Entrust IdentityGuard



Similar documents
Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

Advanced Solutions for Critical Infrastructure Protection

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Multi-Factor Authentication of Online Transactions

Defending the Internet of Things

Strong Identity Authentication for First Responders

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Strong Authentication for Healthcare

Entrust. Entrust IdentityGuard 8.1. Deployment Guide. Document issue: 2.0. Date of Issue: April 2007

Strong Authentication for Secure VPN Access

Hello, It's Me: Mobile Options for End-User Authentication

Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks

How CA Arcot Solutions Protect Against Internet Threats

How To Comply With Ffiec

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

Beyond Passwords & Outdated Physical Access Systems

Addressing Online ecrime Layered security for addressing fraud today and adapting to tomorrow

RSA Solution Brief. RSA Adaptive Authentication. Balancing Risk, Cost and Convenience

Implementation Guide for protecting

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

how can I provide strong authentication for VPN access in a user convenient and cost effective manner?

A brief on Two-Factor Authentication

STRONGER AUTHENTICATION for CA SiteMinder

ADDING STRONGER AUTHENTICATION for VPN Access Control

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Longmai Mobile PKI Solution

Self-Service Portal Registering, downloading & activating a soft token

Guide to Evaluating Multi-Factor Authentication Solutions

BlackShield ID Agent for Remote Web Workplace

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Token Security or Just Token Security? A Vanson Bourne report for Entrust

Comodo Authentication Solutions Overview

Improving Online Security with Strong, Personalized User Authentication

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Economic and Social Council

How To Protect Yourself From Man In The Middle Attacks

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Securing Virtual Desktop Infrastructures with Strong Authentication

EBA SECUREPAY COMPLIANCE GUIDE entrust.com

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

Two-Factor Authentication and Swivel

Multi-factor authentication

Entrust Smartcard & USB Authentication

How Secure are Contactless Payment Systems?

Strong Authentication. Securing Identities and Enabling Business

Secure your Privacy. jrsys, Inc. All rights reserved.

2 factor + 2. Authentication. way

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Managed Portable Security Devices

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?

Advanced Authentication

Facebook s Security Philosophy, and how Duo helps.

White Paper. The Principles of Tokenless Two-Factor Authentication

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Defender Token Deployment System Quick Start Guide

Two-Factor Solutions Choosing the Right One"

The Benefits of an Industry Standard Platform for Enterprise Sign-On

SOLUTION BRIEF CA ADVANCED AUTHENTICATION. How can I provide effective authentication for employees in a convenient and cost-effective manner?

Welcome Guide for MP-1 Token for Microsoft Windows

HOTPin Integration Guide: DirectAccess

French Justice Portal. Authentication methods and technologies. Page n 1

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Strong Authentication for Microsoft SharePoint

2 FACTOR + 2. Authentication WAY

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Securing What s at Risk: A Common Sense Approach to Protecting Users Online

WHITE PAPER Usher Mobile Identity Platform

Advanced Authentication Methods: Software vs. Hardware

Remote Access Securing Your Employees Out of the Office

User Behaviour Analytics

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Entrust IdentityGuard Comprehensive

Deriving a Trusted Mobile Identity from an Existing Credential

Swivel Multi-factor Authentication

ViSolve Open Source Solutions

Authentication Levels. White Paper April 23, 2014

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

BlackShield ID MP Token Guide. for Java Enabled Phones

Enhancing Web Application Security

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Using Entrust certificates with VPN

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Scalable Authentication

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Secure Data Exchange Solution

Transcription:

+1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's single comprehensive softwarebased authentication platform, bridging you to emerging technologies for online transactions and identity authentication for access to applications or resources. 7630 Commerce Way Eden Prairie, MN 55344 888.437.9783 Toll Free 952.975.0660 Fax www.identisys.com Flexible Security IdentityGuard authenticators allow organizations to apply strong authentication across the enterprise, instead of just for a select group of users. It s a single point of administration, regardless of the authentication option or combination of options deployed. Evolve and change authentication methods over time as risks and the operating environment change. Security Matches Risk Understanding Authentication Do you want authentication to be transparent to the user? Would you like the user to carry a physical device or authenticate online? Do you want the website to authenticate itself to the user as well? How sensitive is the information you are protecting and what is the associated risk? Review the platform s full range of authenticators and discover which may be right for your organization. Integrates with Fraud Detection Serves as a single identity management platform for physical, logical and mobile authentication Proven authenticators as part of the Entrust IdentityGuard software authentication platform Offers widest range of authentication capabilities available on the market today Deploys authenticators based on user requirements, level of risk and cost The software authentication platform allows organizations to match the authentication strength and mechanism to the amount of associated risk in the user s role, usability requirements and cost considerations. The platform also leverages Entrust s proven organizations build a comprehensive authentication strategy based on its unique online requirements, not the limitations of an individual authentication method. Enables advanced protection against man-in-the-browser attacks Authenticators proven in mass market deployments Cost-effective solution that is a fraction of the cost of traditional two-factor options

Transparent Authentication Transparent authenticators validate users without requiring day-to-day involvement. Digital Certificates Entrust IdentityGuard can leverage existing X.509 digital certificates issued from Entrust s managed digital certificate service or a third party to authenticate users. Certificates can be stored locally or on secure devices like smart cards and USB tokens. Organizations without an in-house PKI can obtain certificates via Entrust's hosted PKI services. IP-Geolocation Authenticated users can register locations where they frequently access the corporate network. During subsequent authentications the Entrust IdentityGuard server compares current location data country, region, city, ISP, latitude and longitude to those previously registered. Organizations can step up authentication only when values don t match. With IP-geolocation organizations can create blacklists of regions, countries or IPs based on fraud histories, or leverage the Entrust Open Fraud Intelligence Network (OFIN) to receive updated lists of known fraudulent IPs based on independent professional analysis. Device Authentication Authenticated users can register a computer or device that is frequently used to access the corporate network. A sophisticated encrypted profile of the registered computer is created and stored. During subsequent authentication, the Entrust IdentityGuard server creates a new profile and compares it against the stored value. Step-up authentication is required only when the values don t match. IP-geolocation and machine authentication, deployed in combination, offer an effective and transparent authentication method for users.

Physical Form Factor Authenticators Physical form factors are tangible devices that users carry and use when authenticating. Entrust offers a number of physical authentication devices to meet diverse corporate user requirements. One-Time-Passcode Tokens Entrust offers two versions of the popular one-time-passcode (OTP) token. The Entrust IdentityGuard Mini Token is OATH-compliant and generates a secure eight-digit passcode at the press of a button. The OATH-compliant Pocket Token offers additional features including PIN unlock prior to generating the passcode, in addition to a challenge-response mode. Display Card The Entrust Display Card provides the same functionality as the popular token in a credit card format. In addition to providing an OATH-compliant, one-time passcode, the Display Card includes a magnetic stripe and can optionally include a PKI or EMV chip for greater versatility. Grid Authentication The Entrust-patented grid card is a credit card-sized authenticator consisting of numbers and characters in a row-column format. Upon login, users are presented with a coordinate challenge and must respond with the information in the corresponding cells from the unique grid card they possess. One-Time-Passcode List End-users are provisioned with a list of randomly generated passcodes or transaction numbers (TANs) that are typically printed on a sheet of paper and distributed to end-users. Each passcode is used just once. Biometrics Entrust leverages biometric fingerprint data to provide an effective balance between authentication strength and user convenience for Microsoft Windows logon. To protect user privacy, fingerprint data is stored in a database or on an Entrust smartcard as an encrypted mathematical representation sometimes known as a hash and compared to the actual fingerprint provided at the time of authentication. This stored information cannot be reverse-engineered, ensuring the protection of personally identifiable information (PII).

Non-Physical Form Factor Authenticators Non-physical form factor authentication provides methods of verifying user identities without requiring them to carry an additional physical device. Knowledge-Based Authentication Knowledge-based authentication challenges users to provide information an attacker is unlikely to possess. Questions presented to the user at the time of login are based on information (referred to as authentication secrets) that was supplied by the user at registration or based on previous transactions or relationships. Entrust IdentityGuard allows the administrator to determine the number and type of questions asked.! Out-of-Band Authentication Out-of-band authentication leverages an independent and pre-existing means to communicate with the user to protect against attacks that have compromised the primary channel. Entrust IdentityGuard supports this capability by allowing the generation of one-time confirmation numbers that can be transmitted along with a transaction summary to the user. This can be done directly via email or SMS, or sent through voice to a registered phone number. Once the confirmation number has been received, it is simply entered by the user and the transaction is approved. Entrust IdentityGuard Mobile Whether for consumer, government or enterprise environments, Entrust IdentityGuard provides mobile security capabilities via distinct solution areas mobile authentication, transaction verification, mobile smart credentials, and transparent authentication technology with an advanced software development kit. Supporting the use of the OATH standard for time-based OTP, as well as out-of-band transaction signatures, Entrust IdentityGuard Mobile is one of the most convenient, easy to use and secure mobile authentication methods available today. Entrust IdentityGuard Mobile is also one of the only authentication solutions on the market today that addresses the man-in-the-browser (MITB) malware threat effectively and without user inconvenience. Mobile Smart Credentials Eliminate the need for physical smartcards by transforming today s popular mobile devices into mobile credentials for enterprise-grade authentication. Advanced mobile smart credentials can be used with Bluetooth and near-field communication (NFC) technology for greater convenience and secure connectivity.

Software Authentication Platform SMS Mobile Soft Token Transaction Verification Mobile Device Certificates Mobile Smart Credential Device Authentication Digital Certificates Grid / egrid OTP Tokens Smartcards and USB Password IP-Geolocation Knowledge Based Transaction Signing Mutual Authentication SOFTWARE AUTHENTICATION PLATFORM Biometrics Powered by Entrust IdentityGuard. The widest range of authenticators on the market today all from a single platform. SMS Soft Tokens Similar to the platform s out-of-band authentication capabilities, Entrust IdentityGuard also includes SMS soft tokens, which enable the transmission of a configurable number of one-time passcodes (OTP) to a mobile device for use during authentication. Automatically replenished as needed, this dynamic soft-token approach delivers the strength of out-of-band authentication without the concern for constant network availability, delivery timing or software deployment to a mobile device. egrid An alternative to hardware tokens, egrid cards are sent to users via the Web or as a PDF, which can be easily stored on a machine or mobile device for convenient access and eliminating the need to carry a physical form factor. Strong Username & Password Entrust IdentityGuard typically provides a strong second factor of authentication to an organization s existing username and password infrastructure. The versatile authentication platform can provide strong username and password login for companies without an existing solution.

Mutual Authentication fraudulent organization or spoofed site. Mutual authentication provides methods for your Image & Message Replay Upon registration, the user selects an image from an extensive image bank supplied with Entrust IdentityGuard. The user also creates a message. During subsequent logins the image and message are presented to the user. Grid Serial Number Replay During login, the serial number of the user s unique grid card is presented to the user. Grid Location Replay During login, the user is presented with the values of a number of cells from their unique grid card. Web site s authenticity by displaying a green address bar an obvious trust indicator for the end-user. the Web site is authentic. A trusted provider of identity-based security solutions, Entrust secures governments, 85 countries. Entrust s award-winning software authentication platforms manage today s most secure identity credentials, addressing customer pain points for cloud and mobile security, Distributed by: 7630 Commerce Way Eden Prairie, MN 55344 888.437.9783 Toll Free 952.975.0660 Fax www.identisys.com Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos 23637/2-14