® IGEL Technology Many functions. One device. 1 Security, April 2009 Security Thin computing secures your data.

Slides:



Advertisements
Similar presentations
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Remote Desktop Services
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Content Overview Update Process Additional Tools.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
IGEL Security Product Marketing Manager October 2011 Florian Spatz Thin computing secures your data.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
® IGEL Technology Many functions. One device. 1 Product Slides, January 2010.
Remote Networking Architectures
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Public Key Infrastructure Ammar Hasayen ….
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Aladdin eToken Solutions for Cisco Integrated Services Routers Cisco VPN Client Cisco Identity-Based Networking Aladdin Knowledge Systems November 2005.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Hands-On Microsoft Windows Server 2008
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 7: Fundamentals of Administering Windows Server 2008.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Module 5: Designing a Terminal Services Infrastructure.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
® IGEL Technology Many functions. One device. 1 MultiScreen Agent, January 2008 IGEL MultiScreen Agent Unveil the full potential of multiscreen Thin Clients.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Integrating and Troubleshooting Citrix Access Gateway.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Module 7: Configuring Terminal Services. Overview Describe how the components of Terminal Services work together Identify new Terminal Services core features.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
What’s New in Fireware v WatchGuard Training.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
security feature collection
Module 9: Preparing to Administer a Server
Module 3: Enabling Access to Internet Resources
Unified Management Agent (UMA)
Configuring Windows Firewall with Advanced Security
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Utilize Group Policy Terminal Server Settings
PLANNING A SECURE BASELINE INSTALLATION
Module 9: Preparing to Administer a Server
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

® IGEL Technology Many functions. One device. 1 Security, April 2009 Security Thin computing secures your data

® IGEL Technology Many functions. One device. 2 Security, April 2009 Content Overview IGEL Security Solutions –AuthenticationAuthentication –CommunicationCommunication –ManagementManagement –UpdateUpdate Partner solutions –Citrix Hot Desktop solutionCitrix Hot Desktop solution –Aladdin eToken & PKIAladdin eToken & PKI –Kobil myIdentity & PKIKobil myIdentity & PKI IGEL Features

® IGEL Technology Many functions. One device. 3 Security, April 2009 Overview – IGEL Security Solutions Authentication –Smartcard Reader integrated or optional –High security with Multi-Factor-Authentication –Hot Desktop Integration enables fast user- switching and roamingHot Desktop Communication –VPN Client –WiFi WPA security –Call Back on dial-up lines Administration –Trusted relationship between server and client through certificates –Local configuration can be disabled Update –IGEL Failsafe Firmware Updates

® IGEL Technology Many functions. One device. 4 Security, April 2009 Authentication Smartcard reader Support for numerous security and authentication solutions Logon Automation Autostart of local and server-based applications on smartcard insertion Session Protection –Suspend of ICA and RDP sessions at smart card removal –Resume and re-authentication at smart card re- insertion Desktop Safeguard Automated lock or logoff of the thin client on smartcard removal Application Roaming Resume of suspended ICA and RDP session on any thin client on the network

® IGEL Technology Many functions. One device. 5 Security, April 2009 Communication IGEL Digital Services secured via VPN IGEL Thin Clients come with integrated VPN support Allows secured communication with branch and home offices Wide Area Network (WAN) Headquater – Data centerBranch Office LAN Digital Service Provider, e.g. VoIP Gateway, Connection Broker, SAP, Mediaserver VPN Tunnel Digital Services, e.g. VoIP Client, Connection Broker Client, Local Browser, SAP GUI, Mediaplayer

® IGEL Technology Many functions. One device. 6 Security, April 2009 RM Public Key UMS Private Key UMS Secure certificate-based Management Rogue UMS RegistrationManagement Rogue UMS Private Key Key Ok – Management allowed Key mismatch – Management denied

® IGEL Technology Many functions. One device. 7 Security, April 2009 Partner Solutions

® IGEL Technology Many functions. One device. 8 Security, April 2009 Citrix Hot Desktop - User scenarios Shared workstations Roaming workers Challenges –Multiple logon logoff during the workday –Inefficient, slow logon process –Generic account logins not acceptable due to sensitive data and compliance Solution –Citrix Hot Desktop with XenApp and Password Manager –Gemalto.Net Smartcard –IGEL Thin Clients with integrated Smartcard Readers and Hot Desktop support out-of-the-box

® IGEL Technology Many functions. One device. 9 Security, April 2009 Citrix Hot Desktop - Solution

® IGEL Technology Many functions. One device. 10 Security, April 2009 Citrix Hot Desktop - Benefits Time (in seconds) from logon to application access Reduced logon times up to 90% Increased security –Strong authentication through Smartcards –Inactivity timeout locks workstation –User authentication events are logged for accountability and auditing Increased productivity for roaming users –Single Sign-on to applications –Any user may unlock the workstation –Published applications follow the user (Smooth Roaming) –Local applications can be automatically launched and signed on Source: Citrix Systems

® IGEL Technology Many functions. One device. 11 Security, April 2009 Aladdin eToken & PKI ICA RDP PKI Authentication succesfull User certificate Certificate based login Secure two-factor authentication Certificate can additional be used to sign s and Files within the ICA or RDP session

® IGEL Technology Many functions. One device. 12 Security, April 2009 Kobil myIdentity & PKI ICA RDP PKI Authentication succesfull User certificate Certificate based login Secure two-factor authentication Certificate can additional be used to sign s and Files within the ICA or RDP session

® IGEL Technology Many functions. One device. 13 Security, April 2009 IGEL Features IGEL Universal Management Suite included free-of-charge Failsafe firmware update mechanism Broad hardware range fitting for every usage scenario