Download presentation
Presentation is loading. Please wait.
Published byJoy Tucker Modified over 8 years ago
1
1 © Copyright 2015 EMC Corporation. All rights reserved. RSA SecurID Update {Rep Name}
2
2 © Copyright 2015 EMC Corporation. All rights reserved. Multi-factor Auth Entitlements Collections Roles Reviews Request Single-Sign On Federation Policies Fulfillment Governance Certifications Authorization Driver: Secure AccessDriver: Achieve Compliance
3
3 © Copyright 2015 EMC Corporation. All rights reserved. Multi-factor Auth Entitlements Collections Roles Reviews Request Single-Sign On Federation Policies Fulfillment Governance Certifications Authorization Driver: Secure AccessDriver: Achieve Compliance Via Access Via Governance Via Lifecycle
4
4 © Copyright 2015 EMC Corporation. All rights reserved. Via relies on context, not just static rules And adapts to constantly changing environments Via is business-driven so informed decisions keep it in lock-step as the business evolves Via enables comprehensive visibility across traditional silos, providing greater insight into how users and information interact Via delivers consumer levels of usability Making lives easier for end users while enabling the business Introducing RSA Via The SMART Identity Solution that protects from endpoint to cloud Via Access Via Governance Via Lifecycle
5
5 © Copyright 2015 EMC Corporation. All rights reserved. RSA SecurID RSA Authentication Manager 8.x
6
6 © Copyright 2015 EMC Corporation. All rights reserved. Tokens are hard to manage Need to embrace mobile New and emerging threats Users don’t want “another device” Smaller security teams, but more users Users want choice & better experience Need to ‘feed’ into broader IT env Common Challenges That We Hear
7
7 © Copyright 2015 EMC Corporation. All rights reserved. RSA SecurID / Authentication Manager 8 AM8 Compelling New Features –Risk-Based Authentication lowers authentication costs –Virtualization better control at lower cost; –Mix & Match between Virtual and/or Physical Appliance –Self Service & Admin Dashboards lowers TCO –Software Token Provisioning improves by 57% Proven High Quality Release AM Prime Suite – Advanced Token Lifecycle Management Solutions Archer Focused Solutions (Reporting) Software Token 2.0 Improves User Experience AM8.0 (Virtual Appliance) GA in Mar, 2013 AM 8.1 (Hardware Appliance) GA in Dec, 2013 AM 8.1 SP1 GA in Dec, 2014
8
8 © Copyright 2015 EMC Corporation. All rights reserved. Choice of Authentication RSA Risk Based Authentication Hybrid Smart Card On-Demand Hardware Authenticator Software Authenticator All major devices Easy install on device QR Scanning Easy Deployment NO lost tokens Trusted form factor Controlled life Ease of use Life time warranty No device foot print Temp workers SMS or Email NO lost tokens USB connection OTP + KPI Controlled life Lifetime warranty
9
9 © Copyright 2015 EMC Corporation. All rights reserved. RSA Authentication: Choice Broad range of solutions to meet the needs of an increasingly diverse user population On-Demand PC / Web Browser Portable Devices Embedded Solutions Fob / Card Token Hybrid Smart Card Risk-Based TokenlessSoftware TokensHardware Tokens AdministratorsRoad Warriors Internal Employees Contractors Part-Time EmployeesPartners Infrequent Users Frequent Users Customers
10
10 © Copyright 2015 EMC Corporation. All rights reserved. Software Tokens in AM 8.x Business and Security Benefits Ultra-secure distribution method No security information is stored/transmitted across networks Token ‘seed’ values are generated dynamically during install Trust Token provisioned via direct exchange with device Device attributes (‘ device biometrics’) are captured from mobile device Resultant Device ID used as factor during authentication. Device IDs are recorded in auth event logs Security Enforcement Everything electronic, licenses can be re-distributed No manual processes required – can be automated Enables wider use of tokens, to enhance more services User-friendly – no “tech knowledge” to install/use Confidence
11
11 © Copyright 2015 EMC Corporation. All rights reserved. Software Token Provisioning Dynamic seed provisioning, easier and more secure RSA Authentication Manager DMZ Soft token CT-KIP service Soft Token Server CT-KIP Provisioning Self-Service Console RSA Web Tier Token lifecycle workflow (customisable) URL-based token activation (QR code optional) Token distribution options Email URL + activation code Filebased methods (file/email) QR code (email/web)
12
12 © Copyright 2015 EMC Corporation. All rights reserved. Web Tier and Software Tokens Or… providing auth to more people, more securely RSA Authentication Manager Security Convenience Visibility Token seeds are dynamicEasier, friendly provisioning Mobile Device ID : attributes are scanned, collected and hashed DMZ Soft token CT-KIP service Automated : No admin effort AttributeValue UsernameBrett IMEI, serial, etc.Collected, hashed Device IDCryptographic hash Soft Token Server CT-KIP Provisioning Device ID recorded during auth Seed info never sent via network User self-service option Option - tokens can be locked to single device Self-Service Console RSA Web Tier
13
13 © Copyright 2015 EMC Corporation. All rights reserved. The RSA Risk Engine Proven, sophisticated risk engine – Protecting more than 350 million online identities today – Dozen of characteristics used to calculate the risk associated with each authentication Optimized for the enterprise organization Self learning so it adapts to your user population over time Plug-and-play integration building upon existing SecurID agents RSA Risk Engine
14
14 © Copyright 2015 EMC Corporation. All rights reserved. Risk-Based Authentication How it works Web Browser RSA Risk Engine Device Profile User Behavior Profile PASS FAIL Protected Resources PASS RISKY Identity Challenge ?? On-Demand Tokencode Challenge Questions Access Denied SSL VPN OWA SharePoint Web Portals Authentication Policy Assurance Level Activity Details
15
15 © Copyright 2015 EMC Corporation. All rights reserved. Mobile/Cloud As of 2015, # of mobile devices outnumber humans User perception and ease-of-use become critical components of the authentication story Android is the market leader in smartphone adoption Cloud-based app adoption predicted to increase to 80% of organizations Risk-based Traditional rules-based models are proving less effective Risk-based approaches can take into account more data points with more decision points Authentication becomes no longer a binary decision, which is good Provides effective security without sacrificing user experience Multifactor Being “channel agnostic” (mobile, tablet, virtual, desktop) Biometrics and multi-factor auth adoption is becoming a key trend in increasing enterprise security Additional “Factors’ : Voice, Facial, Biometric, Behavioural, Location- aware, Contextual Final : Key Trends beyond 2015
16
16 © Copyright 2015 EMC Corporation. All rights reserved. Hardware One-Time-Passwords RSA SecurID 700 RSA SecurID 800 No-Hardware OTP Risk-based Authentication Software Tokens On-Demand Tokens Smartcards/PKI RSA Certificate Manager RSA SID800 (USB smartcard) Integration SDKs Mobile soft token apps (Android, iOS) Identity Federation (SAML) RSA Federation Manager RSA Via Access RSA Agent for AD Federation Services Risk Based-Authentication Authentication Manager 8 Adaptive Authentication Biometrics RSA Via Access Infrastructure SecurID Authentication Engine SecurID Auth Manager Prime Providing the “Right” Solution (Breadth)
17
EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.