Software Token Security & Provisioning: Innovation Galore!



Similar documents
Hormuzd Khosravi, Principal Engineer, Intel Corporation

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

RSA SecurID Software Token 1.0 for Android Administrator s Guide

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

with PKI Use Case Guide

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Check Point FDE integration with Digipass Key devices

Deeper Levels of Security with Intel Identity Protection Technology

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Session ID: Session Classification:

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Employee Active Directory Self-Service Quick Setup Guide

CLOUD SECURITY: Secure Your Infrastructure

McAfee epolicy Orchestrator * Deep Command *

Security Considerations for DirectAccess Deployments. Whitepaper

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Dell Enterprise Mobility Management

Enterprise Mobility Services

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Customer Whitepaper. Motion Tablet PC Security Basics. Table of Contents. Whitepaper Goals and Intended Audience...2

How To Secure An Rsa Authentication Agent

ACER ProShield. Table of Contents

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

WHITE PAPER. Mobile Document Management. with eakte2go*

STRONGER AUTHENTICATION for CA SiteMinder

Two Factor Authentication and PKI Token (for Windows)

White Paper. The Principles of Tokenless Two-Factor Authentication

A Guide to New Features in Propalms OneGate 4.0

Strong Authentication for Secure VPN Access

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Microsoft Enterprise Mobility Suite

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Securing Office 365 with Symantec

Guide to Evaluating Multi-Factor Authentication Solutions

Hard vs. Soft Tokens Making the Right Choice for Security

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

How To Get A New Computer For Your Business

The Convergence of IT Security and Physical Access Control

Kaseya IT Automation Framework

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

2014 Teradici Corporation.

Strong Authentication in details

RSA SecurID Software Token Security Best Practices Guide

Secure Data Exchange Solution

IT Resource Management & Mobile Data Protection vs. User Empowerment

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

ADDING STRONGER AUTHENTICATION for VPN Access Control

RSA Authentication Manager 7.1 Basic Exercises

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Intel vpro Technology Module for Microsoft* Windows PowerShell*

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

RSA SecurID Software Token 4.1 Administrator s Guide

SECUREAUTH IDP AND OFFICE 365

The Convergence of IT Security and Physical Access Control

Securing Virtual Desktop Infrastructures with Strong Authentication

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Secure remote access to your applications and data. Secure Application Access

#ITtrends #ITTRENDS SYMANTEC VISION

Proof of Concept Guide

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Authentication Levels. White Paper April 23, 2014

IBM Endpoint Manager for Mobile Devices

Moving to Multi-factor Authentication. Kevin Unthank

Trusted Platform Module (TPM) Quick Reference Guide

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Transcription:

Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager, Intel

Overview Software Tokens: Recap Where Could We Go Next? ios/android Windows Protecting RSA SecurID Software Tokens with Intel 5 th Generation vpro Systems

Software Tokens: 2015 Recap AM 8.1 SP1 Self Service Console QR Code Provisioning QR Code Provisioning of Software Tokens will reduce provisioning time and costs by 80% Increase user self-service Eliminate help desk calls Streamline the provisioning process with fewer, intuitive steps QR codes are becoming more accepted by end users Software tokens are QR Code Ready (ios and Android)

Software Tokens: 2015 Recap Windows Desktop Token: RSA + Intel Available on all Intel 5 th generation vpro Systems(PCs/tablets) Encryption and signing of token record using Intel hardware based Platform binding key Plug-in fully built and supported by Intel Available for download today at Intel with whitepaper and guides (https://downloadcenter.intel.com/download/24788) Intel IPT based Token Provider

Where Could We Go Next? ios/android: Fingerprint 2 Concepts PIN Convenience: Fingerprint to submit stored PIN App Security: Fingerprint to launch app Proposed Approaches: SW Token Type Biometric Approach Benefits PINPad PIN Convenience Convenience Fob Style App Security Extra Factor PINLess App Security Extra Factor

Where Could We Go Next? ios/android: Enterprise Mobility Management (EMM) Integration Example vendors: AirWatch, MobileIron, Good, etc Proposal Push data from EMM server to managed RSA Software Token app App configuration (Mask PIN, enable/disable TouchID) Provisioning Token Record (no emails, QR Code, behind the scenes provisioning) Pull data from managed RSA Software Token app to EMM server Binding ID (auto user provisioning by EMM server at RSA Authentication Manager server) Question: Are you willing to get an EMM solution to get these features?

Protecting RSA SecurID Soft Tokens with Intel 5 th Generation vpro Systems

Business Megatrend: Security >500Mu active business clients are vulnerable to the same attack Ground 0 for Many Recent Breaches is a Compromised Login Credential

1 source: Check Point Security Report 2014 2 source: BI Intelligence Investments 2014 Number of devices in use globally (in billions) How Big is the Emerging Attack Surface? An Average Day In An Average Enterprise 1 Every 1min a host accesses a malicious website Every 3mins a bot is communicating with its command and control center Every 9mins a High Risk application is being used Every 10mins a known malware is being downloaded Every 27mins an unknown malware is being downloaded Every 49mins sensitive data is sent outside the organization 24 H 49 27 10 9 3 mins mins mins mins mins 1 min Forecast: Global Internet Device Installed Base 2 20 The Internet of Everything 18 16 14 12 10 8 6 4 2 0 2009 2010 2011 2012 2013E 2014E 2015E 2016E 2017E 2018E Every 24h a given host is infected with a bot Connected Cars Wearables Connected TVs Internet of Things Tablets Smartphones PCs

Note: Not all features available across all products The Four Pillars of Intel s Security Focus Protect Detect Correct Identity Data Protection Anti-Malware Resiliency Protect user & device identities Protect data at rest and in transit Detect malware based on signature & behavior Correct security weaknesses & breaches Intel platforms ship with Security built-in!

Where is Intel Security Engine? CPU Intel 5 th Gen CPU- PCH 8 USB3 (4 Muxed) 12 USB2 X4 DMI PCH SMBus SMLink GbE Phy 2 I2C Skylake PCH 4 SATA Gen3 16 PCI-E, 8Ports (2x4, 4x1) Superior I/O and Great Flexibility TPM 2.0 EC/SIO FWHx SPI/eSPI SP I HDA FLASH CODEC BIOS AMT Code GbE SDIO WLAN Intel Audio DSP on I2S, HD Audio SPI TPM 2 SPI, 3 UART Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/benchmark Intel Confidential *Other names and brands may be claimed as the property of others

Identity and Access Management (IAM) Securing the Front Door a Key Challenge Many authentication factors including Passwords, Tokens, Key Infrastructure. But no unifying framework to simplify implementation, management, enforcement. Known challenges with current authentication methods: Passwords: Complex Users and IT = vulnerable Tokens and Smart Cards: Costly to maintain Software-based Keys: are at greater risk User Presence and context: Location confirmation is difficult Many weaknesses in traditional security make it difficult and expensive to optimize identity and access management

What is Multi-Factor Authentication? Industry is adopting an experience-based approach to verifying identity (biometrics, MFA) using a combination of two (ex - fingerprint and device) or more factors. NOTE: A single factor (password, pin, etc.) is not deemed secure, presence detection is a new requirement. Multi-Factor Two Factor Single Knowledge Username One Factor + Password Knowledge + Possession or Inheritance 2 Factors Knowledge + Possession and Inheritance 2+ Factors Multi-factor authentication increases your security posture, but traditionally has been at the cost of user experience

Intel IPT with MFA For Corporate and Managed Small Businesses 1 Hardened with Intel s Security Technologies rooted in firmware and hardware Devices OS, Domain Login 3 Network VPN Apps & Websites Single Sign-on & more 4 3 4 3 4 2 Supports a variety of hardened authentication factors 3 Designed as a horizontal capability and available to ISVs & OEMs 4 Easily integrates with existing corporate infrastructure Business Users Authenticate yourself Intel IPT w/ MFA Multi-Factor Authentication 1 2 IT Admin Manage your companies Authentication Policy 5 Provides hardened MFA policy management using your choice of console (e.g. McAfee epo, Microsoft* SCCM) Simply & Securely PIN Proximity Biometrics Location to securely login anywhere 5 Securely & Reliably Intel Identity Protection Technology with Multi-Factor Authentication (Intel IPT with MFA)

Market Leading Identity Provider RSA Now Integrated with 5 th Generation Intel vpro Platforms RSA SecurID Software Token is protected in hardware by Intel Identity Protection (IPT) based Token Provider supported by 5 th Generation Intel vpro Platforms SecurID seed record protected and signed by encryption key that is stored on Intel chipset Provides a hardened solution against removing the SecurID seed record (with malware) and running on a different machine Offers hardware level token security with the convenience of a software token Easy to install Driver install package, then same process as provisioning SecurID software token

Set up of RSA SecurID Software Token on 5 th Generation Intel vpro 1 2 Install Intel Token Provider.dll, Intel CSP and Intel ME Driver Install RSA SecurID Software Token v. 5.0 or later 3 RSA SecurID server provisions SecurID Software Token Seed to hard disk RSA SecurID Software Token v. 5.0 Intel IPT Based Token Provider.dll Intel Crypto Service Provider Intel MEI Driver Windows OS RSA SecurID Server 4 Import the Token Seed by selecting Import Token from the pull down and choose Intel Token Provider from list of Storage Devices to store Token Seed Intel IPT PKI Applet Intel Chipset/Intel SE Intel SE Dynamic Application Loader

Protecting RSA SecurID Software Client with Intel IPT Token Provider 1 Intel CSP Generates public/private key pair in ME RSA SecurID Software Token 2 RSA SecurID Software token seed encrypted with public key and signed by private key. Intel IPT Based Token Provider.dll Intel Crypto Service Provider Intel MEI Driver 3 Signed and Encrypted RSA Software Token (seed) is stored in Persistent Storage in Intel IPT Based Token Provider Intel IPT PKI Applet Windows OS Intel Chipset/Intel SE Intel SE Dynamic Application Loader

Using RSA SecurID Software Client with Intel IPT Token Provider 1 2 3 4 Get OTP request from SecurID Software Token request to Intel IPT Based Token Provider Private key stored in ME is used to decrypt SecurID Software token and verify signature. SecurID Software token generates OTP. Seed record is re-encrypted and stored again in the Intel IPT Based Token Provider. RSA SecurID Software Token Intel IPT Based Token 2 Provider.dll Intel Crypto Service Provider Intel MEI Driver 1 Intel IPT PKI Applet Windows OS Intel Chipset/Intel SE Intel SE Dynamic Application Loader RSA SecurID Software Token Seed Record Cannot be Removed by Malware and Run on Another PC

Demo Intel Confidential

Notices & Disclaimers Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps Copyright 2015, Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others.