© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast 914-714-1840

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

1 IN THE NEWS eToken is a durable USB key that serves as an inexpensive, yet extremely reliable two-factor authentication device for organizations. For.
1 eToken Solutions January
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Quick Heal Technologies (P) Ltd Security Simplified.
McAfee One Time Password
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Ljubomir Ivaniš CPU d.o.o.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
WHICH TO CHOOSE RIGHT SERVER FOR THE RIGHT JOB. Today’s business environment demands that small and midsize businesses do more with less. The large majority.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Designing Enterprise Mobility Cortado Corporate Server.
Which server is right for you? Get in Contact with us
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
eToken Virtual and MobilePASS
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
eToken PKI Client Overview
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Security Controls – What Works
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Adoption of PKI Where are we, where should we be, what’s holding us back, and where do we want to go? And: what about authentication vs. authorization?
Understanding Active Directory
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Data Encryption Overview South Seas Corporation Jared Owensby.
RSA SecurID November 10, 2005.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Public Key Infrastructure from the Most Trusted Name in e-Security.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Aladdin eToken Solutions for Cisco Integrated Services Routers Cisco VPN Client Cisco Identity-Based Networking Aladdin Knowledge Systems November 2005.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Internet Security for Small & Medium Business Week 6
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Name Company A Day in the Life… A Demonstration of Application Delivery.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Building a Fully Trusted Authentication Environment
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
CLOUDENTIFY.
Product Manager, Keon PKI
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Public Key Infrastructure from the Most Trusted Name in e-Security
MICROSOFT AZURE ISV PROFILE: ONEBE
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation transcript:

© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast ®

© Aladdin Knowledge Systems 2006 Who is Aladdin Reliable authentication – a business enabler Aladdin eToken eToken Solutions eToken Products Topics Covered In This Presentation

© Aladdin Knowledge Systems 2006 Headquarters: Tel Aviv, Israel Presence: Strong Financial Momentum: Founded: 1985, publicly traded since 1993 Employees Worldwide: Revenues – $105.9M No debt Over $100M in cash Consistent growth in revenue and profits USA, UK, Germany, France, The Netherlands, India, Spain, Italy, Japan and China Aladdin Knowledge Systems

© Aladdin Knowledge Systems 2006 Identifies who users are Comprehensive solution for software vendors protection and licensing needs Hardware or software-based Portable device for two-factor authentication, password and digital identity management Robust enterprise management Gateway-based anti- virus protection & content security Web browsing security with anti-spyware & application filtering Proactive security with spam management Aladdin Product Lines Software Digital Rights Management Enterprise Security Controls what users can do Ensures users safe access

© Aladdin Knowledge Systems 2006 Reliable Authentication – A Business Enabler

© Aladdin Knowledge Systems 2006 Reliable Authentication Enables Business Improved management of user passwords 24x7 secure access to sensitive business information Enhanced online services Digital signing of transactions Secure PCs and laptops

© Aladdin Knowledge Systems 2006 Passwords Are Not Enough! Passwords are easily compromised Passwords are difficult for people to manage Passwords are expensive to organizations Can we rely on passwords to protect our valuable digital data and communications? Source: Janney Montgomery Scott, Solving the Worlds Identity Crisis, November 2005 With identity theft running rampant, corporate data and networks being compromised everyday, authentication and identity management solutions have become a must have technology for all those storing, accessing, and disseminating sensitive dataincluding governments, enterprises, and online consumers. Source: Burton Group, Enterprise Single Sign-On: Access Gateway to Applications, Phil Schacter, 22 September 2005 Each call to the IT help desk costs between $25 and $50, and typically 35% to 50% of help desk calls in an organization are password related.

© Aladdin Knowledge Systems 2006 Why Go Beyond Passwords? Enable more services Enable your students, faculty and staff to access enhanced services and applications Comply with regulations Comply with industry related regulations (SOX, HIPAA, FERPA, Basel II, and others) Increase productivity Enable your users to spend more time doing value-added activities Save costs Reduce passwords and identity management costs Attract customers Address the demands of security-conscious customers

© Aladdin Knowledge Systems 2006 The Solution – Strong Authentication

© Aladdin Knowledge Systems 2006 What Is Strong Authentication? What you knowWhat you have Strong authentication means using two or more authentication methods What you are Authentication – the three whats

© Aladdin Knowledge Systems 2006 What Can You Do with Aladdin eToken? eToken Solutions

© Aladdin Knowledge Systems 2006 Aladdin eToken Aladdin eToken is the world leader in USB-based authentication. It provides strong user authentication and cost-effective password management solutions enabling organizations to easily and effectively: Expand business opportunities with secure network access Improve data security through enhanced encryption and digital signing Reduce costs and vulnerabilities through superior password management

© Aladdin Knowledge Systems 2006 Secure Network Access eToken secure network access solution includes: – VPN security (secure remote access) – Secure web access – Secure network logon Key eToken advantages: –Support for multiple authentication methods: PKI, OTP, password –Support for multiple platforms and technologies –Single robust management system for the entire solution With employees working remotely all over the UK, we require an extra level of security to authenticate users accessing the system; Aladdin's eToken authentication device was an easy choice for us." - David Walker, ITS manager at Newell & Budge

© Aladdin Knowledge Systems 2006 Data Security eToken data security solution includes: –PC security/boot protection, file & data encryption –Secure –Digital signing (non-repudiation) Key eToken advantages: –Fully integrated solution with many solution partners –Highly secure on-board key generation and cryptographic operations –Single robust management system for the entire solution eToken provides the technology and flexibility we need from a token for strong authentication plus added benefits of S/MIME and document signing. – Barry Ribbeck, Director of Systems Architecture & Services at Rice University

© Aladdin Knowledge Systems 2006 Password Management eToken password management solution includes: –Simplified sign on for Windows and Web based applications –Secure Windows (GINA) logon Key eToken advantages: –Simple and secure token-based approach to SSO –Intuitive and transparent –Single robust management system for the entire solution A password reset call to the helpdesk costs an estimated $25. Some enterprises have estimated that helpdesk password reset calls cost twice as much… it turns out passwords arent free – Burton Group, Reduced Sign-On, Gerry Gebel, September 2006

© Aladdin Knowledge Systems 2006 Something you have- The eToken device Something you know- The eToken password eToken Solutions Are Based on Strong User Authentication Simple & strong two-factor user authentication

© Aladdin Knowledge Systems 2006 eToken Security Applications Strong Authentication –PKI Client – Enhance PKI-based solutions –OTP authentication – Strong user authentication in detached mode Password Management (Single Sign-On) –SSO – for Windows based applications –WSO – for Web based applications –Windows Logon (GINA) – for Windows network and workstation logon

© Aladdin Knowledge Systems 2006 How Can You Do It? eToken Products

© Aladdin Knowledge Systems 2006 eToken Device Variety USB PKI Hybrid USB & OTP OTP Smartcard + ID Badge Hybrid USB & Biometric (Q408) Virtual Token Capability– for lost tokens Hybrid USB & FLASH (available now) new Java Card

© Aladdin Knowledge Systems 2006 The eToken Product Offering

© Aladdin Knowledge Systems 2006 Boot Protection Disk encryption Dig Sig File encryption Enterprise SSO SSV VPN Secure Net logon VPN Focusing on Enterprise Solutions PKI Client OTP Authentication Single Sign On Secure Network Logon SDK Management All devices can include RFID Secure network access Data security Password management eToken Product Offering Today

© Aladdin Knowledge Systems 2006 Token Management System (TMS) –Innovative management system for token assignment, deployment, personalization and full life cycle management. –The link between users, eToken devices, security applications, and organizational policies –Built on open standards and Active Directory –Enables full user self-service capabilities eToken Deployment and Life Cycle Management

© Aladdin Knowledge Systems – New Product Investments Biometrics Virtual Tokens

© Aladdin Knowledge Systems 2006 Major Product Certifications Partners Sample eToken Partners and Certifications

© Aladdin Knowledge Systems 2006 Sample eToken Customers NFL

© Aladdin Knowledge Systems 2006 Why Customers Choose eToken A comprehensive solution, providing high value and flexibility – multiple security applications with a single device One integrated platform that supports diverse customer needs Centralized management of tokens, including user self- service enrollment, token password maintenance, and more Simple deployment and usage Innovation leadership in IP & technology Unparalleled support As a leading worldwide USB strong authentication vendor, eToken provides:

© Aladdin Knowledge Systems 2006 Thank you! For more info: Bill Dolan