Welcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности
|
|
- Griselda Washington
- 5 years ago
- Views:
Transcription
1 Welcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности
2 Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions
3 What a great world
4 Today's World Internal people Branch Offices PDA Users Remote Users 3 rd Party Access Users and their workspaces SaaS Apps Cloud Applications
5 Virtual Word With Virtual Back Doors Welcome to the Future Cloud Computing Virtual Environment With Virtual Security holes During the past 15 years with learnt nothing
6 We have forgotten Confidentiality Integrity We have not learnt a thing? Availability Accountability Auditability
7 Welcome to the 3rd Age of Hacking 1 st Age: Servers Servers FTP, Telnet, Mail, Web. These were the things that consumed bytes from a bad guy The hack left a foot print 2nd Age: Browsers: Javascript, ActiveX, Java, Image Formats, DOMs These are the things that are getting locked down Slowly Incompletely 3rd Age: Mobile devices: Simplest & getting easier Target the mobile devices to gain someone's password is the skeleton key to their life and your business Totally invisible no trace
8 Password Attack Welcome to the Future of Hacking Attack channels: web, mail, open services Targeted attacks against users and business and or premium resources Password attack is totally invisible to you Mobile devices are becoming an easy target for Advanced persistent threats (APT)
9 During the Past 7 Days 9
10
11 Verizon s annual Data Breach Quoted from the report:..so, it really comes as no surprise that authentication based attacks (guessing, cracking, or reusing valid credentials) factored into about four of every five breaches involving hacking in our 2012 dataset % of the breaches in our 2013 report took months or even years to discover (62% months, 4% years).
12 Probe requests Live Attack A g a i n s t y o u r V i r t u a l W o r l d.... A R P A t t a c k Probe requests www
13 Protect Everything with SAS Tokens & Users Public Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active Directory Agent Private Cloud Services SAML SAML Corporate Network LDAP / Active Directory Application Hosting Corporate Network Online Storage Collaboration Tools Administrator LDAP / Active Directory 13
14 SafeNet Authentication: Provides the ability to rapidly scale, deploy authentication Simple, easy and low-cost, driving strong authentication into all markets The most powerful enterprise authentication server in the market Offer a multi-tenant, multi-tier authentication platform that allows an almost infinite number of virtual authentication servers for you business
15 More than Authentication Automate Service Delivery - features include a policy engine that can automatically provision, suspend or revoke tokens based on changes in the user repository Scheduled Automated Usage - Audit and Billing Reports Branding - You can brand everything - Self-service, enrolment and messaging services. Token Selection - The widest range of authentication token options
16 More than Authentication Security - Customers can define their own security controls and policies Multi Tenant - The only true Multi Tier platform in the world Multi Tier - manage centrally or fully devolve all administration Service Alerts - Full Automation of user and administrator alerts API - Detailed API sets for authentication and administration Open platform Every enterprise is different full customisation to meet your needs
17 Multi-Tenant Multi-Tier Overview Multi-tenant architecture Scales to thousands of business units Unlimited numbers of users per business unit Manage multiple business units from one centralised interface Unlimited numbers Supports multiple domains Secure Only view one level down Isolation & Access Control Delegated management for lower tiers Deliver enhanced service wrappers Great for multi-region networks Inherit capabilities to lower level SMS / SMTP gateways Branding Delegated Managed Subscriber Subscriber A Virtual Service Provider Subscriber B Enterprise Subscriber (Virtual Service Provider) Region 1 Region 2 Region 3
18 Multi-Tenant Multi-Tier Multi-tenant architecture Unlimited Domains None Directory stores Localisation Automation User fulfilment Provisioning, Enrolment etc User Self healing Reports Secure The ability to Manage clients if rights granted by Client Branding and region Adding of custom SMS Gates Everything can be fully Branded Features Meets all markets requirements Your Enterprise Division 1 Division 2 Division 3 Division 4 Regional Office Helpdesk HR
19 Flexibility and Customisation Language - by region or Admin Alert messages including language SMS Gateways - by region Branding - Even by region or business unit OTP policy - Even by region or user base User experiences Role Management Reporting Pretty much everything Even the service you would like to offer
20 Example Flexibility SAS offers full automation, including: Token provisioning Security rules definition engine Once created rules applied automatically Alerts SAML service registration Self enrolment Self service Reporting Reporting and Alerts Self- Enrollment LDAP Changes Auto Update SAS Auto- Provision User
21 User Directory Sources SafeNet supports any user store via a sync agent Corporate Network SQL, LDAP, AD,ODBC, Lotus, Novell, anything (via custom field mapping) No schema change Non intrusive/read only Multiple domains No hardware required Encrypted transmission of data LDAP / Active Directory / User Source Corporate Network LDAP / Active Directory / User Source Corporate Network Users can also be bulk imported via.csv files and / or created locally LDAP / Active Directory / User Source
22 Unified Authentication Platform Custom 22
23 Widest Choice of Tokens Authenticators for every user type and an increasing focus on commoditisation Multi Platform H/W BlackBerry ios OSx Android Microsoft Microsoft SMS Java USB Grid Authenticators that: Don t expire Seed keys can be owned by the subscriber Can be easily re-assigned to new users Easy deployment saves cost and time A token can be included in the service charge
24 Token Choice Choose the right token type for each user: Phone based Software Multiple hard tokens Tokenless either SMS or Grid based Our Authenticators: Don t expire Can be included in the service charge Seed keys can be generated by the customer Can be re-assigned to new users Self enrollment options reduces administration OTP & PIN complexity defined by the customer Provides the lowest overall total cost of ownership Supporting 3 rd party tokens enables an orderly and cost effective migration 24
25 Self Service Customizable Icons Colors Services Multi-language Request Token Approve, Issue, Ship workflow Self-service API (WSDL) Build into existing portals
26 User Aliases User has multiple IDs 1 UserID + up to 2 Aliases All can use the same token(s) Allows for different privileges with only 1 token UserID: Bill UserID: SysAdmin UserID: Billy Standard User Applications Finance Servers Enterprise Resources Router & Server Management
27 Security Hardware HSMs Support All token seed records encrypted and protected by HSM All encryption/decryption executed internally by HSM Data center to data center failover
28 SAML Single Sign on Single Sign-on Authentication at one allowed SAML site access to all allowed sites Logoff at one allowed site, logged off at all allowed sites UserID: Bill SAML Assertion SAML Assertion Password: OTP SAML Assertion bill
29 SafeNet Authentication Architecture SafeNet Authentication Service SafeNet Authentication DataCenter DataCenter SMS via HTTP(S) User Repository Portals Group Subscriber Agents LDAP Synch Token Repository Engines Security Policy Authentication via SMTP Internet SMS Gateway (Subscriber or SP selected) User Self-Service Migration Provisioning Self-Enrolment Solutions Reporting/Alerts SMS message Virtual Server Management & Admin Reports & Alerts User service requests User information Migrations Agent SAML Authentication Request Radius Authentication Request Authentication Request Agent Administrator Tokens Users User Repository Existing RADIUS Server Access Devices Agents 29
30 Global Trends as-a-service is Accepted by Customers Authentication-as-a-Service is HOT! Gartner predicts that, by 2017, more than 50% of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementations, up from less than 10% today. Gartner MQ for User Authentication, 2012 $13bn by 2015, with 47% in North America Source: The 451 Group Cloud Computing Market Monitor, August 2012 SAS is absolutely the hottest product! 30
31 Leaders in the Market Gartner ranks the top of the Leader s Quadrant 31
32 Facing challenges you can t address? SaaS applications VPNs More users to protect: employees, partners, contractors More data and applications to protect Virtual Environments Web-based portals More end points being used
33 1] CONTROL: It is complex to set up, and hard to implement 33
34 The real world 34
35 2] AUTOMATION: Difficult and time-consuming to re-provision existing users, and enrol new users 35
36 3] CHOICE: Only one token choice per user, and can t use existing authentication tokens during the migration 36
37 4] TCO: hidden service & maintenance costs and high upfront infrastructure costs 37
38 TCO 38
39 Pricing! It s all about total cost of operation Includes internal costs Simple per user per year model, MP tokens included, no extras Opex or Capex models Automate everything - massively reduces administration costs
40 Summary Fully Automated Authenticate Your Way Migrate Easily Protect Everything & Everyone Lower TCO
41 Спасибо
Busting the top 5 myths of cloud-based authentication
Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility
More informationSafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service. Marko Bobinac PreSales Engineer CEE, Russia & CIS
SafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service Marko Bobinac PreSales Engineer CEE, Russia & CIS Agenda SafeNet introduction Introduction to Authentication
More informationEVOLVING FROM BREACH PREVENTION TO BREACH ACCEPTANCE TO SECURING THE BREACH
EVOLVING FROM BREACH PREVENTION TO BREACH ACCEPTANCE TO SECURING THE BREACH Jason Hart CISSP CISM VP Cloud Solutions Safenet Inc Session ID: Session Classification: SP0-W10 General Interest Today s issues
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationStorage Made Easy. Mirantis
Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationSharePoint 2019 and Extranet User Manager
SharePoint 2019 and Extranet User Manager Tuesday, June 5, 2018 12:00-1:00 PM http://eum.co (#) Agenda Introductions SharePoint 2019 Announcements SharePoint On Premises Extranets EUM Features and Licensing
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationSAS Administration Guide. Version /mar/13
Administration Guide 10/mar/13 Table of contents 1 References......... 4 2 Introduction......... 5 3 overview......... 6 4 management portal......... 9 4.1 Access... 9 4.2 Account Manager view... 10 4.3
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationMB Microsoft Dynamics CRM 2016 Online Deployment.
MB2-710 Microsoft Dynamics CRM 2016 Online Deployment Getting Started Overview CRM Online is a cloud-based offering of Microsoft Dynamics CRM The licensing is a subscription-based model with a monthly
More informationThe only authentication platform you ll
The only authentication platform you ll ever COVER need. The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationNews and Updates June 1, 2017
Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk
More informationIBM Tivoli Identity Manager V5.1 Fundamentals
IBM Tivoli Identity Manager V5.1 Fundamentals Number: 000-038 Passing Score: 600 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ IBM 000-038 IBM Tivoli Identity Manager V5.1 Fundamentals
More informationOverview What is Azure Multi-Factor Authentication? How it Works Get started Choose where to deploy MFA in the cloud MFA on-premises MFA for O365
Table of Contents Overview What is Azure Multi-Factor Authentication? How it Works Get started Choose where to deploy MFA in the cloud MFA on-premises MFA for O365 users Security best practices How to
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationVSP18 Venafi Security Professional
VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:
More informationProviding an Enterprise File Share and Sync Solution for
Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationThe only authentication platform you ll COVER. ever need.
The only authentication platform you ll COVER ever need. The power of knowing is an incredibly powerful thing. Knowing that you can access your data whenever, wherever and however you want. Knowing that
More informationTotal Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER
Total Cost of Ownership Overview vs OneLogin WHITEPAPER Are you really going to double down on machines, software and professional services to extend Active Directory (AD)? Executive Summary Are you planning
More informationEmbracing the Phone as a Token What You Need To Know Andy Kemshall Co-Founder
Embracing the Phone as a Token What You Need To Know Andy Kemshall Co-Founder What is 2FA? Setting the scene We use it every day ATM - Chip and PIN Two Factor is? Something you own - ATM card Something
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationInterCall Virtual Environments and Webcasting
InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT
More informationPulse Workspace Appliance. Administration Guide
Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse
More informationTREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
More informationMiddle East Partner Summit
Middle East Partner Summit 1 Title 19.04.17 Gemalto Authentication & Identity Protection Strategy What s in there for you? Jeremy Tomlin 18th April 2017 SafeNet Authentication Service Jeremy Tomlin SAS
More informationAre You Flirting with Risk?
Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
ADV1591BU Delivering Virtual Desktops and Apps via the Digital Workspace with Workspace ONE and VMware Horizon VMworld 2017 Content: Not for publication Peter Bjork @thepeb & Matt Coppinger @mcopping #VMworld
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationCrash course in Azure Active Directory
Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.
More informationSafeNet HSM solutions for secure virtual amd physical environments. Marko Bobinac SafeNet PreSales Engineer
SafeNet HSM solutions for secure virtual amd physical environments Marko Bobinac SafeNet PreSales Engineer Root of trust for your physical and virtual environment 2 But HW doesn t work in a Virtual World?
More informationPublic. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2
Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...
More informationVMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2
VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationJay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM blog.mir.
Jay Ferron CEHi, CISSP, CHFIi, C)PTEi, CISM, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM jferron@interactivesecuritytraining.com blog.mir.net A comprehensive identity and access management cloud solution
More informationRSA Authentication Manager 8.2
RSA Authentication Manager 8.2 Over 25,000 customers 50 60 million active tokens in circulation 10 million units shipped per year More than 50% market share RSA Ready Partner Program: 400 Partners with
More informationSecret Server Demo Outline
Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during
More informationDeploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE
Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationAre You Flirting with Risk?
Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}
More informationManageEngine ADSelfService Plus
Comparison Document ManageEngine ADSelfService Plus Vs Azure AD Self-Service Password Reset (SSPR) ManageEngine ADSelfService Plus vs. Azure AD Self-Service Password Reset (SSPR) Password reset tickets
More informationIdentity & Access Management
Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY
More informationStorage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3
INVESTOR NEWSLETTER ISSUE N 3 Storage Made Easy Providing an Enterprise File Fabric for STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR OPENIO Storage Made Easy (SME) File Fabric is a comprehensive Enterprise
More informationWatchGuard Cloud Release Notes
WatchGuard Cloud Release Notes Latest WatchGuard Cloud Update: 15 November 2018 Release Notes Revision Date 15 November 2018 Introduction WatchGuard Cloud allows you to see and manage all your products
More informationCitrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand
Workspace Lausanne 09.03.2017 Laurent Strauss Christophe Beaugrand WorkspaceSuite Improve employee productivity Deliver a high performance user experience Empower entire workforce Secure enterprise content
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationExtranets in SharePoint and SSO for Claims Apps. January 18, 2017
Extranets in SharePoint and SSO for Claims Apps January 18, 2017 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca
More informationTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach Multi-factor Authentication Layer v.3.2-010 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
More informationCSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationYubico with Centrify for Mac - Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationCyber Security Updates and Trends Affecting the Real Estate Industry
Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationBest Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter
White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents
More informationSecuring ArcGIS for Server. David Cordes, Raj Padmanabhan
Securing ArcGIS for Server David Cordes, Raj Padmanabhan Agenda Security in the context of ArcGIS for Server User and Role Considerations Identity Stores Authentication Securing web services Protecting
More informationVMware AirWatch Android Platform Guide
VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationIntegration Guide. SafeNet Authentication Service (SAS)
Integration Guide SafeNet Authentication Service (SAS) Revised: 10 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating
More informationEvolution Of The Need For IAM. Securing connections between people, applications, and networks
Evolution Of The Need For IAM December 2006 Evolution Of The Need For IAM Identity issues are nothing new Who steals my purse steals trash / But he that filches from me my good name / Robs me of that which
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More information#1 Enterprise File Share, Sync, Backup and Mobile Access for Business
#1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 Best ROI in the Industry Lower cost, higher value, free unlimited partner accounts 2 4 Site Sandbox 7 The Best Return
More informationWhat is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee
What is orbac? orbac orbac (opns Role Based Access Control) is a IT security solution that enables a structured, centralized, hierarchical and delegated management of IT privileges. orbac is based on the
More informationExternal Collaboration with Office 365 Project Sites. September 16, 2015
External Collaboration with Office 365 Project Sites September 16, 2015 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
ADV1591BE Delivering Virtual Desktops and Apps via the Digital Workspace with Workspace ONE and VMware Horizon VMworld 2017 Content: Not for publication Johan van Amersfoort & Stephane Padique #VMWORLD
More informationBusiness White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise
Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationA Practical Step-by-Step Guide to Managing Cloud Access in your Organization
GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationUnlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.
Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded
More informationMcAfee Security Management Center
Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationBlackBerry 2FA. Datasheet. BlackBerry 2FA
Datasheet BlackBerry 2FA BlackBerry 2FA The Challenge: Critical enterprise systems especially cloud services are more exposed than ever before because of the growing threat of cybercrime. Passwords alone
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More informationExecutive Summary Spear 150 Spear Street, Street, Suite 1400, San Francisco, CA CA
Executive Summary As a collaboration suite, Google Apps contains some of the most sensitive business data of any IT system. Everything from emails, contracts, product designs, customer lists and more can
More informationEnterprise Product Guide
Enterprise Product Guide BlackBerry Enterprise Software April 2018 Published: 2018-06-06 SWD-20180606124626584 Contents BlackBerry enterprise products... 5 The BlackBerry Infrastructure...6 BlackBerry
More informationBlackBerry Enterprise Identity
Datasheet BlackBerry Enterprise Identity The Challenge: Cloud services are critical in today s enterprises, yet a reliance on the cloud comes with real and growing security risks. Enterprises want a simple,
More informationEdge Device Manager R15 Release Notes
2017-03 Software releases are created to add new features, make enhancements or correct defects. These releases are tested on all current, actively shipping platforms and operating systems as applicable.
More informationDatasheet. Only Workspaces delivers the features users want and the control that IT needs.
Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationHackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm
whitepaper Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm When your company s infrastructure was built on the model of a traditional on-premise data center, security was pretty
More informationSimplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce
Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Michael Marfise Sr. Director, Product Management Yann Gaucher Sr. Director, Product Management Endpoint Protection
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationNull Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager. February 2018
Null Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager February 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More informationGuidelines for Choosing an Advanced Authentication Solution for Accessing Criminal Justice Information System (CJIS) Services
Guidelines for Choosing an Advanced Authentication Solution for Accessing Criminal Justice Information System (CJIS) Services whitepaper Contents Introduction... 2 Advanced Authentication in CJIS Security
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationCloud Computing and Its Impact on Software Licensing
Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared
More informationVerizon MDM UEM Unified Endpoint Management
Verizon MDM UEM Unified Endpoint Management Version: 1.0 Last Updated: 3/29/18 Table of Contents Unified Endpoint Management (UEM) Overview... 4 Account Dashboard... 4 Unified Endpoint Management (UEM)
More information