Security Solutions for Mobile Users in the Workplace

Similar documents
As Enterprise Mobility Usage Escalates, So Does Security Risk

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Cisco Start. IT solutions designed to propel your business

Mobile Device Management: A Real Need for the Mobile World

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

Using Biometric Authentication to Elevate Enterprise Security

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

The Little Fuchsia Book of HPE Data Center Solutions

Single Secure Credential to Access Facilities and IT Resources

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Dissecting NIST Digital Identity Guidelines

Five Reasons It s Time For Secure Single Sign-On

AKAMAI CLOUD SECURITY SOLUTIONS

Mobile Security / Mobile Payments

Cloud Security, Mobility and Current Threats. Tristan Watkins, Head of Research and Innovation

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

RELATIONSHIP WITH KONICA MINOLTA

RHM Presentation. Maas 360 Mobile device management

Identity Management as a Service

How Next Generation Trusted Identities Can Help Transform Your Business

Fujitsu World Tour 2016

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

BIG IDEAS FOR SmAll BuSInESS:

The Future of Network Infrastructure & Management

Accessing CharityMaster data from another location

Challenges and. Opportunities. MSPs are Facing in Security

HID Mobile Access. Simple. Secure. Smart.

CREATE A CONCENTRATION ZONE TO BOOST FOCUS AND PRODUCTIVITY.

WHITEPAPER. How to secure your Post-perimeter world

device management solution

2013 InterWorks, Page 1

Make security part of your client systems refresh

Sales Presentation Case 2018 Dell EMC

WHITE PAPER Migrating to Windows 10: a practical guide

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

KONICA MINOLTA MOBILE PRINTING SOLUTIONS

Securing Today s Mobile Workforce

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Six Ways to Protect your Business in a Mobile World

Go mobile. Stay in control.

INDIA The Changing Face of the Workplace: Going Light and Mobile

Internet of Things Toolkit for Small and Medium Businesses

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

The security challenge in a mobile world

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Network. Arcstar Universal One

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

IT professionals are grappling with

Securing Digital Transformation

Authentication Technology for a Smart eid Infrastructure.

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Shadow IT in the Enterprise

Kickstart. Overview. Oct 2017

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

PLATFORM CONVERGENCE JOURNEY

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

The Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp

Mobile Security Trends in the Workplace

Milton State School BYOD Frequently Asked Questions

The Next Generation of Credential Technology

YOUR CONDUIT TO THE CLOUD

Google Identity Services for work

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

with Advanced Protection

Symantec Endpoint Protection Cloud (SEPC)

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Security Challenges: Integrating Apple Computers into Windows Environments

Key Authentication Considerations for Your Mobile Strategy

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

SOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All?

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Cyber Security: It s all about TRUST

SmarterMail v. Exchange: Admin Comparison

Securing Identities in the Cloud: Simple Methods, Satisfied Customers VASCO Data Security

iclass SE Platform Solutions The New Standard in Access Control

Maximize your move to Microsoft in the cloud

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Understanding Office 365: Is A Cloud Based Solution Right For Your Business?

Why is Office 365 the right choice?

Transcription:

Security Solutions for Mobile Users in the Workplace 1 1

Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing capital costs while making company resources available to a global workforce. Gartner estimates that more than 50 percent of organizations will have moved to cloud-based services by 2017. At the same time, the popularity of mobile devices has blurred the line between office and home. According to recent research from Forrester 1, global tablet and smartphone use in the enterprise is rising: nearly 20% of worldwide tablet purchases will be made directly by enterprises by 2017, allowing employees to more easily access company documents as they move from the office to home and all points in between. 2 1 Global Business And Consumer Tablet Forecast Update, 2013 To 2017. Forrester Research. 2

19% in lost revenue Mobile devices change the security landscape In a cloud-based mobile world, users need solutions that enable quick access to information and services. Current authentication methods, designed for use with keyboards, are awkward or sometimes just not possible with mobile devices. Furthermore, the growth of bring-your-own-device (BYOD) in the workplace increases security risks for an organization. According to a 2015 study by HID Global and Tech Target of global IT professionals, nearly half of the respondents responded that increased mobility has significantly increased their risk for security breaches and/or data loss. Both IT managers and the end users they support need authentication solutions that enable them to be productive quickly without typing in additional codes or keywords. Employers need to balance providing a simple and friendly user experience with protecting company assets from malware, loss and theft. This e-book describes the security landscape for mobile devices and how near field communications can improve the user experience on mobile devices while allowing companies to protect their assets and manage costs efficiently. 21% in lost productivity 29% reduction in reputation management 2 2 2014 IBM Security 3 Services Cyber Security Intelligence Index Report 3

Current Security Solutions for Mobile Devices All organizations want to validate the identity of people accessing company data and make sure they have the rights to do so. But existing authentication methods don t mesh well with mobile devices. Two-factor authentication Two-factor authentication combines single sign-on authentication (a combination of user name and password) with a one-time password (OTP) generated by a hardware device, email or text. The unique password provides an additional level of security to the single sign-on process. But typing passwords using a phone or tablet isn t easy. Companies typically require complex passwords and on a mobile device that means switching between character, numeric and special character keyboards to enter a password. If a user has to connect a hardware device to generate an OTP password or wait for an email or text, the process can take even longer. Single and two-factor authentication protocols are also prone to phishing attacks. 4 4

Smart card and certificates Based on asymmetric cryptography, smart cards and certificates provide a high level of security. These solutions require a reader for authentication, which is often not physically possible with a mobile device. Reader sleeves for mobile devices are available, but are bulky to use. Costing between $100 and $200 per sleeve, the sleeves are expensive solutions for an organization to buy and manage. 5 5

How Near Field Communications Works on Mobile devices Near field communications (NFC) is a wireless communications protocol based on ISO Radio Frequency Identification (RFID) standards. NFC doesn t require a discovery and pairing stage, so the connection time is as quick as 0.1 milliseconds. In comparison, the connection time for a Bluetooth connection is approximately six seconds (www.nfc-forum.org). Using NFC technology, two smart phones can exchange contacts, photos and other information with each other. Users with NFC-enabled phones can pay for purchases and store electronic airline boarding passes, event tickets, and product identification among other uses. NFC-based applications are used in retail, health care, green technology, automotive and education, as well as other markets. Friendly user experience NFC chips are embedded in smart phones, mobile devices and laptops. According to RapidNFC, the top 10 phone manufacturers all sell mobile devices with built-in NFC technology. The experience is familiar and simple for end users. They only need to tap their phone against another device. 6 6

Designed for protection NFC is fundamentally secure because it only works at extremely short ranges, from point of touch to a few centimeters. A hacker would have to stand uncomfortably close to piggyback on the signal of a nearby mobile device user. Furthermore, the integrated circuit in NFC devices are architected with security mechanisms beyond normal processors. Each circuit is designed with a unique digital signature for protection against both software and hardware attacks. 7 7

Security Solutions for the Mobile Workforce ActivID Tap Authentication from HID Global In the workplace, employees expect access to cloud applications, data and services anywhere and everywhere. HID Global, a leader in creating and managing secure identities, uses NFC technology to deliver a fast authentication experience that replaces twofactor, OTP passwords on mobile devices. Simplifying the User Experience The ActivID Tap Authentication solution confirms the identity of a unique user using the same card for both physical and virtual access. A user can access cloud applications and services on phones, tablets, and laptops in seconds with just a tap of the same card used to enter a building. Delivering business value 8 For organizations already using smart cards for physical access, ActivID Tap Authentication can save them the cost of investing and managing additional hardware. Because ActiveID Tap Authentication uses the cloud to authenticate users, organizations can move to a subscription-based model instead of the perpetual license model common with older authentication methods. Pricing for ActivID Tap Authentication is $2 per user per month with a minimum 12-month subscription, making security protection accessible for businesses of every size. 8

The HID and Microsoft Partnership The ActivID Tap Authentication platform is integrated into the Microsoft Active Directory Federated Services environment and Microsoft Windows Server 2012 R2. It s a simple three-step process to connect, saving the expense of hiring professional services. ActivID Tap Authentication works with Microsoft Office 365, Salesforce.com and more than 2,200 other cloud applications. The solution is available in the My Apps portal, enabling users access to cloud applications with a single user account hosted in Microsoft Azure Active Directory. 9 9

Summary Together, HID and Microsoft enable secure, real-time authentication for mobility users. ActivID Tap Authentication leverages the security features of NFC technology and works with Azure Authentication and the power of the Azure Active Directory to provide end users with safe and convenient access, no matter what device they happen to be using. This unique solution gives IT managers better visibility and control of authenticated users and a single point of revocation, reducing security risks, enabling them to embrace BYOD, and realize cost savings through the use of existing cards and credentials. For both the end user and IT manager, ActivID Tap Authentication makes security simpler, easier and faster. READY TO LEARN MORE? 10 2017 HID Global Corporation/ASSA ABLOY AB. All rights reserved. 2017-08-09-hid-ms-azure-partnership-eb-en PLT-02547 10