projects and Beta Customers NSA/DoD: Federal Bridge CA interoperability project NIST/DoD: smart cards project SSA: Web services project NSA: Secure group communication pilot NOAA: Agency-wide PKI pilot About 20 pilots worldwide (managed by Channel Partners)