Download presentation
Presentation is loading. Please wait.
1
Secure Skype for Business
V6.6
2
Security Challenges Connecting external devices through Skype for Business to the corporate network raises security risks related to Authentication, Network and Content breaches. SkypeShield is a leading innovative security solution for these issues
3
End-to-End Security Assurance
Secure Authentication Simple and secure TFA based on device as second factor. Protect SfB & Exchange EWS Device Access Control Manage which devices can connect using device enrollment process Network Account Lockout Protection Prevent Account lockout issues in DDoS attacks through multiple UC channels
4
End-to-End Security Assurance
MDM Conditional Access Verify only devices that are managed by MDM and compliant with security policy can connect Credential Protection Prevent network password theft by using app specific credentials instead of domain credentials Ethical Wall - Functional control Granular policy for all activities (IM, File sharing, presence etc.), controlling external (Federation) and internal traffic
5
End-to-End Security Assurance
Application firewall Sanitize and validate all anonymous traffic requests in the DMZ before entering the network DLP – Content Inspection Inspect content passing through Skype for Business by DLP (Data Loss Prevention) policy rules RSA integration Use RSA authentication code instead of domain password
6
End-to-End Security Assurance
Disclaimer Display disclaimers for internal and external users based on domains eDiscovery Advanced search export and modify dashboard for Skype for Business Archiving DB Risk Engine Coming soon…
7
Features in depth
8
Secure Authentication/TFA
Blocking any request received in network servers unless coming from an approved device Matching device and user based on endpoint ID sent by client Several registration/enrolment options are available to enforce access control policy Protects both Skype for Business & Exchange (EWS)
9
Device Access Control Three Level enrollment Options Play Play Play
Admin Manual enrollment Admin management of user list using training mode and rejected auditing list Play Self Service/Two Step Registration Internal site registration and additional sync within a defined time frame to complete registration Play Automatic Registration Device ID is registered upon first use of account Play
10
Two Step Registration
11
Secure Authentication
12
Product Architecture - Bastion Proxy
As part of the solution SkypeShield offers the dedicated reverse proxy Bastion developed by AGAT. The SkypeShield filters are plugged into Bastion to extend access control and content filtering capabilities: Cross-platform - Windows/Linux Scalable Event - Driven Architecture (Supports HA) Highly efficient asynchronous architecture SSL termination Geared towards full-featured HTTP filtering Can publish multiple servers in parallel/multi channels Can be implemented in conjunction with generic products such as F5, Netscaler, Barracuda and more
13
TFA+ Access control Main features
View approved & blocked devices Restrict registration and ongoing connection by IP range Access Rule black/white list Filter by device type & OS Allow/Block Web app login Define number of devices per user Require re-authentication by time -Session termination Disable save password on client Registration policy (Two steps/ Manual/ Automatic)
14
General Capabilities Multi LDAP support (for HA & distributed implantation) Support of Multi level admin management Web service for external event to lock/approve device/user House keeping service - AD sync, cleanup, notification Auditing, logs, event viewer Reports & Search
15
Access Portal Reports Authentication Devices Failed logins
Security Auditing Failed logins
16
Network Account Lockout Protection
Account Lockout Occurs When: Password Change Username Hack Network Attacks User changed the Active Directory password, but did not change the settings on the device The username (without the password) discovered by a hacker who tried to log in several times DDoS, Dos, brute force attacks - Such attacks can result in network becoming unavailable The challenge: Multi protocol – HTTPS/SIP Multi method – Basic, NTLM, SOAP Multi channel – Sign in, meeting, web API, Exchange Multi Locations – EMEA, US, APAC
17
Network Account Lockout Protection
All failed login are audited Activate Soft Lockout in DMZ when attack detected Unified defense Solution protecting all protocols, methods and channels Device pre authentication Only authentication request coming from registered device will reach Active Directory
18
Application firewall Solve security risks rising from anonymous traffic entering the network without inspection Security layers: Protocol Level Sanitization Application data validation (meeting ID) Session termination and requests rewrite
19
MDM integration MDM Conditional Registration - Limit the registration only to managed devices (with MDM) - supported with all MDM vendors in the market MDM Conditional Access - Ongoing validation that device is managed and has not become Out Of Compliant (OOC) as defined in the MDM vendor - supported with leading vendors
20
MDM Conditional Registration
Skype Shield can limit the registration of SfB to managed devices only – devices with MDM Compatible with any MDM solution supporting one of the following capabilities: WIFI access control Application management (MAM) VPN triggering / control Compatible with all MDM vendors in the market
21
MDM Registration Using Wi Fi
22
MDM Registration Using SkypeShield App
Play movie
23
MDM Registration Using VPN
24
MDM Conditional Access
Automatically and immediately block SfB access for devices that: Have become Out Of Compliance Removed from MDM control Available for: MobileIron AirWatch MaaS360 XenMobile GOOD (soon for BES12)
25
MDM Continuous Verification Topology
26
Ethical Wall Solves ethical and compliance regulations, security and data protection issues controlling both Federation with external companies Internal communication between different groups
27
Sample policy Chat File transfer Chat File transfer
Company domain External Domain A Chat File transfer Bob (Group A) Chat File transfer Alice (Group B) Block all communication All other groups
28
Ethical Wall- Federation & Internal
Rule Condition Rule Policy
29
Ethical wall rules
30
Ethical Wall dimensions
Control specific modalities: Build rule based on Active directory groups External/Internal domain External/Internal SIP In contact list - Present program - Presence - IM - File transfer - Contact card - App sharing - PowerPoint sharing - Audio - Video - Conferencing - Present desktop
31
Ethical Wall- notification
IM user notification of Ethical wall activity/policy Activity auditing registration - table, logs and admin notifications External user is unable to reach you External user unable to see your presence User blocked from a specific operation
32
Ethical Wall Topology
33
DLP Engine Server side solution inspecting content passing through any channel
34
Social Security Numbers
DLP Engine Content policy rules based on content such as: Actions – Block, Mask, Notify Group membership based rules Commercial DLP integration with Symantec, Websense and any standard ICAP interface DLP engine Social Security Numbers Credit Card Numbers ID Numbers
35
DLP Notification Sample
Play movie
36
Active Directory Credential Protection
A new approach in protecting the Active Directory credentials Connect using App dedicated Skype credentials Eliminate risk of domain password theft No storage of Active Directory passwords on server or device Supports Exchange & Skype with one App credentials
37
Active Directory App login
Creating dedicated Skype credential on a self service internal web site for use on the device, instead of Active Directory credentials. Play movie
38
SkypeShield Credentials Architecture
39
Mobile Smart Card Solution
Network login without username and password for Active Directory With the dedicated login solution, the user logs into the Access Portal Authenticates to the network computer using a smart card Creates a dedicated password for use on device
40
RSA integration Strong TFA Avoid using domain credentials
Users enter their RSA Token authentication code instead of Active Directory password SkypeShield verifies password against RSA Authentication Manager and impersonate user against Skype
41
Disclaimers rules Set disclaimer for internal and external (federated or guests ) based domain
42
Disclaimer types Different disclaimer types:
Internal User Client -Presented to the internal user in the SfB client every time a new conversation/conference has started. Invite To External Conference - Sent as IM to internal user when he was invited to an external conference. IM Conference - Sent as IM once a user has joined the conference. IM Conversation - Included with the first IM message sent while the communication is a conversation (one on one)
43
eDiscovery Data governance
Advanced search by text, user, dates and more Meet with compliance and GDPR Search for personal information Delete personal information Export user data
44
eDiscovery
45
SkypeShield Roadmap Skype online (365) (Cloud Security Access Control)
Device access control Content filtering (Federation & DLP) Skype for Business Authentication risk engine Security alerts and action based on geolocation information and behavior profiling
46
Risk engine – geo location map
47
SkypeShield Roadmap DLP File inspection
Anti virus & anti malware integration - Files, SIP & IM Soft token TFA Authentication Based on Google authenticator/Azure authenticator
48
AGAT Products - Overview
AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions. AGAT’s product suite handles security threats related to password and identity theft as well as data and network protection. Utilizing this expertise, AGAT developed SkypeShield to secure Microsoft Skype for Business (Lync) external connectivity. with specific unified communication (UC) requirements. AGAT also offers mobile browser and digital signature mobile apps that integrate with Bluetooth card readers enabling mobile connectivity with PKI smart cards.
49
Integrated/Partnered Technologies
Infrastructure EMM/MDM Data leak Prevention Microsoft MobileIron McAfee F5 networks ForcePoint VMWARE AirWatch Citrix IBM MaaS360 Symantec PKI BlackBerry GTB Faitien Authentication Citrix XenMobile Google authenticator Gemalto RSA secureID
50
Review product documents:
Learn more Review product documents: SkypeShield presentation SkypeShield datasheet Skype for Business Security Threats SkypeShield product page Visit our website at Contact us:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.