Solutions for a Secure Digital World Multi-vendor Multi-factor Security.

Slides:



Advertisements
Similar presentations
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Digital Certificate Installation & User Guide For Class-2 Certificates.
PaperCut MF Reseller Resource Material An Introduction to PaperCut MF.
© Copyrights 1998 Algorithmic Research Ltd. All rights Reserved D a t a S e c u r i t y A c r o s s t h e E n t e r p r i s e Algorithmic Research a company.
Mobile Payment Security The Good, the Bad and the Ugly
Omni eControl. New Features in Version 2.x - Manage Mixed Networks: eDirectory, Active Directory, GroupWise, Exchange eControl Version 2.0 New Features.
Saving Money and Solving Real World Business Problems with Novell's Technology December 10th, 2008 Computer Integrated Services Company of New York, LLC.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Company profile & product description
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
eToken PKI Client Overview
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Survey of Network Operating Systems (NOS) Introduction Novell Operating Systems Microsoft Network Operating Systems Other Network Operating Systems NOS.
Certificate and Key Storage Tokens and Software
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Choose and Book Installing Security Broker (IA) client.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
Company Background  Leb Shama Company Limited  Founded in 1999  Focus – Online backup software development  Business Strategy - Rely.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Overview of Access and Information Protection
Charismathics tech networking for earth. 2 OASIS London, Nov 27th and 28th 2006, Sven Goßel, Desktops Laptops USB Memory Palm PocketPC BlackBerry.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Chapter 9: Novell NetWare
C O L L E G E O F E N G I N E E R I N G CSU PDI 2010 Thin Clients as Desktop Computers Mark R. Ritschard Director, Engineering Network Services College.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
QuickBooks, hosted by Reckon Online Catie Cotcher.
CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control.
DOE Challenges How are Labs responding Security – Full disk encryption – Authentication – Threat management Directory services Energy conservation mandates.
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Configuring Directory Certificate Services Lesson 13.
Chapter Nine NetWare-Based Networking. Introduction to NetWare In 1983, Novell introduced its NetWare network operating system Versions 3.1 and 3.1—collectively.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
SecureLogin Solution for Hospital Environments Keith Lewis Novell Consultant Novell, Inc. Troy Drewry Protocom Consultant Protocom.
PC/SC Overview Christophe Colas Chairman PC/SC Technical Workgroup CTST’ 2000 Miami.
The Right OS for Your Job Major: Computer Science Instructor: Dr Anvari Presenter: Ke Huang Student ID:
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
OLMEK Mach 2006 Olmek is an innovative solution developed by Item Centric to protect digital data’s storage and exchange with an unprecedented level of.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Module 1: Introduction to Windows 2000 and Networking.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
Chapter 9 Lecture 4. NetWare Novell’s network operating system Biggest competitor – Microsoft Windows.
Jyotin Gambhir Is A Partner At SecureFLO, Boston, MA.
1 1 Social Security Platform James Wu We Simplify Security.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Office 365 Upsell Paths.
IP CAMERAS.
Upsell Small Business Customers to an Office 365 plan
Product Manager, Keon PKI
CS691 M2009 Semester Project PHILIP HUYNH
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
CS691 M2009 Semester Project PHILIP HUYNH
Networks Software.
PLANNING A SECURE BASELINE INSTALLATION
Chapter 3 – Operating Systems
O.S. Security.
Christophe Colas Chairman PC/SC Technical Workgroup
Presentation transcript:

Solutions for a Secure Digital World Multi-vendor Multi-factor Security

About Dekart Representatives in France, Russia, Spain and Canada Provides tools for robust multi-factor data protection and access control with hardware from all major vendors of security devices Produces tools compliant with national and international standards for customers in Europe, North and South America

Why security is hard? Diversity of back-end infrastructure Diversity of client access software Diversity of hardware devices used for multi-factor security

Dekart Multifactor Authentication Logon for: Windows local workstation Windows 2000/2003 Active Directory Windows NT 4.0 domain SAMBA (Linux server) SSH server (Win2000, Linux, Unix) Novell NetWare NDS / eDirectory Lotus Notes Citrix Full Program Neighborhood Version 7.00 (Citrix ICA client) Multifactor authentication - vendors supported : USB tokens: ActivCard, Aladdin, Eutron, Rainbow Smart cards: Algorithmic Research, Datakey, GemPlus, Giesecke & Devrient, Schlumberger, Siemens Smart card readers: all PC/CS compatible smart card readers, including Towitoko, Omnikey Biometric verification devices: all Bio API and HA API compatible biometric verification devices, including Cherry, Biolink, Precise Biometrics, SCM Microsystems Reinforced multi-factor authentication Automatic session logout

Dekart Data Privacy Encryption for: Virtual hard drives Microsoft Word, Excel and PowerPoint documents clients Hides data in virtual drives Hides presence of encrypted data Multifactor encryption - vendors supported: USB tokens: ActivCard, Aladdin, Eutron, Rainbow Smart cards: Algorithmic Research, Datakey, GemPlus, Giesecke & Devrient, Schlumberger, Siemens Smart card readers: all PC/CS compatible smart card readers, including Towitoko, Omnikey Biometric verification devices: all Bio API and HA API compatible biometric verification devices, including Cherry, Biolink, Precise Biometrics, SCM Microsystems Encryption for TheBat! - biometric authentication for client and server

Dekart Management Tool Provides single point of control Manages diverse hardware for multi- factor authentication Reduces total cost of ownership (TCO) Creates appropriate levels of security Managed devices: USB tokens: ActivCard, Aladdin, Eutron, Rainbow Smart cards: Algorithmic Research, Datakey, GemPlus, Giesecke & Devrient, Schlumberger, Siemens Smart card readers: all PC/CS compatible smart card readers, including Towitoko, Omnikey

Dekart Security SDK OEM vendors Systems integrators Value added resellers Developers of multi-factor security systems Break away from locked into one hardware vendor blues Authentication and data privacy tool for:

A call to action Company Contact Information Compania Dekart SRL Alba Iulia 75, Chisinau 2071 Moldova Dekart online store: - We accept Visa, MasterCard, Discover card payments. Commercial, technical and general information Sales: Tech support: Marketing: Other questions: