An Introduction to RSA Authentication Manager Express. Helmut Wahrmann helmut.wahrmann@rsa.com



Similar documents
Risk Based Authentication and AM 8. What you need to know!

RSA SecurID Two-factor Authentication

Hosting topology SMS PASSCODE 2015

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Guide to Evaluating Multi-Factor Authentication Solutions

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

A brief on Two-Factor Authentication

RSA Authentication Manager 8.1 Planning Guide. Revision 1

BlackShield ID Best Practice

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Using Entrust certificates with VPN

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets

Authentication Solutions

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, Product Information Partner Name

ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE

STRONGER AUTHENTICATION for CA SiteMinder

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

ProtectID. for Financial Services

RSA SecurID Ready Implementation Guide

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Adaptive User Authentication

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

ADAPTIVE USER AUTHENTICATION

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

ADDING STRONGER AUTHENTICATION for VPN Access Control

2 factor + 2. Authentication. way

RSA Authentication Manager 8.1 Administrator s Guide

How To Choose An Authentication Solution From The Rsa Decision Tree

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

nexus Hybrid Access Gateway

Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Moving Beyond User Names & Passwords

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

SMSEagle with SMS PASSCODE 8.0 SMS PASSCODE 2015

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA Authentication Manager 8.1 Administrator s Guide. Revision 1

Citrix Access Gateway

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Strong Authentication for Secure VPN Access

SafeWord 2008 Customer Release Notes

VMware Virtual Desktop Manager User Authentication Guide

Symantec Managed PKI Service Deployment Options

Keeping your VPN protected

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

Moving Beyond User Names & Passwords Okta Inc. info@okta.com

CRYPTOCard. Strong Two Factor Authentication

Contextual Authentication: A Multi-factor Approach

Two-factor Authentication: A Tokenless Approach

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

FortiAuthenticator. User Authentication and Identity Management. Last Updated: 17 th April Copyright Fortinet Inc. All rights reserved.

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Proven. Trusted.

DIGIPASS Authentication for Check Point Security Gateways

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

1. Accessing the LONZA network from a private PC or Internet Café

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

RSA Authentication Manager 6.1 to 8.1 Migration Guide. Revision 1

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Best Practices for Secure Remote Access. Aventail Technical White Paper

Managed Services PKI 60-day Trial Quick Start Guide

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

Abridged. for Security Domain Administrators. IT Services Iowa State University. Jan 2015

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Enhanced Single Factor, 2 Factor & Multi-Factor Authentication Solutions

Authentication Strategy: Balancing Security and Convenience

Ultra-strong authentication to protect network access and assets

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

Two-Factor Authentication Evaluation Guide

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

Transcription:

An Introduction to RSA Authentication Manager Express Helmut Wahrmann helmut.wahrmann@rsa.com

Authentication Landscape Agenda Solution Details Business Value Opportunity DEMO

Authentication Market by the Numbers 124 45 123456 Millions of SSL VPN users in 2012 1 Percent of companies still using passwords for remote access authentication 2 Most commonly used password 3 1 Gartner Specialized SSL VPN Equipment, 2008 2 Forrester Enterprise And SMB Security Survey, North America And Europe, Q3 2008 3 http://igigi.baywords.com/rockyou-com-passwords-list/

Threats and Demands are Increasing External attacks Careless users writing down passwords Costly audit requirements/ Increasing regulations Requirements for more collaborative tools Ever-changing business requirements

Fraudsters See An Opportunity Assumption of less sophisticated IT Security IT Budget Traditionally, SMB has less adoption of strong authentication Small and Mid- Sized Organizations are at risk Organization Size

IT Staff Feels the Pressure The Environment End User Productivity Constantly changing threat landscape Security is considered a burden Supporting multiple groups of users and initiatives Users cannot experience downtime Budget and headcount are always a consideration Management Has Demands The push for mobility and collaborative tools means potentially exposing identities and Intellectual Property (IP) outside of the organization 6

What We ve Heard Secure Access for Mobility and Collaboration Before Scenario Lack of confidence about who is remotely accessing information Users struggle with cumbersome security mechanisms Diverse end-user base results in varying requirements Security Solutions are Complex and Expensive Meeting and proving compliance is complex and time consuming Required Capabilities Proven authentication technology Convenient and user-friendly solution Choice of authentication methods on a single platform Easy to deploy and manage solution that integrates seamlessly Fast to implement solution that can be proven to meet compliance requirements Cost-effective strong authentication that is stronger than a password, but easy to use for IT staff and end-users SOLUTION

Authentication Landscape Agenda Solution Details Business Value Opportunity DEMO

AMX: Multi-factor authentication with zero footprint Risk-Based Authentication On-Demand Authentication And Easy to Manage Appliance Platform

SMS Included in Solution Delivers a One-Time Password (OTP) via SMS or email Based on the RSA SecurID algorithm Compatible with any mobile phone from any carrier No software to deploy or tokens to manage Provides multi-factor authentication: Factor #1 PIN Factor #2 Mobile device or e-mail account

SMS supported options Clickatell Plug-In HTTP Plug-In HTTP HTTPS XML over HTTP supports proxy (plain and authenticated) Certified gateways: https://gallery.emc.com/tags?tags=rsa_sms_services&taggabletypes =DOCUMENT, currently (April 2011): physical solutions w/possibility to connect GSM modem: MultiModem isms, Talariax sendquick Alert Plus, LogixMobile swiftsms services: KPN SMS Gateway, Syniverse Mobile Enterprise Services

The RSA Risk Engine Proven, sophisticated risk engine Protecting 350 million identities worldwide Most common use Online Banking Uses dozens of characteristics to calculate the assurance level of user authentication Self learning so it adapts to your users over time

Risk Based Authentication The Hidden Intelligence Behind RSA Authentication Manager Express Optimized for the enterprise organization

Risk-Based Authentication Multi-factor authentication without deploying tokens 2 3 1 Strengthens traditional password authentication by silently applying risk-based analytics Is the user authenticating from a known device? Does the user s behavior match known characteristics? 4 Risky authentication attempts require additional validation Security Questions On-Demand Authentication 1 2 3 4 1 st Factor: Something you KNOW 2 nd Factor: Something you HAVE 3 rd Factor: Something you DO Step-Up : Something you KNOW or HAVE

Example End-user Scenario Before Access SSL VPN webpage Enter Username and Password Access is granted RISK: User could be fraudulent, using a stolen password

Example End-user Scenario After Typical behavior from registered machine Authentication Successful OR Access SSL VPN page Redirected to the Secure Logon page Enter Username and Password Unusual behavior from unregistered machine On-demand Authentication or Security Questions Authentication Successful Authentication characteristics are sent to the risk engine for score calculation Typical behavior user is authenticated OR Challenge presented, successful completion of challenge results in authentication complete

RSA Authentication Manager Express Details Scalability: Up to 2,500 users Integrations: SSL VPNs Outlook Web Access Web portals Citrix thin clients Platform: Appliance with Linux operating system Replication: 2 nd Appliance provides replication Authentication Methods: Risk-based Authentication SMS

AMX Integration: Which Products Does AMX Support? A third-party product already supports RBA if either of the following is true: It is a certified RSA Secured solution for Authentication Manager Express Examples: Juniper SA, Cisco ASA, Checkpoint NGX, Citrix Access Gateway, Citrix XenApp, etc. See rsasecured.com for an up-to-date list of supported applications It is compatible with the RSA Authentication Agent for Web for SecurID Web applications built on IIS or Apache web servers Examples: Outlook Web Access, SharePoint, etc. A third-party product should be compatible with RBA if all of the following are true: It is a certified RSA Secured solution for SecurID Integration uses the native SecurID APIs (RADIUS implementations are NOT supported) The user interface is entirely browser-based and does NOT require any installed client components Note: AMX supports On-Demand Authentication for any product that already offers ODA for Authentication Manager 7.1 (except RADIUS).

AMX Integration: How do I get RBA support added to a compatible third-party product? 1. Visit rsasecured.com to see if a certified solution already exists 2. Verify that the product is compatible with RBA (see previous slide) 3. Contact Partner Engineering to request support for this product Qualification will be prioritized based on customer demand, available resources, and willingness of the prospective partner to collaborate 4. Develop a custom RBA integration Integration template and validation tool available on AMX supplemental DVD and on SecurCare Online XML-based template does not require advanced programming skills and is intended to be consumable by customers and partners without PS development

Authentication Landscape Agenda Solution Details Business Value Opportunity DEMO

Use Cases SSL VPN Remote employees connecting to the network over an SSL VPN Web Portal Citrix Partners accessing a Microsoft IIS web portal that provides access an deal registration site Vendors utilizing an order management system presented over Citrix XenApp Employee Partner Vendor 21

RSA Authentication Manager Express Strengthens Critical Infrastructure Accelerates Time to Value Keeps Users Productive Ensures Compliance Goes beyond password-only to deliver true multi-factor authentication Seamlessly deploy to SSL VPN, web portals and Citrix thin clients Minimal changes to IT environment No changes to password policy! Reduces deployment time and costs Integrates with leading vendors Nothing to deploy to users Users keep existing username/password Choice of different authentication methods Silent enrollment Invisible security Gives high level of assurance to every user authentication Verify and report that each user and application is protected to pass an audit

RSA Authentication: Three Platforms Target Market Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users Enterprise- Consumer Applications More than 10,000 users Use Case Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructure Users: Employees, partners, customers Protection of web applications Users: typically customers or clients Value Proposition Convenient for endusers and IT staff Lower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization

Target market is adjacent to existing AM and Adaptive Authentication markets Use Case Customer Profile Mid-Market < 2,500 users (employees/partners) Large Enterprise 2500+ users (employees/partners) Consumer 100,000+ users (B2C portals) Web-based applications (RBA/ODA only) AMX RSA Adaptive Authentication* (Hosted or On-Premise) Web-based applications (SecurID HW/SW tokens) RSA Authentication Manager Non-web based (SecurID HW/SW tokens) RSA Authentication Manager * In a future release, Authentication Manager w/rba will be positioned as the On-Premise solution for all Enterprise use cases

Differentiating AMX from RSA Authentication Manager S I Z I N G P R O D U C T RSA Authentication Manager Express 1.0 RSA Authentication Manager 7.1 License size Up to 2,500 registered users No limit to number of registered users on software; 50k on RSA SecurID Appliance Market Targeted at mid-sized organizations with between 50 and 1,500 users Targeted at mid-to-large sized enterprise and consumer opportunities Target customers Healthcare, retail, technology Financial, healthcare, retail, technology, telecom Platform RSA Authentication Appliance (1U hardware appliance) Software: Widows, Linux, Solaris, VMware RSA Authentication Appliance: 130 or 250 Replicas 1 replica supported Up to 15 on software; up to 5 on RSA SecurID Appliance RADIUS Not available in AMX 1.0 Full RADIUS client included Native LDAP Microsoft AD 2003/2008 Microsoft AD 2003/2008 Sun Java Directory Server F E A T U R E S Authentication methods Applications Risk based On-demand (SMS or email) SSL VPNs Web-based applications Web-based thin-clients (Citrix) More Hardware tokens Software tokens On-demand (SMS or email) VPNs (SSL and IPSec) Web-based applications Citrix MS Windows Logon Wireless

Licensing, Configuration and Pricing Platform: Version 1.0 is offered on a Hardware Appliance only (same h/w as the SecurID Appliance 130) Licensing: Single SKU perpetual licensing per user includes software and all authentication features Pricing: Volume based pricing tiers (similar to RSA Authentication Manager) Appliance bundles are available Maintenance: Annual software maintenance is 21% of license fee 3-year AHR is included with the h/w appliance Years 4 and 5 optional and additional Configuration: Supports up to 1 replica Can be deployed in multiple ways for different user bases: RBA + ODA or Security Questions step-up On-demand Authentication only

AMX List Price Product List Price AMX0000025 AMX per User qty btw 10-25 $92.00 AMX0000100 AMX per User qty btw 30-100 $85.00 AMX0000150 AMX per User qty btw 105-150 $78.00 AMX0000250 AMX per User qty btw 155-250 $73.00 AMX0000500 AMX per User qty btw 255-500 $64.00 AMX0000750 AMX per User qty btw 505-750 $58.00 AMX0001500 AMX per User qty btw 755-1500 $51.00 AMX0002500 AMX per User qty btw 1505-2500 $44.00 Product List Price AMX-0010500 AMX Appl130 H/W (incl. Adv H/W Repl Yrs1-3) $3 594,00 Product PARTNERS, Not for resale! List Price AMXAPP-NFR-KIT-130 AMX Demo Kit for 25 users $2 000,00

Authentication Landscape Agenda Solution Details Business Value Opportunity DEMO

What Makes Us Better Key Unique Differentiators Self-Learning Risk Engine Dozens of risk indicators Proven: 250 million users protected with RSA risk-engine Tell me about how your current authentication solution adapts based on the authentication attempt? Risk-based authentication and ODA (SMS) on a plug-and-play appliance platform Unique combination of a risk-engine with On-demand and Security Questions simplified for mid-market organizations Fastest path to two-factor authentication Convenient to install, manage and deploy to users Seamless migration from passwords to strong authentication Describe to me how your current IT staff could manage an alternative technology?

Non-Unique Comparative Differentiators Out-of-the-box integration with 3rd party devices Juniper, Citrix, Cisco and CheckPoint SSL VPNs Reduces deployment costs and resources Tell me about what would happen if a security solution did not integrate into your existing environment or a system in the future? Low acquisition and operating costs (TCO) Single-SKU perpetual license is reasonably priced when compared to competitive offerings Tell me about how you would make the decision between a less secure solution and AMX at comparable price points?

Non-Unique Comparative Differentiators Works anytime, anywhere Strong authentication from any device, anywhere, anytime with nothing to carry, manage, or install Accessibility drives productivity, user compliance and collaboration What would happen if senior executives could not access corporate resources because the authentication solution didn t work?

Our Weaknesses Acquisition cost is higher than single-point solutions Express is more expensive than SMS-only competitors (Ex. SMS Passcode, SecurEnvoy, Etc.) Customers looking for the cheapest option may choose point-solution vendor Tell me about why you want to sacrifice security, reliability and convenience just to save a little money?

Key Point #1 Drive Incremental Authentication Revenue w/amx

Target Market Customer profile: Mid-market company (< 2,500 employees) currently using passwords for authentication Has not adopted strong authentication because existing market options were too expensive or inconvenient for the use case Strong authentication use cases: Employees accessing an SSL VPN and/or OWA without the use of tokens Partners and customers accessing collaborative portals Employee access to Citrix XenApp virtual desktops Customer requirements Lower TCO than hardware and software One Time Password Authenticators Footprint-less solution for employees, partners or customers Protection of web-based solutions only

Customer Challenges Related Before Scenarios that Compel Action Purchase or deployment an SSL VPN in need of authentication Development of a new business plan to launch an online portal for partners, customers or employees Emergence of new or renewed government/industry regulations Awareness of emerging threats Incidents of breach, loss, or fraud Appearance of a new security officer/executive

Authentication Landscape Agenda Solution Details Business Value Opportunity DEMO

Demo Environment

Setup user for OnDemand Authentication

Scenario 1: Pure OnDemand Authentication (no RBA)

On-Demand Flow How it works in AM 7.1 SP3+ and AMX 1.0 3 3 1 2 SMS Secure HTTPS 4 Internet 5 5 Primary Instance 1 User types in their Username and PIN. Note: many agents will still say passcode. Users need to be educated on this if using On-Demand authenticators 2 The username and PIN are sent to authentication manager SMS Gateway Provider 3 The server sends a Next token code API call to the agent and the user is presented with the Next Token Code dialog. Users need to be educated on this functionality 4 Authentication Manager generates a next token code and sends this via SMS (or email) to the end user SMS Telecom Network 5 User enters the SMS (or email) OTP as Next Tokencode and logs in

On Demand Authentication Step 1: Enter username and PIN Note: User needs to enter his PIN in Password field Actual password is never used This is the behavior seen in Authentication Manager 7.1 SP3 and above

On Demand Authentication Step 2: AMX asks for Next Tokencode

On Demand Authentication Step 3: OnDemand Tokencode is sent User gets OnDemand Tokencode via SMS or email Then he enters the received tokencode as Next Tokencode and logs in.

Scenario 2: Risk Based Authentication with ODA as step-up authentication method

Risk Based Authentication Step 1: Login When using RBA, login page is redirected to AMX, but......the username and password are still in use!

Risk Based Authentication Step 2: User is not trusted step-up authentication

Risk Based Authentication Step 3: Remembering device (optional) Identity was confirmed by step-up authentication (here: ODA) User s device can be stored as known device, so the next time user logs in from the same device, the assurance level will be higher This question is optional policy can be set to remember all recent devices transparent to user

Risk Based Authentication Step-Up Authentication in the logs During the 1st login user s device was unknown This resulted in Assurance Level VERY LOW, which triggered the policy to do additional authentication User authenticated successfully using OnDemand, so his identity was confirmed

Risk Based Authentication 2nd time login - Known User Behaviour and Device Statistics User logs in from the same computer, using username and password again. This time his computer and behaviour match the information stored by Risk Engine AMX accepts user s login without requiring additional confirmation RBA is fully transparent to the user