white paper SMS Authentication: 10 Things to Know Before You Buy

Similar documents
AUTHENTICATION DECISION GUIDE. Decision Guide. Hardware and Software Authentication: Choosing the Right Approach

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

SafeNet Securing Microsoft Solutions

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker

SafeNet Authentication Client

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

Solution. Imagine... a New World of Authentication.

Charting Your Path to Enterprise Key Management

Mobile Data Security Essentials for Your Changing, Growing Workforce

Encrypting Critical Data In Databases. An Overview of the Database Integration Process

The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

SafeNet Authentication Client

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

A comprehensive security solution for enhanced mobility and productivity

Integration Guide. SafeNet Authentication Manager. Using SafeNet Authentication Manager with Citrix XenApp 6.5

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

How Next Generation Trusted Identities Can Help Transform Your Business

Securing Today s Mobile Workforce

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Identity and Authentication PKI Portfolio

Deliver Data Protection Services that Boost Revenues and Margins

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Citrix NetScaler 10.5

Integration Guide. SafeNet Authentication Client. Using SAC CBA with Juniper Junos Pulse

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Integrated Access Management Solutions. Access Televentures

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Mobility best practice. Tiered Access at Google

Welcome Guide for MP-1 Token for Microsoft Windows

MobilePASS for BlackBerry OS 10

Single Secure Credential to Access Facilities and IT Resources

Welcome Guide for KT Series Token

Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Citrix GoToMyPC

The Device Has Left the Building

November, 2008 Aladdin etoken Product Overview

Microsoft IT deploys Work Folders as an enterprise client data management solution

SafeNet Authentication Service

Developing an Enterprise Extranet Service

IBM Internet Security Systems Proventia Management SiteProtector

PKI is Alive and Well: The Symantec Managed PKI Service

SafeNet Authentication Client

END OF SALE ANNOUNCEMENT

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Crash course in Azure Active Directory

Enterprise Mobility Management

Microsoft DirectAccess

Choosing the right two-factor authentication solution for healthcare

Integration Guide. SafeNet Authentication Manager. Using RADIUS Protocol for Cisco ASA

Mobile: Purely a Powerful Platform; Or Panacea?

INDIA The Changing Face of the Workplace: Going Light and Mobile

Security Enhancements

Disk Encryption Buyers Guide

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

SafeNet Authentication Manager

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

Design and deliver cloud-based apps and data for flexible, on-demand IT

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

SafeNet Authentication Service

ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

3-Part Guide to Developing a BYOD Strategy

SafeNet Authentication Client

DigitalPersona for Healthcare Organizations

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Evolved Backup and Recovery for the Enterprise

To Audit Your IAM Program

Microsoft 365 Business FAQs

Cisco Cloud Application Centric Infrastructure

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with CA SiteMinder

Smart Cards, Tokens, Security And Applications

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

SafeNet Authentication Client

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Microsoft DirectAccess

Office 365 Buyers Guide: Best Practices for Securing Office 365

device management solution

LEVEL 3 SM WEB MEETING

Maximize your move to Microsoft in the cloud

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Are You Flirting with Risk?

Bring Your Own Device. Peter Silva Technical Marketing Manager

Google Identity Services for work

Integration Guide. SafeNet Authentication Service. SAS using RADIUS Protocol with WatchGuard XTMv. SafeNet Authentication Service: Integration Guide

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

THE SECURITY LEADER S GUIDE TO SSO

Enterprise Mobility Management: completing the EMM story

Comprehensive Database Security

SafeNet Authentication Service

Solutions Overview. Nortel Networks. Preside. Next-Generation Management Solutions

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Instant evolution in the age of digitization. Turn technology into your competitive advantage

Trusted Computing As a Solution!

Identity & security CLOUDCARD+ When security meets convenience

Transcription:

white paper SMS Authentication: 10 Things to Know Before You Buy

SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling customers to perform online transactions, mobile sales reps to access ERP applications, outsourced call centers to share the customer database, and more. While ensuring reliable, instantaneous access is a must, so, too, is the need to guard against breaches and ensure continuous compliance. In this business environment, strong authentication using multiple factors to ensure users are indeed who they claim to be is vital. As they evaluate the alternatives, many organizations are opting to use SMS authentication, which offers a mix of convenience and security that make it ideally suited to many usage scenarios. SMS Authentication: Promising an Unparalleled Combination of Security and Convenience SMS authentication combines the security of two-factor authentication with the convenience and simplicity of mobile devices and SMS messages. The SMS authentication process can vary, but, generally, a user looking to gain remote access submits a request for a password, which is then fulfilled via SMS to the user s authorized phone. This password is then used to gain account access. SMS authentication can present a number of significant benefits: Improve security. SMS authentication delivers two-factor authentication that offers a number of security advantages over basic user name and password access, helping provide a strong layer of protection for user access and identities. Reduce security costs. Compared to hardware-based token approaches, SMS authentication can provide both significant up front savings by reducing token purchases and distribution costs and over the long term by streamlining administration and eliminating the cost of replacing lost tokens. Boost deployment opportunities. By eliminating tokens from the equation and relying instead on ubiquitous mobile devices, SMS authentication brings two-factor authentication to a range of arenas where it would have been previously impractical online banking, e-learning education portals, authenticating voice-based system access, healthcare sites, and more. SMS Authentication: 10 Key Considerations SMS authentication offers numerous advantages and benefits. In addition, its deployment characteristics can make it an ideal complement to an organization s existing security and authentication mechanisms. To assess whether SMS authentication fits their specific needs, business and IT managers should consider the following areas: 1. End User Convenience Paramount to the success of any authentication initiative is that end users ultimately use the mechanisms in place and don t suffer lost productivity as a result. Toward that end, decision makers should look for solutions that offer self-service activation so users don t need to wait for help from a support representative. In addition, the setup process should be intuitive, fast, and simple.

2. Broad Device Support The cost savings of SMS authentication, and the elimination of the need to buy, ship, and support hardware tokens, are undeniable. However, those savings can start eroding quickly if an SMS authentication solution necessitates the purchase of new mobile devices. Look for solutions that offer the broadest device support to ensure the devices your organization has today, and may acquire tomorrow, are supported. 3. SMS Network Support In a given enterprise, users across an organization may rely on a host of networks, in various regions, during their daily work and travels. To be truly viable, SMS authentication mechanisms need to support all SMS service provider networks. 4. Over-the-Air Deployment and Activation To realize their full deployment potential, SMS authentication solutions simply can t require that security teams have physical access to end user s mobile devices. Consequently, remote, over-the-air mechanisms not only for initial deployment and activation, but for ongoing updates and changes are essential. 5. Ease of Management For the administrators of SMS authentication solutions, there are several factors for assessing efficiency. Does the solution offer seamless integration with existing user directories, such as LDAP and Active Directory? In the case of a lost or stolen device, can administrators quickly and easily revoke access? Also, look for solutions that offer automatic administrator notifications. Whether it s an issue caused by a lost device, a compromised internal server, or any other potentially threatening event, administrators need to be notified automatically and immediately to ensure they can promptly take the remediation steps required. 6. Heterogeneous Authentication Management One type of authentication will not typically address the security and business needs of an entire enterprise. SMS authentication may be one of many authentication solutions in place at a given time. If an SMS authentication solution requires its own separate management system, it can usher in complexity in terms of enforcing policies, managing changes in user and group status, and in a host of other areas. Therefore, it is critical to deploy solutions that can be integrated with a central management platform that can be used to control all enterprise authentication; whether it s simple, one-time-password solutions, robust certificate-based digital signing applications, USB tokens or software-based solutions, or hybrid, physical and logical security systems. Finally, this broad support is vital for the true utility of SMS authentication in its own right. If a solution offers the flexibility not just to do SMS, but OTP to e-mail, SMTP delivery, and more, the utility and value of that solution increases substantially. 7. Robust Security In the end, any authentication mechanism needs to deliver robust security. Solutions need to offer powerful identity protection for all types of remote access systems, including VPNs, Terminal Servers, Citrix applications, and Outlook Web Access. Here again, the broadest possible adoption with existing policy management and security mechanisms is vital it fosters more uniform policy enforcement and minimizes security gaps. Look for solutions that offer a strong combination of granular policy controls, and centralized management of diverse users and groups. 8. Authentication Strength Not all authentication mechanisms are created equal. In evaluating alternatives, it is important to ensure that the authentication method ultimately employed meets at least the minimum level of protection warranted by the assets involved. Look at the worst-case scenario what would happen if an attacker successfully compromised the credentials of an authorized user and was able to access corporate resources? The level of authentication strength should be commensurate with the severity of this exposure. 9. Broad Delivery and Business Model Support SMS authentication can present a wealth of new opportunities to leverage strong authentication in entirely new ways, which can present both transformational security and business benefits. To realize these potential benefits, both immediately and in the long term, businesses should adopt SMS authentication solutions that are part of a comprehensive security framework. By eliminating the deployment of numerous, disparately managed point solutions, organizations can gain optimal opportunities for new applications, while minimizing costs. 10. Low Total Cost of Ownership Inherently, SMS authentication solutions can present significant cost advantages, particularly when compared to the distribution and maintenance of hardware tokens. Beyond these benefits, organizations can profit from ongoing cost savings by leveraging those solutions that do the best job of streamlining up front deployment and ongoing maintenance. To do so, security teams need the broadest integration flexibility, end user self-service capabilities, and easy administration.

Conclusion For many organizations, SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account, including deployment characteristics, convenience for end users, centralized management, overall security, and more. About SafeNet Authentication Solutions SafeNet authentication solutions ensure easy and secure strong authentication for employees, partners, and customers and cover the entire spectrum of security needs, from remote access to advanced certificate-based applications. In addition, SafeNet offers the token management systems that streamline deployment, provisioning, and ongoing maintenance. SafeNet s token management systems support the company s entire range of hardware and software authentication solutions, which offers even further benefits in administrative efficiency while enabling organizations to tailor authentication approaches to specific risk levels and use cases OTP Authenticators etoken PASS. The etoken PASS is an OTP token that offers two-factor strong authentication in detached mode. etoken PASS is available in both time and event-based versions. GOLD. GOLD is an event-based OTP token that offers strong, two-factor authentication. It also supports challenge response functionality which offers an additional layer of security by generating the OTP only after users enter a PIN code on the token keypad. Certificate-Based Authenticators (PKI) etoken PRO. The etoken Pro is a smartcard USB token that provides two-factor strong authentication, advanced security applications, digital signatures, and cost-effective password management. etoken PRO Anywhere. The etoken Pro Anywhere is a clientless smartcard USB token that leaves zero footprint on end-user computers. It combines the strength of certificate-based, two-factor authentication with the plug-and-play simplicity and mobility of OTP. ikey 2032. The ikey 2032 is a smartcard USB token that offers two-factor authentication, advanced security applications, and digital signatures. ikey 4000. The ikey 4000 is a smartcard USB token that offers multi-factor authentication with optional match-on card biometric functionality. etoken PRO Smartcard. The etoken Pro is a credit card form factor authenticator that supports password management, digital signatures, and advanced security applications. Hybrid Authenticators SafeNet Smartcard 400. The SafeNet Smartcard 400 is a credit card form factor authenticator that supports certificatebased, multi-factor authentication and advanced security applications. etoken NG-OTP. The etoken NG-OTP is a hybrid USB token that supports both OTP and certificate-based authentication. Software Authenticators etoken FLASH. The etoken NG-FLASH is a certificate-based, strong authentication USB token with on-board encrypted storage. etoken NG-FLASH is available in sizes ranging from 1GB to 16 GB. MobilePASS. MobilePASS is a software-based OTP authenticator that combines the security of two-factor strong

authentication with the convenience of one-time passwords generated on Windows desktops and a range of mobile devices, including iphone, BlackBerry, and Windows Mobile platforms. For additional flexibility, it also supports SMS delivery to mobile devices. etoken Virtual. etoken Virtual is a certificate-based, two-factor authentication solution that provides full PKI functionality, including secure remote access, network access, and digital signing in a software-based solution. To learn more about SafeNet Authentication Solutions, visit www.safenet-inc.com/authentication About SafeNet SafeNet is a global leader in information security, founded more than 25 years ago. The Company protects identities, transactions, communications, data, and software licensing through a full spectrum of encryption technologies, including hardware, software, and chips. More than 25,000 corporate and government customers in 100 countries trust their security needs to SafeNet. In 2007, SafeNet was acquired by Vector Capital, a $2 billion private equity firm specializing in the technology sector. For more information, visit www.safenet-inc.com. www.safenet-inc.com Corporate Headquarters: 4690 Millennium Drive, Belcamp, Maryland 21017 USA Tel: +1 410 931 7500 or 800 533 3958, Fax: +1 410 931 7524, Email: info@safenet-inc.com EMEA Headquarters: Tel: +44 (0) 1276 608 000, Email: info.emea@safenet-inc.com APAC Headquarters: Tel: +852 3157 7111, Email: info.apac@safenet-inc.com For all office locations and contact information, please visit www.safenet-inc.com/company/contact.asp 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. WP-SMS Authentication-06.08.10