2003, Rainbow Technologies, Inc.



Similar documents
SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology

SSL VPN Technical Primer

Securing Citrix with SSL VPN Technology

WHITEPAPER. VPN or SSL-VPN. What Remote Access Solution is Right for You. By Don Faulkner, CISSP. w w w. s a f e n e t - i n c.

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

NCSU SSO. Case Study

Novell Access Manager SSL Virtual Private Network

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

SSL VPN: Improving the ROI of Remote Access Secure Authentication and Access to your Critical Resources

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Virtual Private Networks (VPN) Connectivity and Management Policy

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

SSL VPN vs. IPSec VPN

Complying with PCI Data Security

SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN

VPN. Date: 4/15/2004 By: Heena Patel

Deploying iphone and ipad Virtual Private Networks

Remote Vendor Monitoring

Get Success in Passing Your Certification Exam at first attempt!

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

TFS ApplicationControl White Paper

Security. TestOut Modules

Virtual Private Networks

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Clientless SSL VPN Users

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

Security Technology: Firewalls and VPNs

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Connecting an Android to a FortiGate with SSL VPN

SSL VPN Client Installation Guide Version 9

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

WHITEPAPER IPSEC VPN Vs. SSL VPN

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Cisco Virtual Office Express

Ensuring the security of your mobile business intelligence

Simple security is better security Or: How complexity became the biggest security threat

Mobile Access Software Blade

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

VPN_2: Deploying Cisco ASA VPN Solutions

Best Practices for Secure Remote Access. Aventail Technical White Paper

Automatic Hotspot Logon

SSL VPN Technology White Paper

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

Remote Access Security

Understanding VPN Technology Choices

SVN5800 Secure Access Gateway

SharePlus Enterprise: Security White Paper

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

7.1. Remote Access Connection

ORACLE S SIEBEL BUSINESS APPLICATIONS 8.0

Agenda. How to configure

Cornerstones of Security

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

ION Networks. White Paper

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Strong Authentication for Secure VPN Access

VPN Lesson 2: VPN Implementation. Summary

SECURELINK.COM REMOTE SUPPORT NETWORK

Setting Up Scan to SMB on TaskALFA series MFP s.

iphone in Business How-To Setup Guide for Users

Best Practices for Outdoor Wireless Security

Copyright 2013, 3CX Ltd.

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

NETASQ MIGRATING FROM V8 TO V9

DIGIPASS Authentication for SonicWALL SSL-VPN

What s New in Juniper s SSL VPN Version 6.0

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

IT Agility that Drives Business Forward

FileCloud Security FAQ

H.I.P.A.A. Compliance Made Easy Products and Services

Flexible Identity Federation

Technical papers Virtual private networks

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Policy Title: HIPAA Access Control

How To Configure SSL VPN in Cyberoam

CHIS, Inc. Privacy General Guidelines

Next Generation Network Firewall

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Using Entrust certificates with VPN

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

White Paper. BD Assurity Linc Software Security. Overview

Endpoint Security VPN for Mac

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

PRIVACY, SECURITY AND THE VOLLY SERVICE

Comparing Mobile VPN Technologies WHITE PAPER

Transcription:

Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data

NetSwift igate: Hardware Appliances - SSL VPX to Secure Network Access using 2 Factor Authentication

Agenda Overview of SSL VPNs SSL vs. IPSec Evaluation Criteria ROI NetSwift igate Overview Case Studies Forward Looking

SSL VPN Definition SSL Secure Sockets Layer An industry-standard Internet security protocol, embedded in a web browser IPSec is another security protocol, delivered as a software client VPN Virtual Private Network A private network created within a public or shared network Combined, a SSL VPN is created Provides external users, without device modification, a means to securely access internal enterprise resources over the public Internet

SSL VPN Value Proposition Improve enterprise productivity without higher costs Anywhere, any type access Any Internet connectivity methods wireline and wireless Controlled and uncontrolled, managed and unmanaged access environments Low impact on users and IT organizations No new software to install, configure, and maintain on access devices NAT and firewall traversal issues eliminated Non-disruptive to existing private network, security, and directory infrastructure Flexible Easy to set up and manage users No downtime for user deployment

Why this is Important The measurement of competitive advantage continues to change Increasingly, getting the right information, in the right form, to the right people, at the right time is the means to competitive advantage Culturally and operationally, the enterprise is changing Enterprise network borders are being pushed outward Rise in nomadic workers and teleworkers Growing establishment of dynamic business partnerships

Why this is Important Infrastructure is less of a barrier Internet access is becoming as pervasive and as demanded as oxygen By any measurement (# of connections, bandwidth level, quality, type), broadband connectivity is rapidly growing To succeed in this changing environment, however, the right set of secure networking solutions are required

SSL VPN Device Functionality Central gatekeeper Validates user credentials (authentication) Applies granular access policies (authorization) Single proxy between users and applications Accepts authenticated user s requests and presents them to authorized application and file servers Receives server responses and forwards responses back to users Recoding of applications not required, transformation handled in SSL VPN device for HTTP transmission Single point for encryption/decryption Decrypts incoming user requests and encrypts outgoing app. responses

IPSec VPN vs. SSL VPN

IPSEC VPN Configure VPN VPN software internet Partner Computer: Almost impossible to install - Need to get permission from IT Home Computer: Difficult to install no control of hardware or network IPSEC VPN Web Apps Server Applications Server/Data Exchange Lotus Notes Terminal Services PeopleSoft Networked Machines File Server Partner Executive @ home Sales Person traveling Corporate Notebook: Easy to install but still one more piece of software to manage Corporate Network

SSL VPN internet SSL VPN Applications Server/Data Lotus Notes Terminal Services PeopleSoft No No client client software to to install install --Does Does Web not not Apps modify the the operating Server system. Use Use only only a browser File Server Networked Machines Exchange Benefits: No No support calls calls with with troubled implementations or or client client software to to manage Corporate Network Partner Executive @ home Sales Person traveling

IPSEC VPN Doesn t work with NAT internet NATs NATs in in the the corporate network change IPSec IPSec packets and and break break the the IPSEC IPSEC connection IPSEC VPN X Web Apps Server Applications Server/Data X Lotus Notes Terminal Services PeopleSoft X File Server X Exchange Networked Machines Partner Executive @ home Sales Person traveling This This forces forces admins to to place place critical servers directly onto onto the the internet or or not not allow allow access access Corporate Network

SSL VPN internet igate Applications Server/Data Lotus Notes Terminal Services PeopleSoft NAT NAT doesn t interfere with with SSL...it Web Apps always works Server works File Server Home Home Hotel Hotel Exchange Networked Machines Partner Benefits: --No No support calls calls when when the the connection breaks. --Opportunites are are not not lost lost because of of downtime Executive @ home Sales Person traveling Corporate Network

IPSEC VPN X internet IPSEC VPN Force Force partner to to change their their firewall Web Apps Server Applications Server/Data Lotus Notes Terminal Services PeopleSoft File Server Networked Machines Exchange Corporate Network Partner Executive @ home Sales Person traveling

SSL VPN internet igate Web Web ports ports are are open open on on Firewalls Web Apps Server Applications Server/Data Lotus Notes Terminal Services PeopleSoft File Server Benefits: --Roll Roll out out Access to to any any partner --No No modifications needed for for their their firewall --Quick Quick time time to to deploy Exchange Networked Machines Corporate Network Partner Executive @ home Sales Person traveling

IPSEC VPN Bridging Networks Open Open Access to to Resources internet IPSEC VPN Applications Server/Data Lotus Notes Terminal Services PeopleSoft File Server Web Apps Server Networked Machines Exchange Corporate Network Partner Executive @ home Sales Person traveling

SSL VPN internet igate No No Bridging igate igate terminates sessions between it it and and the the client client side side applications Web Apps Server Applications Server/Data Lotus Notes Terminal Services PeopleSoft File Server Networked Machines Exchange Corporate Network Partner Executive @ home Sales Person traveling

ROI SSL remote access is 45 percent less expensive than IPSec solutions and 72 percent cheaper than dialup. The Yankee Group

ROI Category IPSec VPN SSL VPN Initial Investment Medium Medium Deployment Painful Painless Operating Expense Medium Low Level of Security Medium High Corporate Strategic Low High End User Satisfaction Low High

NetSwift igate SSL VPN The Next Generation of Secure Remote Access

ikey Overview Strong two-factor User Authentication Insert the ikey into a USB port - gain access from anywhere If stolen, security is not compromised because PIN is unknown Key Benefits Can t be duplicated.. Can t be written down Portable - small enough to fit on a key chain Easily revoked..remove user from database Easier to use than passwords

Authentication Options Manage access control by user types application access AND/OR AND/OR Support diverse range of users Tailor level of security to your policies ikey eliminates Password hacking ikey extends security from application to the user Removing the ikey closes the session

VPX - Central Application Access Browser Any protocol can be securely sent via SSL through NetSwift igate Web Application Servers Client Server Applications SSL internet NetSwift igate igate Client Mail Server v Terminal Services/ Citrix

Benefits of VPX Support Single solution for all remote access Secure any application over SSL/port 443 Protect non-web based applications the same way as web based applications All data is continuously authorized and encrypted by igate for transport over SSL Client side applet manages decryption and port and host file mapping changes

Portal and Direct Access Resources Access resources directly or through Portal igate supports both types - simultaneously Portal Page Benefits Ease of Use / Management Users need to only remember one URL One SSL Certificate to buy and manage Host only a single IP address Customized by Company

Portal and Direct Access Resources Portal Page Benefits Security of One external secure access site and one IP address Users can t access sites directly - required to go through portal Encrypts and obscures links in real time Only applications that users have access to are shown on the portal page

Do More With NetSwift igate SSL VPN Central Resource Management Fine Grain Control Clientless Security SSL Encryption NetSwift igate Secure Any Application Portal Management Hardware based SSL Encryption HTTP Compression Role / Group Management Advanced Auditing Integrated Strong Authentication Auto Log-Off

Executive Information Portal Requirements Anywhere Access for Board Members Secure Access Control Ensure passwords aren t shared or written down Comply with Audit compliance standards Easy to use Solution: igate SSL VPN Allows users to use only a browser to access data No integration or complicated VPN set up USB Token with URL preconfigured Meets compliance standards

Healthcare Remote Access Requirements Doctors need to access patient records and images from any location Secure Web based PACS system Comply with privacy legislation (PIPEDA, HIPAA) Easy to deploy and use Central system for web and legacy applications Solution: igate SSL VPN Secure access with just a browser Integrated ikey authentication offers secure access ikeys are easier than complicated passwords Works with leading PACS systems and Billing Systems

Partner Access Requirements Roll out access to partners for CRM system Use same system for employees as well Enable partner access more efficiently Enforce Strict Access Rights Solution: igate SSL VPN Deploys without control of the desktop No training needed Fine Grain Access Control Ensure Actions can be tracked - Audit

Trends / Forward Looking SSL VPNs will dominate remote Access as apps move to the Web Users will increase demands for SSO IT & Security need to deliver Certificate based authentication will increase Token adoption will grow as security & ease of use are balanced Encrypted tunnels will be extended to the desktop SSL VPNs will be tightly integrated with leading Apps

Thank You