ACCESS MANAGEMENT UTILITY SERVICE via SECOND FACTOR AUTHENTICATION (2FA)

Similar documents
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

A brief on Two-Factor Authentication

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Two-Factor Authentication

ADDING STRONGER AUTHENTICATION for VPN Access Control

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

TARGETPROCESS HELP DESK PORTAL

iii. You will not be able to access their iocbc account without a valid OTP token from 1 Nov 2012 onward.

10 best practice suggestions for common smartphone threats

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Guide to Evaluating Multi-Factor Authentication Solutions

Two-Factor Authentication

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

STRONGER AUTHENTICATION for CA SiteMinder

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

ViSolve Open Source Solutions

Modern two-factor authentication: Easy. Affordable. Secure.

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

Why SMS for 2FA? MessageMedia Industry Intelligence

Securing your Juniper SSL VPN with two-factor authentication.

New ehealth Computer Account User Information. July 2014

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Self Service Portal and 2FA User Guide

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

Adding Stronger Authentication to your Portal and Cloud Apps

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date Page 1 Public

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

OCBC BANK FIRST TO LAUNCH BIOMETRIC AUTHENTICATION FOR A BUSINESS BANKING MOBILE APP

HOTPin Integration Guide: DirectAccess

VASCO: Compliant Digital Identity Protection for Healthcare

How to reduce the cost and complexity of two factor authentication

Improving Online Security with Strong, Personalized User Authentication

Hard vs. Soft Tokens Making the Right Choice for Security

Remote Access Securing Your Employees Out of the Office

Welcome Guide for MP-1 Token for Microsoft Windows

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

RSA SecurID Two-factor Authentication

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

Defender Token Deployment System Quick Start Guide

The ForeScout Difference

Simple security is better security Or: How complexity became the biggest security threat

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

How To Make A Multi-Tenant Platform Secure And Secure

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

ForeScout MDM Enterprise

External Authentication with Citrix Access Gateway Advanced Edition

Securing Virtual Desktop Infrastructures with Strong Authentication

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Authentication Solutions Buyer's Guide

Executive Summary P 1. ActivIdentity

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

RHBInvest SG User Guide for 2FA

Accessing the Media General SSL VPN

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy

ESET Secure Authentication Java SDK

The Essentials of Enterprise Password Management. FastPass Password Manager V 3.4 Enterprise & Service Provider Editions

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Your Setup Guide to Consumer Online Banking What s Inside:

PCI DSS Overview and Solutions. Anwar McEntee

Ultra-strong authentication to protect network access and assets

Proven. Trusted.

Mobile Device Management for CFAES

Ultra-strong authentication to protect network access and assets

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

PortWise Access Management Suite

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

Ultra-strong authentication to protect network access and assets

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

Entrust IdentityGuard

Your Setup Guide to Consumer Internet Banking What s Inside:

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Top 5 Reasons to Choose User-Friendly Strong Authentication

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

PortWise Access Management Suite

Identity in the Cloud

GE Energy. User s Guide. Bently Nevada Technical Support Portal

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Cisco Mobile Collaboration Management Service

The Convergence of IT Security and Physical Access Control

Transcription:

ACCESS MANAGEMENT UTILITY SERVICE via SECOND FACTOR AUTHENTICATION (2FA)

Things You Should Know About Cyber Crime 1 Industry Cyber crimes are headlining everyday and everywhere. 2 Cyber hackers do not discriminate who they hack. Small Large Accommodation 115 34 Administrative 8 7 Education 2 10 Entertainment 8 1 Finance 43 189 Healthcare 6 1 Information 16 27 Management 1 3 Manufacturing 7 33 Retail 36 11 Professional 26 10 Source: Verizon Enterprise Solutions, 2013

3 4 Cyber bugs evolve exponentially. 1990: 1,300 Malware 2010: > 200 mil Malware Hackers are not just after your money. 5 We only got ourselves to blame. 80% of IT professionals surveyed agreed that the carelessness of end users is the biggest threat to organizational security, even more so than malware infections.* *ITIC/KnowBe4 Security Deployment Trends Survey 2013

Password is NOT 6 enough Unless your password is CrtUlh46ag95BBnjs, that might just slow hackers down. Truth is, we are ALL lax in our almost-neverchanging-easy-toremember-password practice. You never need to remember One-Time password. Its validity is time limited. It is easily called on at a click of a button.

7 Cyber security tools need NOT be expensive nor complicated to implement or use! Total Costs of Ownership One-time costs Recurring service costs Authentication software license fees for perpetual licenses Deployment costs, Upfront costs for 2FA devices (such as tokens or mobile phone applications) Up to US$423,875* Annual software maintenance fees On-going administration costs Help desk personnel Token renewal costs Distribution costs Telco SMS charges Compliance audit and upgrades Up to US$118,438* *Symantec Two-Factor Authentication: A Total Cost of Ownership Viewpoint 2013 VS Assurity provides the authentication servers and tokens. No more worries about audits, upgrades and down time. Assurity mitigates high cost and complex implementation concerns. Assurity operates under world-class standards and complies to compulsory NATIONAL standards and regulations like MAS TRM.

Who is Assurity Trusted Solutions? The National Authentication Framework (NAF) is part of the in2015 Masterplan, a blueprint by the Infocomm Development Authority of Singapore (IDA) to navigate Singapore s transition into a secured intelligent global nation. The NAF was developed to ensure greater security to the nation s IT infrastructure by providing convenient and cost-effective authentication utilities for businesses to leverage on. Assurity Trusted Solutions, wholly owned by IDA, provides a holistic solution to your IT security concerns without busting your budget.

Accessing Authentication from a Utility Network Subscribing Authentication Utility for Cost Effectiveness and Greater Convenience to your Business, Employees and Customers

Access Management Security Setup Menu Assurity reduces the complexities of implementation by offering 3 quick, easy steps. Simply choose one or more OneKey OTP products, a gateway and network connectivity to NAF.

World-Class Standards to Deliver Secure Authentication Complies to government ICT compulsory standards and regulations like Monetary Authority of Singapore TRM (2013), IM8, SS540, TIA942, FIPS, ISO/IEC 27001:2005 99.999% authentication service availability One device for access to multiple SPs 24/7 customer care service for public users

Over 600,000 OneKey Registrants - Used across industries

Innovating Access Management Security: Multiple Services with only ONE token Greater convenience at a click of a button.

Innovating Access Management Security 1 PLUS FA NTUC Members to Use One-Time Password for Portal Log-In

Innovating Access Management Security VPN As more companies practice BYOD, hot desking, working from remote sites, there is a greater need to AUTHENTICATE log-ins. Intranet Internet Pre-setting for gateway: API configuration for RADIUS,.NET, Java, LDAP Pre-setting for gateway: API configuration for RADIUS,.NET, Java, LDAP

Innovating Access Management Security Hosted Gateway For greater usage efficiency and cost savings, companies with small group of users can now opt for Assurity s HOSTED GATEWAY. Pre-setting for gateway: API configuration for RADIUS,.NET, Java, LDAP Intranet Internet Pre-setting for gateway: API configuration for RADIUS,.NET, Java, LDAP

Innovating Access Management Security Robust Token Assurity provides 2FA services via the OneKey Pad hardware token 1. OTP 2. Challenge Response 3. Transaction Signing.

Innovating Access Management Security Soft Token (iphone & Android) Creating greater convenience without the compromise of security

Innovating Access Management Security SMS OTP OneKey SMS OTP delivered via SMS for convenience to users

Innovating Access Management Security Everyone from everywhere can apply Non-Singaporeans may apply

Customer Care Center Assurity provides 24/7 tele-customer care service. OneKey users may also visit Assurity s Customer Care Center at International Plaza from Monday to Saturday. OneKey users can also manage their own tokens at http://www.onekey.sg/your-onekey/how-to-use.html Assurity s customer care officers are able to assist OneKey users to reset userid and passwords Replace tokens Answer queries on registration, activation, linking and use of OneKey

Public Call for Second Factor Authentication Business Times, 20 Sep 2013 AsiaOne, 19 Sep 2013 ZDNet Asia, 18 Sep 2013

Public Awareness of 2FA and OneKey Computerworld Singapore, 18 Sep 2013

Thank you For enquiries, please contact Jason Kong / Business Development Director Assurity Trusted Solutions, a wholly owned subsidiary of IDA jason@assurity.sg jason_kong@ida.gov.sg