DATA SHEET VANGUARD AUTHENTICATORTM KEY FEATURES:

Similar documents
DATA SHEET. ez/piv CARD KEY FEATURES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

DATA SHEET. VANGUARD ez/tokentm KEY FEATURES:

DATA SHEET VANGUARD CONFIGURATION MANAGER TM KEY FEATURES: VANGUARD TAKES THE TARGET OFF YOUR

VANGUARD POLICY MANAGERTM

POLICY MANAGER VANGUARD POLICY MANAGER (AUDIT/COMPLIANCE)

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

Analyzer runs thousands of integrity checks for both RACF and z/os Security Server.

VANGUARD INTEGRITY PROFESSIONALS Page 1

PROFESSIONAL SERVICES (Solution Brief)

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER

VANGUARD Policy Manager TM

Insurance Industry - PCI DSS

NOTE: This process is not to be used for Grouping/ Member Classes. Those will be covered in another White Paper.

Removing ID. The Solution: The Issue: The Problem:

The Advantages of TACACS+ for Administrator Authentication

Simplify PCI Compliance

ConfigOS. Concept of Operations. Automated STIG Remediation Making Software Work in Secure Environments. Version 1.7.

SIEM: Five Requirements that Solve the Bigger Business Issues

The Benefits of Wireless Infrastructure Management in the Cloud

Xceedium Xio Framework: Securing Remote Out-of-band Access

INTERVIEW TRANSCRIPT Barriers to Adopting Multifactor Authentication

Overview. Business value

Driving the Need for Mobile Device Management (MDM)

Offloading Remote Authentication for Servers. F5 s Advanced Client Authentication

How a Federated Identity Service Turns Identity into a Business Enabler, Not an IT Bottleneck

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Connecting Your Coworking: Cable vs. WiFi

REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

Paystar Remittance Suite Tokenless Two-Factor Authentication

Cisco Network Admission Control (NAC) Solution

Your wireless network

The Data Explosion. A Guide to Oracle s Data-Management Cloud Services

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Six Questions to Answer When Buying a Phone System

NETWORKING GLOBAL ACCESS ONE SOURCE SERENUS NETWORK SERVICES NEXT GENERATION CLOUD

Five Reasons It s Time For Secure Single Sign-On

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

OATH : An Initiative for Open AuTHentication

DigitalPersona for Healthcare Organizations

Solution. Imagine... a New World of Authentication.

Integrated Access Management Solutions. Access Televentures

CISCO SHIELDED OPTICAL NETWORKING

WHITE PAPER. Monitoring Converged Networks: Link Aggregation

Thread in Commercial Backgrounder

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Vanguard Advisor TM Your Way: Enhanced Masking, Report Formatting and Exception Criteria. Presented by Vanguard Integrity Professionals

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Securing Mainframe File Transfers and TN3270

Understanding VLANs. Existing Shared LAN Configurations CHAPTER

Authlogics for Azure and Office 365

Ten Innovative Financial Services Applications Powered by Data Virtualization

Musewerx support for Application Maintenance in Software AG NATURAL and ADABAS TM environment

The Old is New Again Engineering Security in the Age of Data Access from Anywhere

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Integrating Password Management with Enterprise Single Sign-On

ENTERPRISE PASSWORD RESET. ReACT. So your Help Desk doesn t have to.

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

Flash Decisions: Which Solution is Right for You?

The Windstream Enterprise Advantage for Banking

User Directories and Campus Network Authentication - A Wireless Case Study

Dolby Conference Phone 3.1 configuration guide for West

Call Guide. Transform. Transform The Network. Scenario 1: Hunting the opportunity. The Network

Network Security 1. Module 7 Configure Trust and Identity at Layer 2

Accelerate Your Enterprise Private Cloud Initiative

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Vanguard Configuration Manager Customization and Use

Admin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console

High-performance. Enterprise Scale. Global Mobility.

WatchGuard Technologies

Certificate Enrollment for the Atlas Platform

White Paper How IP is impacting Physical Access Control

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

Cisco Wireless Video Surveillance: Improving Operations and Security

Microsoft Security Management

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

efax Corporate for Independent Agent Offices

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

Deliver Data Protection Services that Boost Revenues and Margins

Who s Protecting Your Keys? August 2018

The Office, Procedures and Technology Chapter 3 Test 1

Opengear Technical Note

Exam: : VPN/Security. Ver :

INTELLIGENCE DRIVEN GRC FOR SECURITY

OUR SECURITY DELIVERED YOUR WAY

The Aruba S3500 Mobility Access Switch

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

DNS is the mechanism by which Internet software translates names to attributes such as addresses.

6 Vulnerabilities of the Retail Payment Ecosystem

Intranets and Virtual Private Networks (VPNs)

Integrating Hitachi ID Suite with WebSSO Systems

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Liferay Security Features Overview. How Liferay Approaches Security

Cisco Unified Wireless Network Solution Overview

Verizon Software Defined Perimeter (SDP).

Transcription:

VANGUARD TM Vanguard Authenticator is a scalable, modular and integrated authentication solution that enables enterprises to control authentication and authorization to their enterprise. Authenticator is a protocol converter and LDAP directory, that allows for simplification and centralization of security authentications services. KEY FEATURES: Authenticator can centralize authentication requests from many applications, devices and operating systems. Provides conversion of multiple authentication protocols. Processes all incoming authentication requests and performs authentication. Integrates with other Vanguard solutions for an optimized security environment. Page 1

CORRELATION AND CONSOLIDATION CAN GREATLY REDUCE YOUR ENTERPRISE SECURITY COSTS Reducing expense is a mandate of departments in every company; this is particularly true for those departments that are traditionally considered a necessary cost like security. One opportunity that lies ahead of us, the one of securing heterogeneous environments, can actually be a huge driver of enterprise savings. First however, let s investigate how we got to the point of having heterogeneous environments. The way our environments have become heterogeneous is often the result of this cost-savings driver. We are led into the temptation to look for an affordable point solution that satisfies the need of a new platform, a quick and dirty way to prove compliance, or maybe a pure cloud security solution. The hidden cost invariably is the lack of integration. Every point solution brings a new management platform, new security processes to be introduced in the company and, of course, additional complexity. Every quick fix turns out to be quick only once; the second time around things don t work out the way they did at first, or the solution doesn t meet the requirements of other regulations. A product tuned to fit a specific architecture doesn t allow us to easily secure multiple points, so there either is a larger cost in doubling the solution or in a reduced level of security. So what can or should we do? The answer is consolidation and correlation. Consolidation tackles two aspects, which are extremely extensive in their impact on a security strategy. First, the security measures that are implemented need to work in heterogeneous environments. We cannot afford to have security measures dedicated to a specific architecture living isolated from everything else; it is costly and ineffective. How can any company be satisfied with a solution that fits well for a cloud architecture but not a traditional one? Not only do the management cost and time double, but the capacity to correlate events is seriously stretched. Secondly, companies can less and less afford the cost, time and complexity of dealing with multiple (often dozens of) vendors. Consolidating the number of vendors on the one hand is often a guarantee of good integration among different areas of security (e.g. identity management and GRC). On the other, it gives companies time to concentrate the effort related to managing the relationship and obtaining better deals. Is this an easy path? Not necessarily; this process requires good communication among departments, sometimes it might require the replacement of existing point solutions, and it requires a proactive approach to securing an IT environment, rather than just reacting to the latest security trend. Is this the best path? At Vanguard, we are strongly convinced it is; a consolidated security solution, one that secures heterogeneous environments and yet maintains a high level of integration, will reduce complexity and, consequently, minimize costs. Page 2

THE SOLUTION: VANGUARD Vanguard Authenticator is a scalable, modular, and integrated authentication solution that enables enterprises to control access to the entire IT infrastructure from a central location. The software makes it easier for enterprises to manage access because the number of user IDs is significantly reduced and users have a single password to remember and maintain. Inexpensive to Deploy and Maintain One Vanguard Authenticator server can process requests from any application, device, operating system, or process that supports authentication protocols including LDAP, TACACS+, RADIUS, or Vanguard s protocol - VAS. System administrators can secure all their heterogeneous systems by using the IBM z/os Security Server. End users use their z/os Security Server credentials to access other systems, applications and devices across the enterprise. Decreased Security Threat Profile Vanguard Authenticator provides centralized authentication for an enterprise s entire network infrastructure, which may be comprised of hundreds of devices such as routers, switches, applications, and operating systems. The Authenticator server processes all incoming authentication requests and performs authentication against the z/os Security Server, the most trusted security system in the enterprise. Centralizing the enterprise authentication database on the z/os Security Server significantly increases overall enterprise security. Easy and Reduced Administration The centralized Vanguard Authenticator server makes administration of users significantly easier. When used with other Vanguard applications, user authorization and other Authenticator administration can be done from a Single Secure Domain. Page 3

Simplified User Experience Most enterprise end users maintain multiple user ID and password combinations. With Vanguard Authenticator, the number of user IDs is significantly decreased; users must only remember and maintain a single password. Authenticator is a virtual directory that honors and responds to the following protocols: Terminal Access Controller Access Control System Plus (TACACS+) for authentication requests from network infrastructure equipment including routers, firewalls; and LAN, Ethernet, ATM and blade switches. Remote Authentication Dial- In User Service (RADIUS) for authentication requests from wireless switches, enterprise voice and video applications, and Wi-Fi enabled devices. Lightweight Directory Access Protocol (LDAP) for authentication requests from web browsers, databases, and send mail; Authenticator passes all other requests to the original LDAP server for processing. Vanguard s proprietary protocol for customized access to other devices and systems that do not support LDAP, TACACS+, or RADIUS. INTEGRATES WITH OTHER VANGUARD SOLUTIONS COMPONENTS FOR AN OPTIMIZED SECURITY ENVIRONMENT - Vanguard ez/signon provides multiplatform enterprise wide sign on solutions. - Vanguard PasswordReset enables users throughout the enterprise to reset their own passwords. - Vanguard ez/token provides an enterprise wide, token-based two- factor authentication. - Vanguard Tokenless Two-Factor Authentication enables two-factor authentication across the enterprise using smart phones, tablets, smart devices and more with no expensive tokens required. KEY DIFFERENTIATORS A) Simplifies administration of security for a diverse set of devices and protocols. B) Allows IBM Security Server or z/os to control access to a wide variety of devices and protocols. C) Can reduce the complexity for users by reducing the number of passwords required to remember. Page 4

WHY VANGUARD TO SECURE YOUR ENTERPRISE? Almost half of the Fortune 1,000 companies in the world spanning banking, retail, insurance as well as numerous government agencies trust Vanguard with their enterprise security. FOR MORE INFORMATION To learn more about Vanguard Security Solutions, please contact Vanguard Integrity Professionals at (702) 794. 0014 or visit www.go2vanguard.com ABOUT VANGUARD SECURITY SOLUTIONS Vanguard offers one of the most advanced and integrated portfolios of enterprise security products and services in the world. The portfolio was the first to offer a fully automated baseline configuration scanner for mainframe DISA STIGs the Gold Standard for Security. The World s largest Financial, Insurance, Government Agencies and Retailers entrust their Security to Vanguard Integrity Professionals. Corporate Headquarters Vanguard Integrity Professionals 6625 S. Eastern Avenue Suite 100 Las Vegas, NV 89119-3930 Telephone: 702.794.0014 Fax: 702.794.0023 Page 5