RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Trusted Identity & Access Management The Next Critical Step
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
® IGEL Technology Many functions. One device. 1 Security, April 2009 Security Thin computing secures your data.
Security and Policy Enforcement Mark Gibson Dave Northey
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
RSA SecurID November 10, 2005.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
© 2004, Cisco Systems, Inc. All rights reserved.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Unify and Simplify: Security Management
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Dell Connected Security Solutions Simplify & unify.
70-411: Administering Windows Server 2012
Copyright 2006 IDC Reproduction is forbidden unless authorized. All rights reserved. Information Security Trends.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
George L. Heron Technology Officer, SafeNet, Inc..
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Identity on Force.com & Benefits of SSO Nick Simha.
Name Company A Day in the Life… A Demonstration of Application Delivery.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Lieberman Software Random Password Manager & Two-Factor Authentication.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Identity Assurance Emory University Security Conference March 26, 2008.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Building a Fully Trusted Authentication Environment
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Secure Connected Infrastructure
Product Manager, Keon PKI
Forefront Security ISA
BOMGAR REMOTE SUPPORT Karl Lankford
Office 365 Identity Management
Public Key Infrastructure from the Most Trusted Name in e-Security
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments

Identity Protection & Management Even if your device is compliant, your anti-virus is up-to-date and your personal firewall is enabled, the wrong people or rogue devices can still be accessing network assets and your sensitive corporate data. Today, you’ll learn: —How best to safeguard network access from unauthorized access —About the problems and costs associated with passwords —About the importance of both user and device authentication —The solution fit between RSA and Cisco networks

Validating Identity to Protect Network Assets 3 Who are you? Partner Employee Hacker Customer 3

RSA Security’s Value RSA Security’s value is its ability to help organizations protect their information and manage the identities of the people and applications accessing and exchanging it. 4

Advancing e-Business  Transforming e-security into a business enabler  Thousands of customers worldwide —89% of the Fortune 100 —66% of the Fortune 500 —88% of the world’s top 50 banks  2004 RSA Security Inc. All rights reserved 5

RSA Security’s Market Solutions Secure Mobile & Remote Access Secure Enterprise Access Secure Transactions Identity & Access Management Consumer Identity Protection

Authentication in the Enterprise The Business Problem Increasingly broader access to critical enterprise data Need to protect corporate resources Inconsistent user experience Inability to meet regulatory compliance Inability to audit Escalating help desk costs  2004 RSA Security Inc. All rights reserved 7

The Business Problem Addressing security sacrifices simplicity Complex passwords Frequent password changes Multiple passwords

Authentication The Cornerstone to E-security Authentication is the essential foundation for e-business —Establishes trust by proving identities of the participants in a transaction Without knowing with a high level of certainty who you are dealing with, it is: —Not possible to properly assign access control & other rights —Not possible to trust a digital signature In many cases it makes no sense to encrypt data if you don’t know who’s on the other end of the line

Two-Factor User Authentication Most Common Application + PIN

Authentication Choices Relative Strength Weaker Stronger Password Policy + PIN + Single factor Two factor + + PIN + Three factor PASSWORD POLICY

Secure Two-factor authentication Eliminates password vulnerabilities Simple Consistent user experience online or offline Auditable Single log for all authentication Efficient Reduces need for password reset policies and associated costs

RSA SecurID Authentication Devices RSA SecurID Hardware Tokens —Key fob —Standard card —PinPad RSA SecurID Tokens for: —Windows Desktops —Palm Handhelds —Windows Mobile PocketPC —Blackberry Handhelds —Mobile phones RSA SecurID Smart Cards/ USB Tokens

RSA Authentication Solutions RSA Keon Digital Certificates Major Benefits: - Digital signing - Encryption - Secure Forms Signing

RSA Sign-On Manager 4.0 Key Features Web and Browser Apps Groupware Chat Host/ Mainframe Apps Client/ Server Apps Desktop Apps VPN and Dial-Up Citrix RSA Sign-On Manager Server RSA Sign-On Manager Client Offers centralized management of SSO & authentication policy Scalabile and simplified administration IntelliAccess™ Technology ***** Secure Enterprise Single Sign-On integrated with best-of-breed strong authentication solutions SecurID SEED

RSA & Cisco Integrated Solutions Tested, certified, and mutually supported RSA SecurIDRSA Digital Certificates Smart cards & USB tokens Cisco VPN (PIX, & 3000 series) Cisco Aironet Wireless LAN Cisco IOS-based routers, etc. Cisco IP Telephony Cisco Network Admission Control

Complementing Cisco NAC: RSA extends endpoint security measures beyond security posture & device compliance through the validation of devices and rightful users accessing network resources. AAA Server (ACS) RSA Authentication Manager Hosts &Users Attempting Network Access Network Access Devices Policy Enforcement Points Credentials EAP/802.1x Credentials Access Rights Notification Cisco Trust Agent Authenticated? RSA & Cisco NAC Extending Endpoint Security with Device/User Authentication RSA Keon CA RADIUS Cert Validation Policy Decision Points

RSA & Cisco VPN Secure Remote Access Solutions Encrypted tunnel through public network Corporate Network Internet Cisco VPN Client RSA Keon CA RSA Authentication Manager Cisco VPN 3000 Series Embedded RSA Authentication Agent

RSA & Cisco Aironet Wireless LAN Secure Enterprise LAN Access Solutions Corporate Network Cisco Aironet Wireless Client Cisco Secure ACS RSA Keon CA RSA Authentication Manager Cisco Aironet Access Point

RSA & Cisco Network Infrastructure Secure Admin Access (through ACS) Cisco Pix Firewall Admin Access Cisco IOS Routers Cisco IOS RAS Cisco PIX VPN RSA Authentication Manager Cisco IOS Firewall Cisco IOS VPN Cisco Secure ACS

RSA & Cisco Network Infrastructure Device Authentication Cisco Pix VPN Cisco VPN 3000 Cisco Routers Cisco RAS Cisco Aironet Wireless Client Cisco IOS Firewall Cisco IP Phone Cisco Secure ACS RSA Keon CA Cisco Pix Firewall