CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Complete Event Log Viewing, Monitoring and Management.
Ljubomir Ivaniš CPU d.o.o.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Complete Event Log Viewing, Monitoring and Management.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
©2006 Microsoft Corporation. All rights reserved. Windows Vista Security Tidbits Steve Riley Senior Security Strategist Microsoft Corporation
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Copyright © 2006 Exportech Portugal. All rights reserved.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Security and Policy Enforcement Mark Gibson Dave Northey
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
RSA SecurID November 10, 2005.
Understanding Active Directory
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Module 8: Implementing Administrative Templates and Audit Policy.
Windows 2003 and 802.1x Secure Wireless Deployments.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Overview of Access and Information Protection
Chapter Six Windows XP Security and Access Controls.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 14: Configuring Server Security Compliance
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Operating System Security Fundamentals Dr. Gabriel.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
A Practical Comparison of Modern Authentication Mechanisms.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
CSCE 201 Identification and Authentication Fall 2015.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Basharat Institute of Higher Education
Secure Connected Infrastructure
Chapter One: Mastering the Basics of Security
Module Overview Installing and Configuring a Network Policy Server
Goals Introduce the Windows Server 2003 family of operating systems
Lesson 16-Windows NT Security Issues
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control

Corporate Information Security Logical Access Control – Heart of Security Efficient Control Mechanisms  User identification, authentication & authorization  Centralized user rights management  Logging & auditing

Corporate Information Security Passwords: Security Bottlenecks Most Likely Security Breaches  Easy to guess passwords  Same password for all applications  Password sharing  Not keeping passwords secret

Corporate Information Security Security Stats  Half of help desk calls are password- related Source: Lenovo  $ 150 per user annually - operating expenses for managing user accounts Source: SC Magazine  $ average cost of processing a single help desk call Source: Compulenta

Corporate Information Security Biometrics: Efficient & Reliable  Identification of a person, not of a password, token or card  Intuitive & easy to use technology  Non-repudiation of biometrically confirmed actions  Users do not have to know or remember passwords  No password sharing

Corporate Information Security Integration CorporateData AD Integration Shared Resources Workstations VPN Physical Access Applications T&A Internet

Corporate Information Security IDenium Purpose  Safeguard data against unauthorized access  Replace a vulnerable password system with biometric IDs

Corporate Information Security IDenium Functions  User Access Control  A fingerprint is a single key to network data, applications, & Internet  Secure Standby & screensaver modes  Support for Windows & Novell  Logging Access Events

Corporate Information Security IDenium Functions  Centralized User Management  One-time enrollment of users & credentials  Domain controller interaction  Network access from any network PC

Corporate Information Security Architecture User Account of a Specific Application Novell User Account Windows User Account CITRIX User Account Workstations Windows Domain Controller Applications & Web-applications Workstations and/or Clients CITRIX Server Novell Server Workstations Identification of Windows Users User Identification in Applications Identification of CITRIX Users Identification of Novell Users

Corporate Information Security IDenium for AD Windows Domain Controller Workstation 1234 Identification Server Microsoft Windows AD Database 1 Digital Fingerprint Template 2 Data Required for User Authentication 3 4 Synchronization

Corporate Information Security AD Integration IDenium is fully integrated into Active Directory (AD):  Centralized storage, protection & transfer of user ID data via AD tools  Centralized user rights management  BioLink tabs in ADUC BioLink - Enroll Tab

Corporate Information Security IDenium Components  Client SW  IDenium Windows Logon  Password Vault  Admin SW  Admin Pack  Synchronization Agent  Password Changer

Corporate Information Security IDenium Windows Logon  Verifying user identity when logging on to the OS or applications  User verification in other applications compliant with IDenium Windows Logon & Authenteon Server  Workstation unlocking by a fingerprint Workstation Unlocking

Corporate Information Security Password Vault  Replacing passwords with biometric IDs in applications & Internet  Script recording to replace a password  Several scripts for an application  Automated script execution upon successful fingerprint identification List of Scripts

Corporate Information Security Admin Tools  Admin Pack  Centralized enrollment of users & fingerprint data  Setting-up identification policies & other administrative tasks  Synchronization Agent  Synchronization of AD catalogue data & biometric ID data stored on Authenteon

Corporate Information Security Admin Tools  Password Changer  Generation of random passwords  Attaching new passwords to relevant user accounts & biometric IDs  Admin-defined generation frequency  No access to unauthorized users by stolen passwords

Corporate Information Security IDs Enrollment “Windows Security” window for users to enroll their fingerprint identifiers  Biometric IDs can be enrolled while adding a new user account in AD - when hiring a new employee, at administrator’s workplace.  Biometric IDs can be enrolled by users themselves at their workplaces when deploying IDenium.

Corporate Information Security Selection of Identification Policies Selecting an Identification Policy  User identification only by fingerprints is recommended for most users  User identification by a fingerprint OR password is recommended for administrators and security staff  Two-factor identification by a fingerprint AND password is recommended for the most sensitive data

Corporate Information Security Customization & Management Options Окно настройки сервиса IDenium Settings window  Add users (or user accounts), edit properties & delete  Enable/disable ID data caching  Hide the actual fingerprint image while scanning  Generate random passwords for Windows user accounts

Corporate Information Security Identification Servers  BioLink Authenteon  Software-and-hardware server  Hot swappable  Unlimited number of users  BioLink Authenteon Software Appliance (ASA)  Software server for MS Windows  Number of users – up to  Scalable

Corporate Information Security Biometric Scanners Scanning MethodOptical Scanning Window Size25.5 x 18 mm Scanning Speed15 fingerprints per second Resolution508 dpi False Acceptance Rate (FAR) (1 out of ) InterfaceUSB 2.0/1.1, Plug&Play, 2 m cable included

Corporate Information Security Biometric Scanners  Compact & ergonomic  Cost-effective & durable  Quickly attached to a computer  Ready for operation upon installation of BioLink IDenium  Used to secure corporate networks & stand-alone PCs

Corporate Information Security Biometric Scanners BioLink U-Match BioLink U-Match USB Scanner for Office Use  Dimensions (length x width x height): 45 x 63 x 26 mm  Weight: 120 g BioLink U-Match BioLink U-Match USB Scanner with a Card Reader  Supported smart card standards: ISO 7816, EMV 2000  Smart card power supply: 5 V, 3 V & 1.8 V  Transmission speed: up to 119 Kbps  Card type detection: automatic

Corporate Information Security IDenium Benefits  Data security increase  Cost-effectiveness  Scalability  Fault-tolerance  Ease of use

Corporate Information Security Data Security Increase  Reliable, accurate & quick user identification by distinct parameters  Eliminated threat of identification by lost/stolen identifiers  Multi-factor identification for sensitive data  Integration options for logical & physical access & T&A systems

Corporate Information Security Cost-Effectiveness  Faster access to protected resources  Biometric IDs never fail  Reduced admin load  Decreased access infrastructure management expenses

Corporate Information Security Scalability  Unlimited number of users  Server clusters & load balance options  Centralized installation & management  Seamless integration into legacy corporate systems

Corporate Information Security Fault-Tolerance  Hot swappable biometric ID servers  Data replication options  Local cache options in case of failed LAN

Corporate Information Security Ease of Use  One-time enrollment of users’ biometric data  Identification by any enrolled fingerprint  A fingerprints is a single key to resources & applications  User-friendliness

Corporate Information Security CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control Thank You!