Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

McAfee One Time Password
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
 1997 Entrust Technologies Orchestrating Enterprise Security Entrust Public Key Infrastructure Erik Schetina Chief Technology Officer IFsec, LLC
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
eToken Virtual and MobilePASS
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Trusted Identity & Access Management The Next Critical Step
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
11/05/99 1 eBusiness Overview. 11/05/99 2 eBusiness - Definition eBusiness is a framework for seamless integration of critical business systems and their.
RSA SecurID November 10, 2005.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Delivering the Optimized Desktop Presented by Danny Beck, Leon Booth and Jeff Johnson.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Single Sign-On
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Identity Assurance Emory University Security Conference March 26, 2008.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Building a Fully Trusted Authentication Environment
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Identity and Access Management
Secure Connected Infrastructure
Data and Applications Security Developments and Directions
Product Manager, Keon PKI
Forefront Security ISA
Novell Government Solutions
Check Point Connectra NGX R60
Public Key Infrastructure from the Most Trusted Name in e-Security
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -

Agenda Why Authentication Authentication Solution areas Selection Criteria RSA Security Solutions Summary

RSA Security Solutions Secure Mobile & Remote Access Secure Enterprise Access Secure Transactions Identity & Access Management

Why Focus on Authentication? Authentication is the essential foundation for trusted business process —Establishes trust by proving identities of the participants in a transaction —“On the Internet, no one knows you’re a dog”

Why Focus on Authentication? Authentication is the foundation for other critical services —Personalization —Authorization / Access Management —Identity Management —Audit Business policy: liability, assurance for transactions Relationships between people, groups, and organizations Applications and services: access control and authorization Relationships between identities and information Presentation / Personalization: what the user sees Defining relationships through quality of experience Authenticated Identity (user, device, application, group, organization) Source of graphic: Burton Group, “Enterprise Identity Management”, October 2002

Source: RSAS, adapted from Frost & Sullivan Authentication Market Drivers Expanding access —Increasing numbers of mobile workers —Increasing numbers of telecommuters —Extension of the enterprise network to third parties Customers Partners —Increasing network size and complexity —Need for portable credentials “Willy Sutton effect” —Increase in sensitive information accessed remotely —High levels of internal compromise/theft —Growing security awareness The problem with passwords —Passwords provide weak security —Multiple passwords are unmanageable —Passwords are surprisingly expensive

Source: RSAS, adapted from Frost & Sullivan Authentication Market Inhibitors Costs —Deployment costs —Perception of additional administrative burden —Lack of installed base of smart card readers —Concern over lost / forgotten / broken tokens or smart cards Deployability —Concern over scalability —Lack of interoperability with current systems —Short-term focus on other business objectives —Business as usual Business Justification —Lack of security awareness —Difficulty in quantifying ROI

Authentication Methods: Three Types of Factors Something you know —Password —PIN number Something you have —Token —Certificate —Smart card Something you are (Biometrics) —Fingerprint —Retina Strong authentication takes two factors

Authentication Solutions areas Securing IPsec VPN’s Securing SSL-VPN’s Securing Web applications/ Websites (content)/ OWA Securing Wireless LAN's Securing Remote Access Servers (Dialup) Securing Unix environments Securing Desktop/ Network Access (Windows) NEW!!!

Selection Criteria One size does not fit all in authentication Hardware tokens, Software tokens, Digital Certificates, SMS based authentication, Smart Cards, USB Tokens The choice of authentication solution will be as a result of Total Cost of Ownership and Strategic Fit for the users and for the organisation Challenges Total Cost of Ownership Acquisition Deployment Operating Strategic Fit (Users) Convenience/ Ease of Use Portability Multi-Purpose Strategic Fit (Corporate / System) Relative Security Interoperability / Back-End Integration Robustness / Scale Future Flexibility

Selection Criteria Three Major Categories, Ten Attributes Total Cost of Ownership —Acquisition cost —Deployment cost —Operating cost Strategic Fit (users) —Convenience / Ease of Use —Portability —Multi-purpose Strategic Fit (corporate/system) —Relative Security —Interoperability / Back-end Integration —Robustness / Scale —Future Flexibility

Source: RSAS, adapted from Giga “The Hows and Whys of Online Authentication”, 1999 Selection Criteria Total Cost of Ownership Acquisition cost —What are the initial acquisition costs? This should include all additional hardware, software, servers, readers, services, etc. associated with acquiring the authentication solution. Deployment cost —What are the costs to deploy the authentication solution? This includes the distribution of any necessary hardware or software; ease of installation; ease of setup and configuration; training of end-users; etc. Operating cost —What are the ongoing operating costs? This may include costs for replacement (e.g., expired / lost / stolen / broken) authentication devices; ongoing management; upgrades; vendor support; help desk support; etc.

Selection Criteria

RSA Security Solutions Secure Mobile & Remote Access Secure Enterprise Access Secure Transactions Identity & Access Management

Secure Mobile & Remote Access RSA Security Solutions Secure Enterprise Access Identity & Access Management Key ApplicationsSecurity / IT Drivers Business Drivers Customer Need Secure Transactions Portals Intranet Extranet Supply chain e-Government Improved user experience Help desk and administrative cost reduction Risk management & mitigation Regulatory & partner compliance Automate business processes Extend the enterprise Build/strengthen on-line customer & partner relationships Regulatory requirements B2B trading networks / supply chain Web services Embedded / OEM Regulated vertical applications Shift in application architectures Reduce application development cost Risk management & mitigation Regulatory compliance Extra-enterprise e-transactions Reduce supply chain costs Regulatory requirements e-Business enablement Intellectual property protection Productivity via anywhere, anytime access Regulatory requirements Microsoft Windows login Enterprise SSO WLAN Smart Badging Improved user experience Cost Reduction Risk management & mitigation Regulatory compliance VPN Citrix Web portals WLAN SSL VPN Risk management & mitigation Regulatory compliance Help desk and administrative cost reduction Empower workforce mobility Productivity via anywhere, anytime access Enable partner and customer transactions Regulatory requirements RSA ClearTrust RSA BSafe RSA FIM

RSA Security Solutions Secure Enterprise Access Portals Intranet Extranet Supply chain e-Government Improved user experience Help desk and administrative cost reduction Risk management & mitigation Regulatory & partner compliance Identity & Access Management Key ApplicationsSecurity / IT Drivers Business Drivers Customer Need B2B trading networks / supply chain Web services Embedded / OEM Regulated vertical applications Shift in application architectures Reduce application development cost Risk management & mitigation Regulatory compliance Secure Transactions Automate business processes Extend the enterprise Build/strengthen on-line customer & partner relationships Regulatory requirements Extra-enterprise e-transactions Reduce supply chain costs Regulatory requirements e-Business enablement Intellectual property protection Productivity via anywhere, anytime access Regulatory requirements Microsoft Windows login Enterprise SSO WLAN Smart Badging Improved user experience Cost Reduction Risk management & mitigation Regulatory compliance VPN Citrix Web portals WLAN SSL VPN Risk management & mitigation Regulatory compliance Help desk and administrative cost reduction Secure Mobile & Remote Access Empower workforce mobility Productivity via anywhere, anytime access Enable partner and customer transactions Regulatory requirements RSA SecurID RSA Mobile RSA SecurID RSA Keon RSA Passage

Key Applications Security / IT Drivers Business Drivers Customer Need VPN Citrix Web portals WLAN SSL VPN Risk management & mitigation Regulatory compliance Help desk and administrative cost reduction Secure Mobile & Remote Access Empower workforce mobility Productivity via anywhere, anytime access Enable partner and customer transactions Regulatory requirements RSA Product Focus: RSA SecurID RSA Security Solutions Secure Mobile and Remote Access

Microsoft Windows login Enterprise SSO WLAN Smart Badging RSA Security Solutions Secure Enterprise Access e-Business enablement Intellectual property protection Productivity via anywhere, anytime access Regulatory requirements Improved user experience Risk management & mitigation Regulatory compliance Key ApplicationsSecurity / IT DriversBusiness DriversCustomer Need Secure Enterprise Access RSA Product Focus: RSA SecurID for Microsoft® Windows®

RSA Product Focus: RSA Mobile RSA Security Solutions Secure Mobile and Remote Access Key Applications Security / IT Drivers Business Drivers Customer Need VPN Citrix Web portals WLAN SSL VPN Risk management & mitigation Regulatory compliance Help desk and administrative cost reduction Secure Mobile & Remote Access Empower workforce mobility Productivity via anywhere, anytime access Enable partner and customer transactions Regulatory requirements

Microsoft Windows login Enterprise SSO WLAN Smart Badging RSA Security Solutions Secure Enterprise Access e-Business enablement Intellectual property protection Productivity via anywhere, anytime access Regulatory requirements Improved user experience Cost Reduction Risk management & mitigation Regulatory compliance Key ApplicationsSecurity / IT DriversBusiness DriversCustomer Need Secure Enterprise Access RSA Product Focus: RSA Keon Digital Certificates

Microsoft Windows login Enterprise SSO WLAN Smart Badging RSA Security Solutions Secure Enterprise Access e-Business enablement Intellectual property protection Productivity via anywhere, anytime access Regulatory requirements Improved user experience Cost Reduction Risk management & mitigation Regulatory compliance Key ApplicationsSecurity / IT DriversBusiness DriversCustomer Need Secure Enterprise Access RSA Product Focus: RSA SecurID Passage (SC & USB)

Summary Strong authentication consists of something you KNOW (pin) & something you HAVE (token, smartcard, USB, etc) Authentication enables business and creates TRUST Saves COSTS due to easy but secure access and usage After establishing trust the next step is authorization Different solutions for different needs We are here to help you with making sure that you pick the right solution

Thank you!!! Distributed by -