Two factor strong authentication. Complex solution for two factor strong authentication



Similar documents
Two-Factor Authentication

Migration from Lotus to Exchange Complex solution for simplify transition

The Advantages Of A Partner Nordic IT Group EVRY

PCI DSS Certification. Fast and easy security compliance

VPN Solutions FAQ North America International Germany Benelux France Spain Israel Asia Pacific Japan

Application Performance Management. Java EE.Net, Databases Message Queue Transaction, Web Servers End User Experience

BMS Consulting Cyber Security and IT Technology Team

Strong Authentication. Securing Identities and Enabling Business

etoken Single Sign-On 3.0

Application Backdoor Assessment. Complete securing of your applications

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

etoken TMS (Token Management System) Frequently Asked Questions

ADDING STRONGER AUTHENTICATION for VPN Access Control

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

White Paper. The risks of authenticating with digital certificates exposed

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Welcome Guide for MP-1 Token for Microsoft Windows

Remote Access Securing Your Employees Out of the Office

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Securing Virtual Desktop Infrastructures with Strong Authentication

PortWise Access Management Suite

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

STRONGER AUTHENTICATION for CA SiteMinder

Authentication Levels. White Paper April 23, 2014

Profiting from SafeNet Authentication Service Offerings

The Convergence of IT Security and Physical Access Control

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

SAFEAPP TECHNOLOGY PROGRAM

Overview and use-cases

White Paper. BD Assurity Linc Software Security. Overview

USB etoken and USB Flash Features Support

DriveLock and Windows 7

Mobile Admin Security

Kaspersky Lab s Full Disk Encryption Technology

Strong Authentication for Secure VPN Access

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Virtual Private Networks (VPN) Connectivity and Management Policy

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Introducing etoken. What is etoken?

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

PROTECT YOUR WORLD. Identity Management Solutions and Services

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Amendment 1 - Annexure 5 (C) Technical Criteria

That Point of Sale is a PoS

The Encryption Anywhere Data Protection Platform

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

PortWise Access Management Suite

2012 European Cloud-Based Authentication Services New Product Innovation Award

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

DriveLock and Windows 8

Protect Identities for people, workstations, mobiles, networks

Innovative Secure Boot System (SBS) with a smartcard.

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

1 Hitachi ID Password Manager

YubiCloud OTP Validation Service. Version 1.2

Choosing an SSO Solution Ten Smart Questions

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

The Convergence of IT Security and Physical Access Control

Copyright Giritech A/S. Secure Mobile Access

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

IBM Security Access Manager for Enterprise Single Sign-On Version User Guide IBM SC

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

Two-Factor Authentication

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

White Paper for Software Publishers. Strong Authentication: Securing Identities and Enabling Business

Simplifying Security with Datakey Axis Single Sign-On. White Paper

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Information Technology Branch Access Control Technical Standard

Alliance Key Manager A Solution Brief for Technical Implementers

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

A brief on Two-Factor Authentication

Catapult PCI Compliance

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

HP Commercial Notebook BIOS Password Setup

Yale Software Library

Did you know your security solution can help with PCI compliance too?

Secure Data Exchange Solution

INTEGRATION GUIDE MS OUTLOOK 2003 VERSION 2.0

Using Entrust certificates with VPN

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

YubiKey Integration for Full Disk Encryption

Two-factor Authentication: A Tokenless Approach

Security Solution Architecture for VDI

Managing BitLocker Encryption

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

State of Vermont. User Password Policy and Guidelines

How Drive Encryption Works

Defending the Internet of Things

Protecting Networks and Data with Public Key Infrastructure (PKI)

Transcription:

Two factor strong authentication Complex solution for two factor strong authentication

Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product portfolio IT Security Clouds, Migration and IT Support Business software development Internal processes are certified according to the quility requirements of ISO 9001 international standard 60+ technology partners around the world Our honorable clients: 80+ certified engeneers and consultants 500+ projects in government, industry, banking and telecom sectors

200+ Employees 60+ Vendors InfoPulse A part of thepartner Nordic IT group EVRY

Two factor strong authentication Brif description Two-factor authentication is used to increase security by requiring you to provide strong authentication something you know (a password, PIN) and something you have (laptop, mobile phone, token). The use of two distinct authentication factors helps eliminate an organization s security concerns around granting access based on a single knowledge-based factor Main features Using data encryption together with pre-boot authentication is in fact locking your data Using encryption key is the key to your computer Flexible authentication platform which expands with you and your requirements Configurable apply the appropriate authentication method to the user, group or application Developed/supported by authentication experts Who will need it If you are using the services that provides important data for you Financial institutions for upgrade their systems of authenticate clients to the level of strong authentication

What is Strong Authentication? 1. What you know 2. What you have 3. What you are Strong authentication means using two or more authentication methods Example 1 Example 2

Where to Save Your Key Placing your key on the PC/Laptop is not safe! It is exposed to malicious software and insider attacks The key must be kept outside of the computer on an external device The question is - On which device?

Token devices in the Market Types of token devices Each type of token devices used by the customer's needs

Token devices All token devices allow secure key storage, and are also: Portable Easy to use Easy to deploy Enable easy and secure implementation of certificate-based (PKI) solutions Automatic generation of PKI keys on-board the token Secure and portable storage of PKI keys and certificates Enable a variety of security applications in one device - secure Web access, password management, laptop protection, secure e-mails, and more

How Does it Work using token device? (OS Authentication) For a user to reach the data he/she must: 1. Insert the Token device into the USB port 2. Enter the Token password As a result: Only authorized users can decrypt sensitive data The private key stored on-board the token Key does not reside in the vulnerable PC Environment

How Does it Work using token device? (Pre Boot Authentication) For a user to start the boot procedure he/she must: 1. Insert the Token device into the USB port 2. Enter the Token password As a result: Only authorized users can boot the PC With encryption impossible to target hard disk directly

General Architecture Organizational Policies Auditing Reporting Devices & User User Repository Token Repository Policy Management Certification Center Network Logon OTP Authentication More Security Applications

Two factor strong authentication Project Results Benefits Increased security - add an extra layer of authentication to application access, VPN access, or during a self-service password reset Reduce Risk - prevent attacks by leveraging credentials which expire after one use Establish mutual trust between the your organization, your customers and partners by implementing end-to-end data and network security Robust strong authentication process requires strong authentication Significantly decrease password-related helpdesk costs Flexibility - multiple OTP delivery methods available Gives you the ability to provide a wide variety of security services all with the same token: Laptop security Credential management File encryption And more Pricing Up to 100 tokens 1 000 * From 101 to 500 tokens 5 000 * From 501 to 1 000 tokens 10 000 * *Without licenses and taxes

Building Information Security Management System to the State Savings Bank of Ukraine About customer The State Savings Bank of Ukraine is one of the largest financial institutions of Ukraine. It has over 4500 branches throughout the country which carry out various functions, such as the disbursement of pensions, social aid, processing of utility payments and other banking transactions. Oschadbank is the only Ukrainian bank whose clients demand deposits are fully guaranteed by state law Problem solved Our customer is used one factor authentication by requirements of the regulator National Bank of Ukraine, the customer must use strong authentication (two-factor authentication) Our solution BMS Consulting Engineers have audited the current needs of the customer and perform the following works: Planning architecture of system of the model twofactor authentication user Selection and implementation solution of twofactor authentication «SafeNet» Training of employees of the Bank Developing instructions for administrators and users

Construction of the integrated systems of information protection to State Agency of Land Resources of Ukraine About customer The State Agency of Land Resources of Ukraine is the central body of executive power with activity directed and coordinated by the Cabinet of Ministers of Ukraine by Vice Prime Minister of Ukraine - Minister of Regional Development, Construction and Housing and implements state policy survey and mapping activities and land relations, as well as in the State Land cadaster. Problem solved Our customer is used one factor authentication but by requirements of the regulator in the construction of an integrated system of information protection, the customer must use strong authentication (two-factor authentication) Our solution BMS Consulting Engineers have audited the current needs of the customer and perform the following works: Planning architecture of system of the model twofactor authentication user Selection and implementation solution of twofactor authentication «SafeNet» Training of employees of the Bank Developing instructions for administrators and users

Our competences and experience Our team "BMS Consulting" specializes in the development and implementation of projects construction of IT infrastructure monitoring, security and management of your IT environment, implementation of the decisions to implement and expand the application systems, focusing its activities on the corporate market segment BMS strengths We deliver high quality and always in time Certified specialists English level Upper Intermediate Real experience in real projects varying complexity International projects experience Developed and ready to use various automation and optimization tools Ready to long term collaboration

Thank you for attention! 16