EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

McAfee One Time Password
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Ljubomir Ivaniš CPU d.o.o.
The System Center Family Microsoft. Mobile Device Manager 2008.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Overview of the technology that comprises Attendance Enterprise.
eToken Virtual and MobilePASS
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
eToken PKI Client Overview
Understanding Active Directory
Security and Policy Enforcement Mark Gibson Dave Northey
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Understanding Active Directory
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Microsoft Identity and Access Solutions Market Trends and Futures
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Sr. Manager Global Business Solutions Carlos Capó Master Macs in Business Easily integrate Macs into a Microsoft Shop.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Overview of Access and Information Protection
LinuxUNIX Red HatSUSECentOSUbuntuDebianOracleAIXHP-UXSolaris Configuration Manager * * * * * * Endpoint Protection No Plans.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Tim Vander Kooi Systems
Hands-On Microsoft Windows Server 2008
Chapter 9: Novell NetWare
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Fundamentals of Administering Windows Server 2008.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Configuring Directory Certificate Services Lesson 13.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Windows Role-Based Access Control Longhorn Update
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Craig Pringle & Derek Moir
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Power BI Security Best Practices
Public Key Infrastructure from the Most Trusted Name in e-Security
PLANNING A SECURE BASELINE INSTALLATION
Securing web applications Externally
IT Management, Simplified
Presentation transcript:

eToken TMS 5.0 CA June 09

eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken TMS 5.0 – Release Highlights

Authentication Management Challenge The management of an authentication solution in an enterprise involves a number of interrelated elements:  Users Identities in the organization  Organizational policies Access rights for user groups; required security measures  Security devices Authentication devices provided to users  Security applications Applications to be used by each user (e.g. Network Logon, disk encryption)

1. New employee gets token upon arrival 2. Employee performs token self-enrollment 3. Employee starts working Organizational Policies Token Management System ERP System VPN Network Logon Life With a Management System And There’s Much More…

Why Use a Token Management System?  Reduce administrative errors (potentially costly!!) by streamlining processes  Reduce workload of your IT staff with automated processes and user self-service tools  Control your authenticator inventory and usage  Enhance user productivity  Fully audit token usage for regulatory compliance With a management system in place you can: Make your authentication solution a reality!

eToken TMS Token Management System

TMS Framework View  Robust system for deploying, managing and using authenticators  TMS links users, organizational policies, security devices & security applications

 Authenticator assignment  Authenticator enrollment  Authenticator revocation/ disablement  Authenticator update  Password reset/change  Authenticator replacement Authenticator Life-Cycle Management with TMS

TMS Management Components  The following web sites/services installed on the TMS server:  eToken TMS Management Center: TMS management site, used by administrator & helpdesk  eToken TMS Self Service Center: Self service site, used by corporate end users  eToken TMS Remote Service: Self service site for end users - for employees on the road in case of lost authenticators or forgotten passwords)  TPO Management Web Service: A web service - used by the TPO editor for configuring TMS settings

TMS Key Features (1)  Supports all eToken devices and applications  Integrated with Microsoft Active Directory, Microsoft SQL Server and OpenLDAP  Web-based user self-service, help desk, and administration tools  Open architecture  Supports security applications with configurable connectors  Supports solutions including: network logon, VPN, web access, secure , data encryption, boot protection, SSO, certificate management, IdM…  Robust SDK  Secure solution for employees on the road who lose/forget their authenticators

TMS Key Features (2)  Supports scalable, distributed administration  Management of multiple domains from a single web-based interface  Role-based administration  Different user data encryption keys for different domains  Full auditing and reporting capabilities  Supports clustering, redundancy, scalability – based on Microsoft Windows Server 2003 and IAS  Centralized client software deployment  Supports multiple client platforms: Windows, Linux and Mac OS

TMS Key Differentiators in the Market  A single life-cycle management system for your entire solution  Full integration with Microsoft Active Directory  Familiar and intuitive usage for administrators  Direct link with user data – no need to replicate  Fully integrated with AD user rules and policies  All user data are located and managed in one place  No proprietary server  Integration with multiple security applications + SDK  Flexibility to support current & evolving requirements  Designed for enterprises & managed service providers

TMS Business Value: MSSPs  Easily manage your customers’ solutions  Manage multiple customer domains from a single web-based interface  Allow local customer site management with web-based user and admin tools  Enable your customers to view reports online  Control activities with role-based administration  Permissions can be assigned per domains, OUs, groups, & tasks  Keep your customers’ data secure  Built-in user data encryption capabilities  Different encryption keys for diverse customer domains  High availability, non-stop service

TMS Business Value: Compliance  Excellent reporting tools  Set of built-in reports including: token usage, connected tokens, token inventory and status, attendance reports  Support for external reporting tools to generate other reports you may need  Full auditing capabilities  Complete event logs  Fully customizable alerts to track any irregular or problematic usage right when it happens  Enhanced internal data controls and protection of individuals’ privacy  Complete control over each administrator’s abilities  Advanced user data encryption capabilities

eToken TMS 5.0 Highlights

eToken TMS Highlights  Support for eToken PRO Anywhere  Support for eToken Virtual and MobilePASS (SoftOTP) products  Card printing support  Multi Forest Active Directory support  Novell eDirectory user store support  Simplified licensing mechanism - cross domain  Simplified installation and configuration (OTP*)  Updated platform support (Windows Bit)  Support for TMS 5.0 user token management in Linux & MAC  TMS Self service & TMS remote  Expanded TMS API  MS CA Based Key Archival support  Improved logging and error handling capability  Enhanced technical documentation

Authenticator Management  eToken TMS enables full life cycle management  Including TMSservice - End-user portal  The End-user site enables tasks such as:  Enroll a new authenticator  Update the content of an enrolled authenticator  Change/Reset eToken password  Disable/Enable an eToken  Replace a Lost/Damaged authenticator (including revocation)  Manage OTP authenticator including MobilePASS  Enroll eToken Virtual and eToken Virtual Temp

Post-Enrollment Self Management After successful authenticator enrollment, self-management options are added to the TMSService site. Maintenance Recovery OTP Management Soft tokens

eToken Virtual Deployment– Administrator Use Case Administrator enrolls eToken Virtual for a specific user from the TMS Manage. The only supported use case is enrollment to a removable flash device:  eToken TMS and eToken Virtual licenses are acquired by the company to provide two-factor authentication using software authenticators.  eToken TMS is installed and all the required connectors are configured to enable eToken Virtual usage.  Administrator plugs in the user portable device and starts the enrollment process from the TMS Manage web site.  eToken Virtual is created on the portable device, locked and set with the initial user password.  Notification is sent to the user with the eToken Virtual password.  User receives the device and can use it for the authentication. 19

eToken Virtual – User Enrollment Use Case User accesses the TMS Service web site and enrolls eToken Virtual:  TMS and eToken Virtual licenses are acquired by the company to provide two-factor authentication using software authenticators.  TMS is installed and all the required connectors are configured to enable eToken Virtual usage.  User enters TMS Service web site to enroll eToken Virtual.  eToken Virtual is created on the user computer, locked and set with the user password OR user can enroll the eToken Virtual to a portable drive, based on the TMS TPO settings, configured by the administrator.  User can use the eToken Virtual for the authentication. 20 NOTE: NOTE: Admin Rights Required for eToken PKI Client Installation

MobilePASS – Enrollment and Usage  eToken TMS and MobilePASS license are acquired by the company to enable OTP using software authenticators.  Administrator enrolls MobilePASS authenticator for the user in the TMS Manage.  The user receives the MobilePASS authenticator, an activation code and PIN via , SMS etc..  The user installs the MobilePASS software.  The user enters the activation code and activates the software.  OTP is generated using the received PIN.  Using the OTP, the user logs on.

Additional software solutions using TMS:  eToken Virtual Temp  Time limited temporary authenticator which can be used for a limited period of time instead of a permanent authenticator  For each authenticator, the user can enrol one temporary virtual authenticator.  eToken Rescue  Users who lose their authenticators can create an eToken Rescue authenticator (default expiration 1 month, max 3 months)

Controlled Availability Release  For new prospects who wish to deploy eToken TMS 5.0 CA  CA Process  Salesperson provides details of prospect and fills CA form, available from Technical Support  Reviewed and approved by Authentication product management prior to approval  Receives extensive support and ongoing feedback  For details, contact: Opher Dubrovsky

Summary  eToken TMS and PKI Client make your authentication solution a reality!  Organization’s own user-repository utilized to handle full life-cycle token management  User administration of authentication devices is shifted from IT to HR and users  eToken solutions reduce identity and password management costs  eToken helps customers achieve regulatory compliance

Thank You