Middle East Partner Summit
|
|
- Wilfrid Stanley
- 5 years ago
- Views:
Transcription
1 Middle East Partner Summit 1 Title
2 Gemalto Authentication & Identity Protection Strategy What s in there for you? Jeremy Tomlin 18th April 2017
3 SafeNet Authentication Service Jeremy Tomlin
4 SAS Cloud by Numbers Q AUTH AS A SERVICE fully-automated authentication service in Gemalto hosted cloud 0 Upfront investment TCO Saving Compared to other solutions 30 60% 400+ Minutes to set-up and deploy Technical integrations 30 + TELCO s 2,500 Global partners 4,217, % Service availability Subscribed users The smallest customer 6 9,200 Total Customer accounts (VS s) 1.08M The largest customer Over 2,000,000 Authentications Processed every day 250 Peak load of authentications processed per second 700+ Number of Authentications per second SAS can process 3,957,931 Subscribed users 12 months ago 62.3M Number of authentications processed in Mar M Number of authentications processed in Mar 2016
5 SafeNet Authentication Service Protects Everything and Everyone, Anywhere
6 SafeNet Authentication Service Authentication Methods PUSH OTP Hardware Software OOB OOB TOKENLESS Grid Maximum Convenience for Low Assurance Needs Maximum Security for High Assurance Needs
7 Automated User Synchronization Synch any user store with SafeNet Authentication Service Periodic synching every 20 minutes Non-intrusive Secure encrypted communications Multi-domain support (e.g. Supports any user store SQL, LDAP, AD, ODBC, Lotus, Novell, Other via custom field mapping Other importation methods CSV File Manual Self Service Management API Integrate user store once, and trigger automated workflows throughout
8 2016 SAS Bookings: On the fast track and accelerating 40M Bookings M M 60% growth Q1 Q2 Q3 Q
9 60% growth... More users per organisation The average percentage of users who currently use two-factor authentication, and the expected percentage in two years time. Currently (2015) Currently (2016) 37.75% 40.49% In two years' time (2015) 51.43% In two years' time (2016) 61.69% 9
10 Why is SafeNet Authentication Service the Best? Multi tier/multi tenant Most applications supported Industry analyst support Flexibility Automation Security Ease of use Easy POC s UK and Canadian DC s Partners Certifications Complete range of tokens Varied billing model Designed for cloud Reputation SLA Simple migration path Self service capabilities All use cases Easy to demonstrate 10
11 MobilePASS+ Push QR code enrolment Biometric PIN 11
12 2016: Revving Up Great service availability Launch of MobilePASS + Push Default Soft Token for Cell phones 60% sales growth in SAS Launch of Context Trusted Network and Device Multi award winning service 12
13 Service surround Monitoring site (tool) Synthetic monitoring. Real time and automated Communications approach Monthly newsletter 13
14 Sales Enablement Usage Based Billing New pricing Model Long live the SAS Quote tool 14
15 Cloud First Strategy Feature parity almost Push and context will not be available in SAS PCE during 2017 Promote SAS Cloud wherever you can Customers will gain more by being on SAS Cloud Plus the potential to use STA if they are on Cloud - easier upsell for you 15
16 SafeNet Authentication Service 2017 Strategic Focus Focus on MobilePASS+ as strategic mobile token MP+ support for Windows Desktops Management console redesign Introduce Push Expand eco-system for Push OTP & Context More SAML integrations, easier to set up New user initiated self-enrollment Context based Authentication Streamline user experience with MobilePASS+ MobilePASS+ for Windows, and SDK Management Console UX Refresh 16
17 SafeNet Trusted Access (STA) Solution Overview
18 3 Ways to think about the Access Management Requirement
19 MFA Market Dynamics The Market is changing quicker than we have seen before More use cases than just VPN 2016 Roadmap delivery helps 19 25% more users deploy MFA for additional applications 1 in 5 organizations deploy MFA for more than 5 applications Convenience Security Improved token-holder experience Push with MobilePASS+ Context: Network, Device
20 Why more use cases? We wanted access from anywhere on any device We added applications We wanted partner access We wanted cloud applications 20
21 Use Cases for Our Customers What do you use SAS to secure? Infrastructure Privileged Access Methods by CyberArk Many backend systems are protected using PAM VPN User remote access to Company network EVO Citrix Remote Desktop Access from outside the Company Customer 1: EMEA Customer 2: NORAM O365 authentication SSO service MFA enabled for step up authentication for sensitive or critical apps SSL VPN for sensitive contracts Applications (Done) Administration applications for upper management (Several Internal Applications) Intellectual Property Lifecycle Management (Memotech ) Document management for product development (Documentum) Business Practice Case Management Company Investigation System Litigation Data Collection Quality Management (TrackWise Sparta Systems) BPOS (MS Exchange) investigation system Customer 3: NORAM NIX PAM, and Appliance OS Windows OS Citrix Applications (Planned) Parts of SAP (including Data Warehouse) Financial Consolidation and Reporting (CEGID) HR documents (includes a SAP extension) (Digital Personnel File from Aconso) 21
22 Imagine what its like to work at one of these companies? 07:58 Connect to VPN generate and use OTP 07:59 Connect to generate and use OTP 08:30 Connect to SFDC generate and use OTP 09:00 Connect to SAP generate and use OTP 09:15 Connect to Legal System generate and use OTP 10:00 Connect to Sensitive M&A System generate and use OTP 10:05 Have coffee and complain about lack of productivity Convenience Security Time for Change SAML, PUSH and Context all help but are not enough More customers are realising this every day 22
23 Lap 2
24 Technology has changed more in the last 20 years than the last two thousand, and it s accelerating exponentially Security is no longer an acceptable trade off for convenience Companies now face the largest shake up to working practices in a decade or two 24
25 In the past we had a perimeter to guard
26 Now we need a new approach
27 Cloud Technologies are forcing change Driven by
28 Budget Constraints 28
29 Meeting Security Audits & Compliance
30 Mobile Workforce 30
31 Users demand the latest technology
32 83% of global IT leaders already protect one or more cloud applications with twofactor authentication, a Gemalto survey shows
33 Cloud adoption brings a new set of challenges to users and IT Life for users is frustrating
34 Day in the life of a user 07:58 Connect to VPN Enter a Password 07:59 Connect to Enter a Password 08:30 Connect to SFDC Enter a Password 09:00 Connect to GoToMeeting Enter a Password 09:15 Connect to Service Now Enter a Password 10:00 Connect to Zscaler Enter a Password 10:05 Have coffee and complain about lack of productivity
35 Which ends as one of two ways 35
36 IT Admins have new challenges too. Life Cycle Management of user accounts in third party systems Increased Helpdesk load Visibility of user activity Enforcing corporate security policy Differing level of security between cloud vendors Loss of control on data AND OF COURSE..
37
38 The Impact of a breach is more than data
39 Making the Leaderboard with SafeNet Trusted Access
40 SafeNet Trusted Access Cloud-based access management service IDENTIFY APPLY Apply appropriate access controls MONITOR ASSESS Assess identity attributes and establish a level of trust SafeNet Trusted Access allows organizations to manage access to numerous cloud applications by validating identities, determining levels of trust and applying appropriate access controls each time the user accesses a cloud service.
41 Users/Groups Target Apps Adjust Define Policies Scenario-driven Compliance-focused Based on context & risk Set Auth rules by policy Monitor Acess 41
42 STA Demo 42
43 Track Conditions 49% of organisations are planning to implement SSO in the future 45% are planning on implementing an IDaaS solution Gemalto AIM Survey Spend on IAM going up Increase Stay the same 53% About 1/3 of organizations are planning to replace the following technologies in the next 2 yrs: MFA, Access Management, SSO, password managers 43 Decrease Don t know 41% 3% 2% Gartner, Jan 2017
44 Upgrading from SafeNet Authentication Service to SafeNet Trusted Access STA is an add-on to SAS that enables single sign on to numerous applications Maintain your current investment in 2FA Benefit from single 2FA and Access Management platform Combined technology platform - No rip and replace, simply purchase a license List of preconfigured apps (templates) SafeNet Authentication Service SafeNet Trusted Access Authentication SSO Session Management Scenario-based Access Policies Authorization Enforcement
45 Vision for the user 07:58 Connect to VPN Authenticate via push 07:59 catch up on 08:30 Connect to SFDC 09:00 Connect to SAP 09:15 Connect to Legal System 10:00 Connect to Sensitive M&A System 10:05 Have coffee and talk about politics and sport Convenience Sign in once Move between applications with no further authentication unless defined by the access policy
46 Reaching for new heights in 2017 Take the best authentication solution and bring it to the Access Management market Leverage SAS success to get SafeNet Trusted Access customer wins Help us make sure STA is in Gartner 2018 Access Management MQ 46
47 Western Union Business Services & Western Union Agents Business Need Reduce fraud in money transfers carried out by WU agents around the world Mitigate risk of breach Meet internal security audits Use Cases Secure access for WU agents who need to access to carry out money transfers Administrator access for users logging into WUBS Technical Need Cloud-based solution Needed to offer several different methods of authentication to meet the needs of different use cases and field conditions Needed to be able to provision tokens to agents who aren t listed in a central user store 47
48 How we addressed their needs The Solution: SafeNet Authentication Service Cloud etoken PASS HW tokens GrIDsure pattern tokens MobilePASS+ How we won Cloud capability was key Simplicity of the solution Flexibility: token provisioned onsite Reporting capabilities: ability to track usage by agents 48
49 United Technologies (UTC) Business Need Needed to replace RSA Wanted a cloud solution Use Cases Remote access via Cisco AnyConnect VPN The Solution: SafeNet Authentication Service etoken PASS HW tokens MobilePASS software tokens How we won Cloud delivery Opportunity for growth: Additional users who need to comply with DFARS regulation Smooth migration from RSA Very successful POC with close support from Gemalto 49
50 AT&T Partner Success AT&T Token Authentication Service (TAS) Drivers AT&T dissatisfied with RSA (on-prem service, no roadmap) Future path to broader access management offer Find replacement for existing users Internal competitor SecureKey The Opportunity Convert existing RSA users Grow with AT&T Sales Expand portfolio Success Factors Majority existing customers migrated, increasing user capacity New customers sold Well-placed for greater opportunities Perseverance through challenges 50
51 Celebrating Joint Success A Winning Service Winning Partners Winning Business Model 60% global growth SAS deals driven through the channel Recurring revenue model: 90% renewal rate Simple pricing model 51
Busting the top 5 myths of cloud-based authentication
Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility
More informationWHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD
WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD Imagine that you re a CISO in charge of identity and access management for a major global technology and manufacturing company. You
More informationWelcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности
Welcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationEND OF SALE ANNOUNCEMENT
SafeNet Authentication Manager OTP Authentication END OF SALE ANNOUNCEMENT The purpose of this bulletin is to announce End-of-Sale (EOS) and Last-Time-Buy (LTB) plans for the following products: SafeNet
More informationSafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service. Marko Bobinac PreSales Engineer CEE, Russia & CIS
SafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service Marko Bobinac PreSales Engineer CEE, Russia & CIS Agenda SafeNet introduction Introduction to Authentication
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationA Practical Step-by-Step Guide to Managing Cloud Access in your Organization
GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationCrash course in Azure Active Directory
Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationIntegration Guide. SafeNet Authentication Service (SAS)
Integration Guide SafeNet Authentication Service (SAS) Revised: 10 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More informationRSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief
Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationRSA Authentication Manager 8.2
RSA Authentication Manager 8.2 Over 25,000 customers 50 60 million active tokens in circulation 10 million units shipped per year More than 50% market share RSA Ready Partner Program: 400 Partners with
More informationSOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK
RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility
More informationAzure Multi-Factor Authentication: Who do you think you are?
Azure Multi-Factor Authentication: Who do you think you are? Sander Berkouwer CTO at SCCT scct.nl Sander Berkouwer CTO at SCCT scct.nl Microsoft MVP Veeam Vanguard A little history Server Microsoft acquired
More informationIDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO
IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO (US) @BEN_SMITH IDENTITY = THE MOST CONSEQUENTIAL ATTACK VECTOR Confirmed data breaches involving weak, default
More informationSECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION
SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationIntegration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Citrix GoToMyPC
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationBring Your Own Device. Peter Silva Technical Marketing Manager
Bring Your Own Device Peter Silva Technical Marketing Manager Bring-Your-Own-Device (BYOD) Personal devices for business apps Why implement BYOD? Increase employee satisfaction, productivity Reduce mobile
More informationInside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1
Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationEBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS
EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks
More informationERP Solution to the Cloud
IT s Not so Scary: Moving your Onprem ERP Solution to the Cloud Lizza Novo Mission Furthering your success through the alignment of strategy, people, processes and technology. What is the Term Cloud? Server
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationBlackBerry Enterprise Identity
Datasheet BlackBerry Enterprise Identity The Challenge: Cloud services are critical in today s enterprises, yet a reliance on the cloud comes with real and growing security risks. Enterprises want a simple,
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationHardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances)
SESSION ID: CSV-F01 Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) Aaron McKeown Lead Security Architect Xero Fast or Secure Fast
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationFlexible, robust, easy and thorough authentication
Flexible, robust, easy and thorough authentication VPN/PRIVATE WEBSITE ACCESS ACCESS TO APPLICATIONS APPLICATION CONTENT WORKSTATION The freedom your business needs from an authentication system Don t
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationBeyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013
Beyond Your Device Control, Connect, Experience BT GS Analyst and consultant call 2 July 2013 Agenda Welcome & situation in the market Neil Sutton, Vice President Portfolio Our solution Connect Jayne Smith,
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access
SafeNet Authentication Manager Integration Guide Using SAM as an Identity Provider for SonicWALL Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationBenefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst
Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst September 27, 2018 About Andras Cser Vice President, Principal Analyst Serves Security & Risk Professionals Leading
More informationIntegration Guide. SafeNet Authentication Service. SAS using RADIUS Protocol with WatchGuard XTMv. SafeNet Authentication Service: Integration Guide
SafeNet Authentication Service Integration Guide 1 Document Information Document Part Number 007-012745-001, Rev. A Release Date October 2014 Trademarks All intellectual property is protected by copyright.
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationCisco Borderless Networks Value Proposition
Cisco Borderless Networks Value Proposition Enabling the Borderless Organization 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Why Borderless Networks? Cisco s Architectural Approach
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of
More information5 OAuth EssEntiAls for APi AccEss control layer7.com
5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the
More informationBYOD Business year of decision!
Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco
More informationWindows Server 2012/R2 Overview
END OF LICENSE Windows Server 2012/R2 Overview December 31 st, 2017 Agenda Understanding the opportunity Win with Windows Server 2016 Next steps Understanding the opportunity Windows Server 2012/R2 End
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationPasswords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist
Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack
More informationSailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities
SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust
More informationCLOUD WORKLOAD SECURITY
SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly
More informationSAS and F5 integration at F5 Networks. Updates for Version 11.6
SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationDesign and deliver cloud-based apps and data for flexible, on-demand IT
White Paper Design and deliver cloud-based apps and data for flexible, on-demand IT Design and deliver cloud-based apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationAuthlogics for Azure and Office 365
Authlogics for Azure and Office 365 Single Sign-On and Flexible MFA for the Microsoft Cloud Whitepaper Authlogics, 12 th Floor, Ocean House, The Ring, Bracknell, Berkshire, RG12 1AX, United Kingdom UK
More informationNews and Updates June 1, 2017
Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk
More informationKristian Järnefelt, EVP, Consumer Cyber Security CONSUMER SECURITY
Kristian Järnefelt, EVP, Consumer Cyber Security CONSUMER SECURITY PROFITABLE GROWTH SYNERGIES ACROSS SEGMENTS Privacy Family Connected home CONSUMERS SECURITY NEEDS ARE GETTING BROADER PRIVACY FAMILY
More informationAccess Management Handbook
Access Management Handbook Contents An Introduction 3 Glossary of Access Management Terms 4 Identity and Access Management (IAM) 4 Access Management 5 IDaaS 6 Identity Governance and Administration (IGA)
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More informationMaximize your move to Microsoft in the cloud
Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationTRANSFORM YOUR APPLICATIONS
TRANSFORM YOUR APPLICATIONS Virtualizing Your Business Critical Applications Business Drivers Increase Revenue INCREASE AGILITY Lower Operational Costs Reduce Risk CLOUD TRANSFORMS IT Lower Operational
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationOktober 2018 Dell Tech. Forum München
Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationChannel FAQ: Smartcrypt Appliances
Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise
More informationAdaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief
Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationText Messaging Helps Your Small Business Perform Big
White Paper Text Messaging Helps Your Small Business Perform Big Sponsored by: AT&T Denise Lund August 2017 IN THIS WHITE PAPER This white paper introduces small businesses to the benefits of communicating
More informationDelivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5
Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5 Conrad Lee Enterprise Sales Engineer Hong Kong & Taiwan Delivering Windows Applications (IT Infrastructure
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationCloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.
Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationTop. Reasons Legal Teams Select kiteworks by Accellion
Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationYubico with Centrify for Mac - Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component
More informationHow Microsoft s Enterprise Mobility Suite Provides helps with those challenges
2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium
More informationTwo-Factor Authentication The Real Cost of Ownership
Secure Computing is a global leader in Enterprise Security solutions. Powered by our TrustedSource technology, our award-winning portfolio of solutions help our customers create trusted environments inside
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More information