November, 2008 Aladdin etoken Product Overview
|
|
- Morris Fisher
- 6 years ago
- Views:
Transcription
1 November, 2008 Aladdin etoken Product Overview
2 Legal Notice Copyright 2008 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, HASP, etoken TM and esafe are only a few of Aladdin Knowledge Systems Ltd s ( Aladdin ) proprietary trademarks. The Aladdin Knowledge Systems logo is also proprietary to Aladdin. The information contained in this presentation is protected by international copyright laws. The copyrights are owned by Aladdin or the original creator of the material. The information contained herein is provided to you for informational purposes only, and except and to the extent specifically permitted, no portion of this presentation may be copied, reproduced (or the like), distributed or used in any way whatsoever whether directly or indirectly. In addition to Aladdin s trademarks, logos, content and information, this presentation may contain references to trademarks and/or logos owned by other entities. Aladdin expressly disclaims any proprietary interest in trademarks and/or logos owned by other entities and makes no representation of any association, sponsorship, affiliation, or endorsement with or by the owners of such trademarks and/or logos. This presentation may contain references and use of third party web sites for purposes of providing examples relevant to this course. Aladdin assumes no responsibility and/or liability for any content and/or information contained in such third party web sites. Aladdin further does not endorse the companies or contents of any referenced sites. Aladdin does not assume any responsibility or liability for the accuracy of the information contained in this presentation. The information contained in this presentation is provided "as is" and does not constitute a warranty of any kind, either express or implied. Aladdin disclaims all warranties, expressed or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
3 Topics Covered In This Presentation Two factor authentication Requirement Aladdin etoken Solution Token Management System PKI Client Single Sign-on Solution One Time Password Customer Reference & Summary
4 Founded: 1985, publicly traded since 1993 Headquarters: Tel Aviv, Israel Global Presence: and China Employees Worldwide: 432 Sample Customers: USA, UK, Germany, France, India, Italy, the Netherlands, Spain, Japan Adobe, Canadian Department of Defense, Exxon Mobil, NBA, Siemens, Hewlett Packard, Cisco, IBM
5 Aladdin Vision and Product Lines Our vision is to be the leading provider of security solutions to: Protect Digital Assets Enable Secure Business Create, Sell, Distribute and Use Digital Content Hardware or softwarebased protection and licensing solution for software vendors Device for two-factor authentication, password and digital identity management Gateway-based antivirus protection, antispyware, content security, web browsing security and proactive security
6 Strong Authentication A Business Enabler
7 Passwords Are Not Enough! Can we rely on passwords to protect our valuable digital data and communications? Passwords are easily compromised Passwords are difficult for people to manage Passwords are expensive to organizations With identity theft running rampant, corporate data and networks being compromised everyday, authentication and identity management solutions have become a must have technology for all those storing, accessing, and disseminating sensitive data including governments, enterprises, and online consumers. Source: Janney Montgomery Scott, Solving the World s Identity Crisis, November 2005 Each call to the IT help desk costs between $25 and $50, and typically 35% to 50% of help desk calls in an organization are password related. Source: Burton Group, Enterprise Single Sign-On: Access Gateway to Applications, Phil Schacter, 22 September 2005
8 Drivers for Implementing Strong Authentication Enable more services Enable your employees, customers, and partners to access enhanced services and applications Comply with regulations Comply with industry related regulations (SOX, HIPAA, FERPA, Basel II, and others) Increase productivity Save costs Attract customers Enable your users to spend more time doing value-added activities Reduce password administration costs and losses from security breaches Address the demands of security-conscious customers
9 What Is Strong Authentication? Authentication the three what s User Name: Password: x What you know What you have What you are Strong authentication means using two or more authentication methods
10 Authentication Method for Choice PIN + PIN + + Without PW With PW Password weaker Security Level stronger
11 Which Authentication Devices Should You Use? OTP Tokens USB Tokens Hybrid Tokens Smart Cards Security Usability Portability Flexibility Light Infrastructure
12 etoken Solution and Product
13 Aladdin etoken Aladdin etoken is the world leader in USB-based authentication. It provides strong user authentication and cost-effective password management solutions enabling organizations to easily and effectively: Expand business opportunities with secure network access Improve data security through enhanced encryption and digital signing Reduce costs and vulnerabilities through superior password management
14 Secure Network Access etoken secure network access solution includes: VPN security (secure remote access) Secure web access Secure network logon Key etoken advantages: Support for multiple authentication methods: PKI, OTP, password Support for multiple platforms and technologies Single robust management system for the entire solution With employees working remotely all over the UK, we require an extra level of security to authenticate users accessing the system; Aladdin's etoken authentication device was an easy choice for us." - David Walker, ITS manager at Newell & Budge
15 Data Security etoken data security solution includes: PC security/boot protection, file & data encryption Secure Digital signing (non-repudiation) Key etoken advantages: Fully integrated solution with many solution partners Highly secure on-board key generation and cryptographic operations Single robust management system for the entire solution etoken provides the technology and flexibility we need from a token for strong authentication plus added benefits of S/MIME and document signing. Barry Ribbeck, Director of Systems Architecture & Services at Rice University
16 Password Management etoken password management solution includes: Simplified sign on for Windows and Web based applications Secure Windows (GINA) logon Key etoken advantages: Simple and secure token-based approach to SSO Intuitive and transparent Single robust management system for the entire solution A password reset call to the helpdesk costs an estimated $25. Some enterprises have estimated that helpdesk password reset calls cost twice as much it turns out passwords aren t free Burton Group, Reduced Sign-On, Gerry Gebel, September 2006
17 etoken Devices etoken PRO USB, reader-less smartcard High level of security for strong user authentication and credential storage etoken PRO Smartcard etoken PRO in traditional smartcard form factor etoken NG-OTP First-ever USB smartcard token with One-Time Password generation capabilities etoken NG-FLASH USB smartcard token with Flash memory for portable mass data storage etoken PASS Compact and portable OTP token
18 Customized etoken
19 Token Management System
20 The Challenge The management of an authentication solution in an enterprise involves a number of interrelated elements: - Users The identities in the organization - Organizational policies Access rights for user groups; required security measures - Security devices Authentication devices provided to users - Security applications Applications to be used by each user (e.g. SSO, network logon, disk encryption) How does a management system help? To illustrate, let s see the example of a new employee
21 Life Without a Management System Active Directory 2. Administrator enters user to AD 6. Sets user Network Logon Credentials 3. Sets and uploads VPN Certificate 9. Employee can start working 1. New employee arrives 7. Assigns token to user 4. Sets user credentials in ERP system 8. Gives token to employee
22 Life With a Management System 1. New employee gets token upon arrival 2. Employee performs token self-enrollment 3. Employee starts working Organizational Policies Token Management System ERP System And that s just the beginning VPN Network Logon
23 Additional Life-cycle Stages Without a Management System Hurray! Employee Gets Promoted Administrator manually updates token certificates and credentials Has he forgotten anything? User must contact the IT/helpdesk for password reset How much time and resources have you just lost? User Forgot Password??! Token was Stolen Administrator must manually revoke or recover the user credentials and keys Did he make a mistake? Can you afford it? The user cannot access data, administrator cannot help Will he still win the deal? Can you risk it? No Token while on the Road
24 And With a Management System Hurray! Employee Gets Promoted User can update her token based on her Administrator manually updates token new role certificates and credentials No errors, users continue working Has immediately he forgotten anything? User must enters contact the self-service the IT/helpdesk website for and password resets the reset token password How much time and resources have No helpdesk costs, no productivity loss you just lost? User Forgot Password??! Token was Stolen Administrator User administrator must manually can immediately revoke or recover disable the or revoke user credentials the token and keys Did he make a mistake? Can you System afford remains it? secure The User user enters cannot a secured access website data, and administrator enables a temporary cannot help virtual token Will he still win the deal? No productivity loss, can close the deal Can you risk it? No Token while on the Road
25 TMS Framework View Organizational Policies Auditing Reporting Tokens and Users Centralized Personalization User Repository Group Policies Active Directory Token Management System WEB/LAN Token Inventory Backup/Restore Profiles MS CA OTP Authentication Network Logon More Security Applications
26 TMS Key Features Supports all etoken devices and applications Integrated with Microsoft Active Directory Web-based user self-service, help desk, and administration tools Open architecture Supports security applications with configurable connectors Solutions supported include: network logon, VPN, web access, secure , data encryption, boot protection, SSO, certificate management, IdM, and more Robust SDK to integrate even more applications etoken Virtual Solution for employees on the road who lost/forgot their tokens enable them to continue working
27 Password Management Overview
28 etoken Reduced Sign-On (RSO) Solution Family etoken Simple Sign-On Secure storage and automatic fill-in of application logon credentials etoken Web Sign-On Secure storage and automatic fill-in of Web credentials and form data etoken Network Logon (GINA replacement) Secure storage and automatic fill-in of network logon credentials Secure and automatic access etoken provides a complete RSO solution with simple and strong authentication to enterprise IT resources
29 etoken SSO Benefits Enhances security Robust password for each application Strong user authentication Passwords are securely stored within the smartcard Increases user efficiency User needs to remember only one password Easy and fast to deploy No back-end integration Low maintenance Cost-effective Enterprise-wide solution
30 etoken SSO Architecture SSO Client The component installed on the end-user machine, and which executes all of etoken SSO end-user usage and benefits SSO Templates A set of rules and parameters relating to the particular application. For etoken SSO to support a specific application, an application template has to be created and installed on the user machine SSO Template Manager An administrator utility which allows the creation of templates for newly supported applications etoken SSO does not require any server installation and supports rapid rollout methodologies
31 etoken SSO Key Features Reduced Sign-On technology; stores user credentials on secured smartcard device Automatic fill-in of user credentials Captures logon screens for Windows applications Advanced scripting language for non-standard screen capturing Admin-configurable template management and profile ruling including wizard for rapid, intuitive creation of application templates Support for application password change Supports sharable/global values Customizable user interface Backup & restore of user credentials Automatic Fill In and submit
32 Aladdin SafeWord One Time Password (OTP) Authentication
33 The Best Solution for Windows Tailored for Windows, today and tomorrow Works on 32- and 64-bit Windows operating systems Vista and Windows 2008 Server Windows 2003 and XP-compatible Seamless Active Directory integration Installs on your AD Domain Controller Use the Microsoft tools your already know SafeWord 2008 a perfect fit when you upgrade your Windows infrastructure SafeWord is just about the easiest product to manage in this group, particularly for Microsoft-based servers. SC Magazine Group Test, Two-factor Authentication 9/2006
34 SafeWord 2008 Licensing Non-ESP Components Seamless Active Directory integration Installs on your AD Domain Controller Use the Microsoft tools you already know - ADUC Outlook Web Access (OWA) Agent Citrix Agent (Citrix 4.5 Web Interface Gateway) Internet Authentication Service (IAS) Agent ESP Components UserCenter SecureWire MobilePass SafeWord Management Console Domain Login Agent
35 SafeWord SecureWire Fully-featured, zero-footprint SSL VPN Protect Web applications, portals, and OWA with a Web Access Gateway Browser-based access to Windows File Shares, Terminal Services, Windows Desktops Single Sign On to popular Web and Windows applications Make applications, data, and network connectivity available to your employees, contractors, business partners, and customers over any Web browser Browser-based, encrypted authenticated access from across the room or around the world Full VPN connectivity for your system administrators HTTPS access to partner Web portals Unlimited users!
36 SafeWord 2008 ESP: More Features User Self Help and Enrollment with SafeWord 2008 User Center Users can help themselves via a simple, easy-to-use, easy-to-deploy Web application Access from any browser, without a call to the help desk or system admin Users can enroll themselves and their tokens, reset PINs, and test tokens SafeWord 2008 Management Console When you don t want to manage all or a portion of users in Active Directory Enterprise-wide management of users, tokens, and access rights as well as event logging and reporting Protect Internal Windows Resources User desktop login to Windows Domain resources Windows Terminal Services Windows Remote Desktop APIs PAM Agents for Unix
37 Alpine Combines a sleek new compact design Added feature of a sturdy clip for convenient attachment. Clip it on and carry your token with you anywhere for true zerofootprint user authentication Alpine tokens are compliant with OATH standards Available in either event or time-synchronous authentication modes. A simple push of a button gives you a one-time pass-code for a simple and secure login experience.
38 SafeWord MobilePass Turn your mobile device into a two-factor authenticator Works on popular platforms: BlackBerry Palm Windows Mobile J2ME-enabled devices Windows Desktop SMS/SMTP text delivery of OTP MobilePass Factory Administration User self-deployment Request an OTP OTP Routing Eliminates the need to distribute, maintain, and carry an additional device Easy to distribute, inexpensive to maintain, and quick to deploy.
39 Lifetime Warranty Lifetime Token Warranty SafeWord 2008 tokens never expire and come with a Lifetime Token Warranty. SafeWord eliminates the need to replace and deploy new tokens every three years and helps reduce your total cost of ownership. Simply return tokens at any time for a free replacement. You must be current on your support contract for all of your users to be eligible
40 Applications: Protecting Information Assets Protect your most important information assets and applications Citrix Applications Microsoft Outlook Web Access VPNs from Cisco, Check Point, Juniper, Aventail, Nortel, and others Network Infrastructure Devices: Routers, Switches, Firewalls, etc Microsoft IAS/ISA/IIS Terminal Services/Remote Desktop Windows Domains Unix SecureWire Access Gateway Branded solutions for Citrix, Cisco, Check Point, Nortel
41 Customer Reference & Summary
The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components
YOUR ULTIMATE AUTHENTICATION SOLUTION A l a d d i n. c o m / e T o k e n The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
More informationetoken Integration Guide etoken and ISA Server 2006
etoken Integration Guide etoken and ISA Server 2006 March 2007 Contact Information Support If you have any questions regarding this package, its documentation and content or how to obtain a valid software
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationPKI is Alive and Well: The Symantec Managed PKI Service
PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationYubico with Centrify for Mac - Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component
More informationMobile Data Security Essentials for Your Changing, Growing Workforce
Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity
More informationSafeNet Authentication Client
SafeNet Authentication Client All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 35 Integration Guideline Disclaimer Disclaimer of Warranties
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access
SafeNet Authentication Manager Integration Guide Using SAM as an Identity Provider for SonicWALL Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationUse Digipass two-factor authentication
DIGIPASS BY VASCO Secure your business Use Digipass two-factor authentication S T R O N G s tat i c PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l i c K E Y I N F R A S T R U C T U R E digipass
More informationIntegration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationDIGIPASS Authentication for F5 BIG-IP
DIGIPASS Authentication for F5 BIG-IP With VASCO VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 37 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona
More informationSecure your business. Use DIGIPASS two-factor authentication. The world s leading software company specializing in Internet Security.
Secure your business Use DIGIPASS two-factor authentication S E C U R E D PA S S W O R D S O N E - T I M E PA S S W O R D S P u b l ic K E Y I N F R A S T R U C T U R E The world s leading software company
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationA Foxit Software Company White Paper
A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationDIGIPASS Authentication for O2 Succendo
DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide Using RADIUS Protocol for F5 BIG-IP Access Policy Manager All information herein is either public information or is the property of and owned solely by
More informationImplementation Guide VMWare View 5.1. DualShield. for. VMWare View 5.1. Implementation Guide
DualShield for VMWare View 5.1 Implementation Guide Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID,
More informationComodo Certificate Manager
Comodo Certificate Manager Simple, Automated & Robust SSL Management from the #1 Provider of Digital Certificates 1 Datasheet Table of Contents Introduction 3 CCM Overview 4 Certificate Discovery Certificate
More informationOne Identity Defender 5.9. Product Overview
One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationManaged Access Gateway. User Guide
Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First
More informationAre You Flirting with Risk?
Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationAre You Flirting with Risk?
Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market
More informationVeritas SaaS Backup for Salesforce
Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationBlackBerry Integration With IBM WebSphere Everyplace Access 4.3
BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationOracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release E
Oracle Enterprise Single Sign-on Logon Manager Installation and Setup Guide Release 10.1.4.1.0 E12635-01 March 2009 Oracle Enterprise Single Sign-on, Installation and Setup Guide, Release 10.1.4.1.0 E12635-01
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationSafeNet MobilePASS+ for Android. User Guide
SafeNet MobilePASS+ for Android User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
More informationIndeed Card Management Smart card lifecycle management system
Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These
More informationCA Adapter. CA Adapter Installation Guide for Windows 8.0
CA Adapter CA Adapter Installation Guide for Windows 8.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
More informationLotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management
Lotus Domino Security NSL, Web SSO, Notes ID vault Collin Murray Program Director, Lotus Domino Product Management Challenge: Reduce Cost of Ownership IBM Lotus Notes and Domino have been providing a secure
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationAuthentication Manager Self Service Password Request Administrator s Guide
Authentication Manager Self Service Password Request 9.0.2 Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSafeNet Authentication Service Agent for Cisco AnyConnect Client. Installation and Configuration Guide
SafeNet Authentication Service Agent for Cisco AnyConnect Client Installation and Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto
More informationCA IT Client Manager / CA Unicenter Desktop and Server Management
CA GREEN BOOKS CA IT Client Manager / CA Unicenter Desktop and Server Management Object Level Security Best Practices LEGAL NOTICE This publication is based on current information and resource allocations
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationRelease Notes. BlackBerry Enterprise Identity
Release Notes BlackBerry Enterprise Identity Published: 2018-03-13 SWD-20180606100327990 Contents New in this release...4 Fixed issues...5 Known issues... 6 Legal notice...8 New in this release New in
More informationManaged Access Gateway. User Guide
Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time
More informationTFS WorkstationControl White Paper
White Paper Intelligent Public Key Credential Distribution and Workstation Access Control TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 Important Concepts 4 Logon Modes 4 Password
More informationIntegration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationIntegrating Password Management with Enterprise Single Sign-On
Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and
More informationCopyright Tools4ever B.V. All rights reserved.
Copyright Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without the written permission of Tools4ever. DISCLAIMER
More informationStoneGate SSL VPN Release Notes for Version 1.3.1
StoneGate SSL VPN Release Notes for Version 1.3.1 Created: July 29, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility... 5 Upgrade
More informationAvaya Converged Platform 130 Series. idrac9 Best Practices
Avaya Converged Platform 130 Series idrac9 Best Practices Release 4.0 December 2018 2018 Avaya Inc. All Rights Reserved Notice While reasonable efforts were made to ensure that the information in this
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationCA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationLinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!
LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationAuthlogics for Azure and Office 365
Authlogics for Azure and Office 365 Single Sign-On and Flexible MFA for the Microsoft Cloud Whitepaper Authlogics, 12 th Floor, Ocean House, The Ring, Bracknell, Berkshire, RG12 1AX, United Kingdom UK
More informationInstallation and Configuration Guide
Installation and Configuration Guide BlackBerry Blend Version 1.2 Published: 2015-07-06 SWD-20150706173035792 Contents About BlackBerry Blend... 4 BlackBerry Blend architecture... 4 Security... 5 IT policy
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationSafeNet Securing Microsoft Solutions
SafeNet Securing Microsoft Solutions SafeNet and Microsoft work closely to enhance the security of Microsoft solutions. The Microsoft on Windows provides customizable services for creating and managing
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationIntegration Guide. SafeNet Authentication Manager. Using SafeNet Authentication Manager with Citrix XenApp 6.5
SafeNet Authentication Manager Integration Guide Using SafeNet Authentication Manager with Citrix XenApp 6.5 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013
More informationENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION
ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION A Guide to Meet NIST SP 800-157 Requirements +1-888-690-2424 entrust.com Table of contents The Need for Mobile Credentials Page 3 Entrust Datacard: The
More informationPRODUCT DESCRIPTIONS AND METRICS
PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit
More informationVMware AirWatch Integration with OpenTrust CMS Mobile 2.0
VMware AirWatch Integration with OpenTrust CMS Mobile 2.0 For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationBlackBerry 2FA. Datasheet. BlackBerry 2FA
Datasheet BlackBerry 2FA BlackBerry 2FA The Challenge: Critical enterprise systems especially cloud services are more exposed than ever before because of the growing threat of cybercrime. Passwords alone
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationDeltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide
Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationDigitalPersona for Healthcare Organizations
DigitalPersona for Healthcare Organizations RAPID, SECURE AUTHENTICATION FOR MEDICAL PROVIDERS AND STAFF Secure Access to Electronic Health Records Streamline Clinical Workflow Reduce Cybersecurity Costs
More informationCA GovernanceMinder. CA IdentityMinder Integration Guide
CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationINFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT
INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationSecure Messaging Buyer s Guide
Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered
More informationTivoli Access Manager for Enterprise Single Sign-On
Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Kiosk Adapter User's Guide SC23-6342-00 Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Kiosk Adapter User's Guide SC23-6342-00
More informationActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook
More informationA comprehensive security solution for enhanced mobility and productivity
A comprehensive security solution for enhanced mobility and productivity coupled with NetScaler Unified Gateway and StoreFront lets organizations upgrade their business security beyond usernames and passwords,
More informationSafeNet MobilePKI for BlackBerry V1.2. Administration Guide
SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have
More informationHySecure Quick Start Guide. HySecure 5.0
HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current
More information