PortWise Access Management Suite



Similar documents
PortWise Access Management Suite

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

Secure Remote Access Give users in office remote access anytime, anywhere

nexus Hybrid Access Gateway

PortWise 4.7. PortWise Sales FAQ. Sales FAQ & Licensing Guide

WatchGuard SSL 2.0 New Features

NCSU SSO. Case Study

ADMINISTRATOR S GUIDE

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Security Overview Enterprise-Class Secure Mobile File Sharing

Controlling Web Access with BMC Web Access Manager WHITE PAPER

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

BlackShield ID Agent for Remote Web Workplace

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

ADDING STRONGER AUTHENTICATION for VPN Access Control

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

STRONGER AUTHENTICATION for CA SiteMinder

Understanding Enterprise Cloud Governance

How To Manage A Plethora Of Identities In A Cloud System (Saas)

The Essential Security Checklist. for Enterprise Endpoint Backup

Extranet Access Management Web Access Control for New Business Services

StoneGate Administrator's Guide SSL VPN 1.1

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Entrust IdentityGuard Comprehensive

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

A brief on Two-Factor Authentication

SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Using Entrust certificates with VPN

What s New in Juniper s SSL VPN Version 6.0

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Achieving PCI-Compliance through Cyberoam

Strong Authentication for Microsoft SharePoint

Novell Access Manager SSL Virtual Private Network

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Best Practices for Secure Remote Access. Aventail Technical White Paper

Contextual Authentication: A Multi-factor Approach

Protect Everything: Networks, Applications and Cloud Services

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

FileCloud Security FAQ

Secure remote access to your applications and data. Secure Application Access

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Identity in the Cloud

F5 BIG-IP: Configuring v11 Access Policy Manager APM

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

How To Protect Your Cloud Computing Resources From Attack

RSA SecurID Two-factor Authentication

Strong Authentication for Secure VPN Access

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

CloudPassage Halo Technical Overview

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

PROPALMS TSE 6.0 March 2008

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

White paper. Four Best Practices for Secure Web Access

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

Automate Key Network Compliance Tasks

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

OVERVIEW. DIGIPASS Authentication for Office 365

Symantec Mobile Management 7.1

Centrify Cloud Connector Deployment Guide

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

A Guide to New Features in Propalms OneGate 4.0

Interwise Connect. Working with Reverse Proxy Version 7.x

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

managing SSO with shared credentials

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

Two-Factor Authentication

CloudPassage Halo Technical Overview

Integrating Single Sign-on Across the Cloud By David Strom

How do I secure and manage an out-of-band connection to network devices?

D50323GC20 Oracle Database 11g: Security Release 2

Barracuda SSL VPN Administrator s Guide

ProtectID. for Financial Services

Flexible Identity Federation

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

SAS Agent for Outlook Web App

DIGIPASS Authentication for SonicWALL SSL-VPN

Why MobilityGuard OneGate?

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Client Security Risk Assessment Questionnaire

Transcription:

Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s business processes play a key role in its ability to execute and reach its overall business goals. Many companies realize that they need to increase the efficiency and productivity of their workforce, and in order to do so they need to provide their employees with solutions for more flexible working environments. However, security considerations often prevent a successful deployment of corporate remote access services. For a successful remote access rollout, the following questions need to be addressed: How do we guarantee the user is who he claims to be? How do we know the connecting device is free from Trojans and other malicious software? Is the connection secure? How do we ensure data and application integrity when the network boundary effectively moves beyond the corporate network premises? PortWise Access Management Unlike most remote access solution vendors, PortWise offers a security solution that effectively addresses all of the issues mentioned above. PortWise provides a six-step process to ensure secure and convenient remote connections without compromising security. These six steps include: Assessment of end-user devices Authentication of user s identity Authorization to access applications Access through an encrypted connection Audit of user activity Abolishment of user data PortWise Access Manager and Authentication Server is an 1

integrated software suite developed to help organizations make business applications available for remote users in a secure and convenient manner. The product suite includes a comprehensive security feature set. Application Delivery PortWise utilizes clientless SSL VPN technology enabling access to applications by remote users without having to install proprietary client software on the user s device. Furthermore PortWise utilizes web browser technology to access corporate data. Hence, PortWise supports every device or handset with a built-in web browser. Applications are made available to the end-user through a user- friendly web portal interface and every data transaction is secured with industry standard SSL encryption. Three different access modes are available: Web Access provides remote access to web applications through an SSL proxy. The PortWise SSL proxy mechanism is based on an advanced link translation engine to ensure support for all web applications. Port Access provides access to non-web applications that run on specific IP ports. Port-based access is handled through an Internet Demilitarized Zone (DMZ) Corporate Network Portwise Access Manager SSL VPN SSO Access Enforcement Secure remote connections Customer Employees Partners WebPasswords PKI Token OTP via SMS OTP Token Soft Token Authentication & Policy Server Web Forms WinLogon SOAP-Ticket SAML2.0 Groupware Web-Applications Terminal Server WebServices File Access Cloud 2

on-demand SSL VPN client based on Java or ActiveX technology. The PortWise client is transparently installed on the user s device when needed. Network Access provides access to a specific range of IP ports, servers, or networks. End-point Integrity To ensure that malicious software never gets access to the internal network, the integrity of the end-user devices must be checked to guarantee that they meet the security requirements set forth by the organization. Before a user is allowed access, a device scan can be performed to guarantee that the device complies with the corporate security requirements in terms of anti-virus software, personal firewall configurations, and software versions. When the user ends a PortWise session, a cleanup procedure can be performed on the end-point to remove all traces of the session. Integrated Strong Authentication The integrated authentication service in the PortWise Access Management suite provides a framework for multi-factor user authentication that allows deployment of secure and convenient strong user authentication throughout the whole organization. PortWise authentication mechanisms can also be utilized by other access solutions through an API or using standard technologies like RADIUS, SAML, and WS federation. The following authentication mechanisms are available: Mobile Two-Factor Authentication uses a consumer device the user already owns, such as a mobile, PDA, or Blackberry, to generate or receive a unique one-time password. Strong One-Factor Authentication The unique PortWise Web Keypad protects the user and the enterprise from Trojans and spyware. Invisible Token A unique on-demand solution that combines the strength of passwords and tokens. It is secure, convenient, 3

easy to deploy, and most importantly easy to use. External authentication solutions, such as hard tokens, smartcards, and PKI solutions, can be used by PortWise in addition to the built-in authentication mechanisms. Any OATH compliant security token can be imported and used for user authentication in PortWise. The suite also includes a wide array of national eids and it can be extended using both APIs and the plugin-based extension framework. Single Sign-On During a session, users normally interact with multiple cloud applications, back-end systems and data resources, many of which require additional user logins. To create a secure and user-friendly hybrid access environment, PortWise includes Single Sign-On mechanisms to provide transparent login to applications. The user signs in once to the PortWise Authentication Service, and subsequent authentication to cloud and back-end applications is then handled by the system, without any user interaction. To extend the concept of Single Sign-On, PortWise includes functionality for identity federation using SAML and WS federation between separate administrative domains. With identity federation, a single identity can be used to access applications and resources from multiple departments or external business partners, ideal for easy information sharing in a B2B environment, in company merger scenarios, and in large identity federations. Policy Management Integrating all aspects of Identity and Access Management into a single, cohesive and integrated policy delivers significant security, scale and auditing benefits to an organization. Leveraging the different core technologies included in the PortWise platform, a granular access control policy can be created that effectively determines what a user is allowed access to, at any given time. Access policies can be applied on specific applications, IP/port 4

sets and networks and are evaluated using both real-time and static information, such as: User device Grant access based on device type and endpoint integrity Authentication How did the user authenticate? User s role Who is the user, and what is the user s role in the organization? User roles can be defined in PortWise, or provided by an external user directory through PortWise user directory service integration Network Create access rules based on the user s MAC address or IP address Audit & Reporting Whether for corporate governance or regulatory compliance with standards such as ISO1771, Sarbanes-Oxley, or Gramm- Leach-Bliley HIPPA, knowing who did what in the enterprise and which application was accessed from where is imperative. PortWise includes a number of features to help compliance officers, and corporate governance teams. Consolidated and Comprehensive Audit PortWise collects indepth information about any identity or access activity in a central repository for easy access. Find out exactly who did what when, where and how. PortWise is fully compliant with Sarbanes-Oxley, Gramm-Leach-Bliley, HIPAA, Basel II, and 21 CFR Part 11, among many others. Graphical Reporting All information in the PortWise audit logs can be shown in many different graphical formats (pie charts, line charts, 3D charts, bar charts, etc.) in both real-time and over a historical period. For further data mining and asset management, PortWise can export audit data to Excel or Crystal Reports. 5

Audit Policy Management Comprehensive security feature set is included in the Product Suite End-point Security Identity Federation Single Sign-On SSL VPN Strong Authentication Enterprise Administration PortWise provides a central console for the administration of all features included in the PortWise Access Management suite. Real-time alerts can be defined to provide proactive awareness through email and SMS. Support for delegated management allows an organization to create administrator roles with limited privileges to shift administrative rights from one organizational level/department to another. User account management can be partly or completely automated with the PortWise user self-service module to offload the corporate IT administration. With support for multi-domains, an organization can host multiple virtual application portals within one single PortWise system. An organization or service provider can customize the user interface and access policy rule sets for separate user domains and administrate them through a single administration interface. 6