Are You Flirting with Risk?

Similar documents
Are You Flirting with Risk?

RSA Authentication Manager 8.2

Barracuda Networks SSL VPN

Next Generation Authentication

<Partner Name> RSA SECURID ACCESS Standard Agent Implementation Guide. WALLIX WAB Suite 5.0. <Partner Product>

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

RSA Authentication Manager 8.0 Security Configuration Guide

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Dell SonicWALL NSA 3600 vpn v

The Device Has Left the Building

Integrated Access Management Solutions. Access Televentures

RSA SecurID Ready Implementation Guide. Last Modified: March 27, Cisco Systems, Inc.

<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product>

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

Pass4sure CASECURID01.70 Questions

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

CA ARCserve Backup. Benefits. Overview. The CA Advantage

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

RSA SecurID Implementation

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

PKI is Alive and Well: The Symantec Managed PKI Service

VMware Identity Manager vidm 2.7

HOB HOB RD VPN. RSA SecurID Ready Implementation Guide. Partner Information. Product Information Partner Name. Last Modified: March 3, 2014 HOB

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

How Next Generation Trusted Identities Can Help Transform Your Business

RSA Ready Implementation Guide for. GlobalSCAPE EFT Server 7.3

Cisco Systems, Inc. Catalyst Switches

GUIDE. MetaDefender Kiosk Deployment Guide

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Cloud sicherung durch Adaptive Multi-factor Authentication

Vendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

Cisco Systems, Inc. IOS Router

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Evolved Backup and Recovery for the Enterprise

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

MaaS360 Secure Productivity Suite

RSA Authentication Manager 6.1 to 8.0 Migration Guide

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Ready Implementation Guide for

Mobility best practice. Tiered Access at Google

Reinvent Your 2013 Security Management Strategy

<Partner Name> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Authenticate & Intel IPT based Token Provider for RSA SecurID

Cisco Systems, Inc. Wireless LAN Controller

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide

white paper SMS Authentication: 10 Things to Know Before You Buy

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Solution. Imagine... a New World of Authentication.

RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ]

Pulse Secure Policy Secure

SecureW2 Enterprise Client

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Verizon Software Defined Perimeter (SDP).

Authentication Methods

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA

Single Secure Credential to Access Facilities and IT Resources

Comodo IT and Security Manager Software Version 5.4

Avocent DSView 4.5. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: June 9, Product Information Partner Name

Yubico with Centrify for Mac - Deployment Guide

QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Barracuda Networks NG Firewall 7.0.0

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Integrating Password Management with Enterprise Single Sign-On

HIPAA Compliance discussion

Google Identity Services for work

MEETING ISO STANDARDS

Securing your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

RHM Presentation. Maas 360 Mobile device management

McAfee epolicy Orchestrator

Challenges and. Opportunities. MSPs are Facing in Security

Managed Administration Service (MAS): Hitachi ID Password Manager

Echidna Concepts Guide

IBM Internet Security Systems Proventia Management SiteProtector

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

SailPoint IdentityIQ 6.4

SECURITY PRACTICES OVERVIEW

PCI DSS Compliance. White Paper Parallels Remote Application Server

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Mobile Security using IBM Endpoint Manager Mobile Device Management

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

7 Things ISVs Must Know About Virtualization

Authentication and Fraud Detection Buyer s Guide

Advantage Cloud Two-Factor Security Process

AKAMAI CLOUD SECURITY SOLUTIONS

Secure Access for Microsoft Office 365 & SaaS Applications

vsphere Installation and Setup Update 2 Modified on 10 JULY 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide

Citrix Systems, Inc. Web Interface

THE RSA AUTHENTICATION DECISION TREE

Transcription:

Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1

2

3

RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker} RSA Authentication Manager 8.1 4

123456 The most commonly used password in the world Source: http://igigi.baywords.com/rockyou-com-passwords-list/ 5

Passwords are Weak 6

The Challenges of Passwords Passwords can be phished Passwords can be captured by a keylogger Users write down their passwords Users share their passwords Passwords can be guessed Passwords can grow stale Passwords can be cracked 7

Password-only protection is risky Source: 2011 Verizon Data Breach Report 8

Stolen credentials through user carelessness, maliciousness & advanced malware is a growing threat Source: 2011 Verizon Data Breach Report 9

Passwords are Not Free 10

Password Lifecycles are Expensive to Maintain Require users to change passwords Lost time and money Passwords are lost, forgotten, or shared Help desk calls 11

Costs add up According to the Gartner Group, between 20% to 50% of all help desk calls are for password resets. Forrester Research states that the average help desk labor cost for a single password reset is about US $70. In an organization of 10,000 users, this can equate to US $350K per year in unallocated costs. 12

Agenda RSA AUTHENTICATION MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market Overview {Speaker} RSA Authentication Manager 8.1 13

14

The Goal Of Strong Authentication Establish Trusted Identities in a Constantly Changing, Expanding and Dispersed IT Environment Diverse User Population Bring Your Own Device (BYOD) Cloud and Managed Service Advanced Threats 15

What is Two-Factor Authentication? Two-Factor Authentication: The act of identifying an individual by using any combination of something they know, something they have or something they are. Something you know = PIN, password, life question Something you have = Token, Smartcard, Trusted Device Something you are = Biometrics (fingerprint, retinal scan, etc) 16

FFIEC HITECH HIPPA NERC PCI DSS SOX GBLI NIST CJIS MAS Guidelines 17

Agenda RSA AUTHENTICATION MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market Overview {Speaker} RSA Authentication Manager 8.1 18

Introducing RSA Authentication Manager 8.1 19

Risk-Based Authentication in AM8 Device Identification User Behavior Web Browser SSL VPN Web Portals Activity Details Assurance Level Authentication Policy PASS RISKY Protected Resources OWA RSA Risk Engine Identity Challenge PASS SharePoint On- Demand Tokencode? Challenge Questions FAIL Access Denied 20

RSA Authentication Manager Risk Engine Proven risk engine intelligence Protecting more than 350 million online identities today Optimized for enterprise use cases Self learning adapts to user population over time Plug-and-play integration building upon existing SecurID agents 21

Risk-Based Authentication in AM8 RBA/ODA Combo license Risk-Based Authentication On-demand Authentication Two functionalities on one perpetual license Optionally available in AM 8.x Maintenance is required on the RBA/ODA license AM 8.x supports up to 20,000 users 22

Risk-Based Authentication Use Cases Web-based applications VPNs Web portals OWA Sharepoint/Citrix Users Employees, contractors, suppliers, vendors, partners 23

How does RSA SecurID work? 24

Traditional SecurID Hardware Authenticators High-end security token physically robust and tamper evident SecurID 200 SecurID 520 Card-Style Authenticators RSA SD 200 Classic Card RSA SD 520 PIN Pad Fob-Style Authenticators RSA SecurID 700 Key Fob RSA SecurID 800 USB / Hybrid Smart Card SecurID 700 SecurID 800 25

Supporting Mobile Devices Since 2002 26

Lowering Total Cost of Ownership New User Dashboard to Improve Help Desk Resolution Time Improved Software Token Provisioning Self-Service Console Time-Saving Management Features 27

RSA Authentication Manager 8 The Ultimate Authentication Engine User Dashboard Resolve Help Desk cases up to 64% faster 28

RSA Authentication Manager 8 Empowering End Users through Self Service Customizable Corporate logo upload Feature-rich self service portal New user on-boarding Emergency access Account management Enable/disable select features Set display options Set troubleshooting options Multi-language support Customizable online portal enabling end users to manage various aspects of their token lifecycles and easily deployed in DMZ using new Web Tier. 29

RSA Authentication Manager 8 Virtual Appliance reduces costs and increases efficiency Efficient, secure deployment Leverage vsphere tools for easier administration Hardened security profile reduces potential attack vectors Standards-based platform Built on the OVF platform Compatible with free and enterprise versions of VMware Lower total cost of ownership Maximize efficiency Leverage existing expertise 30

Hardware Appliance Models Available in Two Appliance Form Factors Model 130 (R210): Single power supply, single disk Pre-configured bundles to support 10, 25, 50, 100, 150 or 250 users & Base license (1 Primary/1 Replica) May be upgraded or ordered with different license 1U form factor Model 250 (R710): Designed for higher availability requirements Dual power supply, redundant disks Can be ordered in a number of user/license configurations 2U form factor Version 8.1 allows mixing and matching of Primary and Replica hardware appliances and virtual appliances 31

Lowering the Cost of Administration A host of new features and improvements Core Enhancements Faster deployment and configuration Simplified patching procedure Simple, Full and Test migration options Improved database and replication model Improved Identity Source integration IPv6 support (agent-server) Simple hostname & IP address change Simplified certificate replacement Cross-platform stability improvements Improved monitoring with SNMPv3 Troubleshooting & Support Critical System Notifications Logging improvements Replication management & troubleshooting Improved troubleshooting documentation Administrative Usability Full vsphere integration (snapshots, vmotion, etc.) Simplified and enhanced backup/restore Tightly integrated RADIUS replication, backup and promotion Help desk (user/token) dashboards Enhanced Software Token Distribution User Search Administrative CLU s moved to the GUI Import/export users and tokens Consolidated system settings page Hosts file management (nslookup) User Enablement DMZ deployment of Self Service & CT-KIP services Self-service customization and branding I18N/L10N localization 32

Migrate to RSA Authentication Manager 8.X Migrate directly from: 6.1 8.X 7.1 8.X Basic or Advanced Migration No cost to migrate Tools, training and resources are available to help plan migration 33

AM8 Field Tested and Approved Full 6 month beta test Over 50 customers/partner participated 3 beta code drops The smart dashboard is a quantum leap forward RSA Partner Virtualization of AM is considered a home run RSA Partner We had major problems with the AM7 upgrade. The AM8 testing has gone well and the product has functioned as advertised Larger Global Financial Institution We especially like the Steel Belted Radius functionality built into the application (vs. standalone). All of our switching infrastructure is authenticating against it. -Large Technology Company 34

Authentication Manager 8.0 Delivers http://www.scmagazine.com/rsa-authentication-manager/review/4085/ 35

Frost & Sullivan Frost & Sullivan: Sept 2013 36

RSA Authentication: Choice Part-Time Employees Partners Road Warriors Administrators Infrequent Users Contractors Frequent Users Internal Employees Customers Broad range of solutions to meet the needs of an increasingly diverse user population Hybrid Smart Card Fob / Card Token Hardware Tokens Embedded Solutions Portable Devices Software Tokens PC / Web Browser On-Demand Tokenless Risk-Based 37

38

39