Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant Sam.linford@entrust.



Similar documents
Entrust IdentityGuard

Using Entrust certificates with VPN

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

ADDING STRONGER AUTHENTICATION for VPN Access Control

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014

Entrust IdentityGuard Comprehensive

Strong Authentication for Secure VPN Access

STRONGER AUTHENTICATION for CA SiteMinder

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

2 factor + 2. Authentication. way

These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.

VPN Solutions FAQ North America International Germany Benelux France Spain Israel Asia Pacific Japan

Facebook s Security Philosophy, and how Duo helps.

Self-Service Portal Registering, downloading & activating a soft token

Cisco ASA Authentication QUICKStart Guide

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Welcome Guide for MP-1 Token for Microsoft Windows

RSA SecurID Two-factor Authentication

Strong Authentication. Securing Identities and Enabling Business

Soft tokens for SMS PASSCODE SMS PASSCODE 2014

ProtectID. for Financial Services

The Ultimate Authentication Technology

Deriving a Trusted Mobile Identity from an Existing Credential

etoken TMS (Token Management System) Frequently Asked Questions

etoken Single Sign-On 3.0

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

ADAPTIVE USER AUTHENTICATION

MCBDirect Corporate Logging on using a Soft Token

Advanced Solutions for Critical Infrastructure Protection

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

NetIQ Advanced Authentication Framework

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

HOTPin Integration Guide: DirectAccess

Adding Stronger Authentication to your Portal and Cloud Apps

Strong Authentication for Cisco ASA 5500 Series

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

SMSEagle with SMS PASSCODE 8.0 SMS PASSCODE 2015

Strong Authentication for Microsoft TS Web / RD Web

Defending the Internet of Things

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Managed Services PKI 60-day Trial Quick Start Guide

ViSolve Open Source Solutions

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

Strong Authentication for Juniper Networks

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Entrust. Entrust IdentityGuard 8.1. Deployment Guide. Document issue: 2.0. Date of Issue: April 2007

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

Juniper SSL VPN Authentication QUICKStart Guide

Secure Authentication Managed Service Portfolio

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication

Longmai Mobile PKI Solution

BlackShield ID MP Token Guide. for Java Enabled Phones

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Contextual Authentication: A Multi-factor Approach

Microsoft Enterprise Mobility Suite

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

SafeNet Authentication Client (Windows)

Strong Authentication for Microsoft SharePoint

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Guide to Evaluating Multi-Factor Authentication Solutions

White Paper. The risks of authenticating with digital certificates exposed

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Two-factor Authentication: A Tokenless Approach

Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

IQS Identity and Access Management

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

SOLUTION BRIEF CA ADVANCED AUTHENTICATION. How can I provide effective authentication for employees in a convenient and cost-effective manner?

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

Hosting topology SMS PASSCODE 2015

Securing your Juniper SSL VPN with two-factor authentication.

CRYPTOCard. Strong Two Factor Authentication

Two-Factor Authentication

How CA Arcot Solutions Protect Against Internet Threats

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Remote Vendor Monitoring

TMS 5.1 OTP Planning Guide. Version 2

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

BlackShield Authentication Service

Strong Identity Authentication for First Responders

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

BlackShield ID Agent for Remote Web Workplace

Comodo Authentication Solutions Overview

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

DIGIPASS Authentication for GajShield GS Series

Securing What s at Risk: A Common Sense Approach to Protecting Users Online

Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Mobile Phone SMS version

Agent Configuration Guide

Addressing Online ecrime Layered security for addressing fraud today and adapting to tomorrow

Transcription:

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments Sam Linford Senior Technical Consultant Sam.linford@entrust.com

Entrust is a World Leader in Identity Management and Security Software Best-in-class technology, service and support industry pioneer Over 2000 customers in 50 countries global reach Geographic presence: U.S., Canada, UK, China, Germany, India and Japan 411 employees and 110+ patents 2008 Revenue: ~$100.0 million Copyright Entrust, Inc. 2009 2

Securing Digital Identities and Information Slovenia epassport Fraud Detection & Risk Based Authentication Platform Public Key Platform Copyright Entrust, Inc. 2009 3

The need for stronger enterprise authentication Globalization and growing mobile workforce Unmanaged devices and locations De-perimeterization of networks Growing compliance regulations Mobile Workers Mobile Devices Enterprise Partners Email Applications Files Copyright Entrust, Inc. 2009 4

Factors to consider in deploying 2 nd Factor Risk Sensitivity of resources Cost of breach Usability User expertise Solution flexibility Cost Initial cost Ongoing maintenance Future changes Copyright Entrust, Inc. 2009 5

Entrust IdentityGuard Single open platform, centralized policy management User self administration Deploy based on Risk, Usability, Cost Machine/ Device Auth Mobile Knowledge- Based Grid Scratch Pad Digital Certificates OTP Tokens IP-Geolocation Username & Password Versatile Authentication Platform Smartcards & USB Tokens Mutual Auth Copyright Entrust, Inc. 2009

IP Geolocation Authentication based on users physical location Register common access points & record logon profiles Leverage IP black/white lists & OFIN data Copyright Entrust, Inc. 2009

Machine Authentication IP: 216.191.253.108 Browser: IE 7.0 Screen Depth: 1024. Captures machine parameters No user interaction With or without cookies Copyright Entrust, Inc. 2009

Digital Certificates X.509 certificate support Existing certificates or leverage Entrust Managed Service Offering Standard SSL client or application-based signaturebased authentication Stored in software, on smart cards, or USB tokens Copyright Entrust, Inc. 2009

Mobile Authentication & Transaction Notification Multiple Identities, one device Mix of Soft token only and Transaction Notification Independent activation and control Customizable branding per identity Copyright Entrust, Inc. 2009 10

IDG Mobile Soft Token OATH compliant Time-based soft token 30 second time window Brandable interface Copyright Entrust, Inc. 2009 11

IDG Mobile - with Transaction Notification OATH Time-based Soft Token Transaction details confirmed out of band on mobile device No data entry OATH signature of transaction contents User confirms transaction or acts on suspect details Copyright Entrust, Inc. 2009 12

Soft Token Mobile Authentication Single or multiple one-time passcodes to mobile device SMS, email, voice Authenticate while out of cell range Out-of-band transaction detail confirmation and authentication OTP Automatic refresh of OTPs Copyright Entrust, Inc. 2009

Knowledge Authentication Configurable number of questions User defined or imported Define number of correct answers Randomly presented Copyright Entrust, Inc. 2009 14

Grid Authentication Each grid card unique C 2 3 Inexpensive to produce and deploy Innovative egrid in graphic or PDF format Easy to use and support Copyright Entrust, Inc. 2009

Mini Tokens Mini OT Time-Synchronous OATH Compliant Mini AT Time & Event-Synchronous Standards Based Algorithm Copyright Entrust, Inc. 2009

Pocket Tokens Time & Event-Synchronous Pin unlock, Response, Challenge + Response Standards Based Algorithm Copyright Entrust, Inc. 2009

DisplayCard Tokens Credit card format OATH based OTP generation Multi-functional card including optional onboard chip (PKI and/or EMV chip) Copyright Entrust, Inc. 2009 18

Mutual Authentication Image & Message Replay Serial Number Replay End user validation of site Personalized for user Increased user confidence Extended Validation Certificates Copyright Entrust, Inc. 2009 19

Application: Remote Access Remote Access Applications End User Integrates with leading remote access solutions Leverages industry standards to streamline deployment Supports MS RAS, IP-SEC, & 802.1x clients Copyright Entrust, Inc. 2009 20

Application: Enterprise Desktops & Servers Any user **** Administrators Enterprise Servers 1 6 3 End User Microsoft Windows Desktops Integrated 2 nd factor authentication Easy to use & deploy Leverages common security infrastructure Copyright Entrust, Inc. 2009 21

Application: Extranet Access Range of authenticators Inexpensive to deploy Easy to use and support End User Web Authentication Applications Copyright Entrust, Inc. 2009 22

Integrating IdentityGuard Remote Access Applications Enterprise Applications & Data End User Microsoft Windows Servers Repository Web Authentication Applications Copyright Entrust, Inc. 2009 23

Policy & User Management Web based Administration Copyright Entrust, Inc. 2009 24

Reporting Web based reporting User and authentication tracking and analysis Copyright Entrust, Inc. 2009 25

Self-Service Server User self administration of Entrust IdentityGuard accounts User self-enrollment, assignment, activation, change and reset of authenticators Authentication credential or personal information modification Account status information Customizable web-based user interface Anytime, anywhere access New User New User Existing User Self Service Server Copyright Entrust, Inc. 2009

Self-Service Server Administrator control of options and permissions Web front end to existing IdentityGuard implementation No replication of data required Benefits Reduces help desk and administrator costs and effort Improves usability and acceptance by customers of strong authentication New User New User Existing User Self Service Server Copyright Entrust, Inc. 2009

Self-Service Server Manage authenticators and account information in a single, customizable interface. Copyright Entrust, Inc. 2009

Self-Service Server Facilitate entering or changing of specific required information for authentication Copyright Entrust, Inc. 2009

Self-Service Server Send or save an electronic grid Copyright Entrust, Inc. 2009

Industry Recognition SC Magazine Recommended in Authentication Group Test, Feb. 2009 Gartner Leader Gartner Magic Quadrant, Feb. 2009 Industry Innovators 2007 SC Magazine, December 2007 Named Leader in Excellence in Security Solution for Credit Unions Information Security Products Guide, June 2006 Copyright Entrust, Inc. 2009 31

Enterprise Authentication Success And many more Copyright Entrust, Inc. 2009 32

Customer Deployment Scenarios U.S. Treasury Department Customer Challenge: Provide secure access for 530,000 plus employees and customers Strong 2 nd factor security Easy to use with minimal training and maintenance Solution: Leveraging grid authentication option Addressing issue of visually impaired with Braille grids Copyright Entrust, Inc. 2009 33

Customer Deployment Scenarios Xerox Challenge: Provide secure remote access for 80,000 plus employees & third-party partners Key Attributes Strong 2nd factor authentication for entire user population (vs. current subset) Replace current high priced tokens with usable, inexpensive alternative Alternative authentication choices Seamless integration with leading VPNs Solution: Juniper SSL and IPSEC VPN solution 2 nd Factor egrid Authentication Xerox was most pleased with the operational flexibility and ease of execution Copyright Entrust, Inc. 2009 34

Entrust IdentityGuard Single Open Platform Centralized Policy Management Deploy based on Risk, Usability, Cost Machine/ Device Auth Mobile Out-of-Band Knowledge- Based Grid Scratch Pad Digital Certificates OTP Tokens IP-Geolocation Username & Password Versatile Authentication Platform Smartcards & USB Tokens Mutual Auth Copyright Entrust, Inc. 2009 35

Thank-You