SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
What are the  Challenges of  Securing Identities  online?
Entrust is a World Leader in Identity Management and Security Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Service Uptake Critical US Banking Delivery Transactions by Channel (2006-10p) May 31, 2008
Online Service Uptake Critical Cost per Transaction (US $) May 31, 2008
We Provide Identity-Based Security for: Consumers Enterprises Citizens Web Sites Online banking users, e-commerce site customers Travelers, and those accessing government services, in person or online Web servers (external and internal), email servers and code being distributed online Business and government employees, contractors, first responders, and devices
Consumer Authentication
Consumer Auth Problems Ongoing attacks against FI’s Corporate accounts being targeted Malware growing fast, hard to detect with Anti-Virus End-users often resist strong auth Source: Anti-Phishing Working Group, July/09 Man in the Middle Attacker Man in the Browser Malware
Consumer Authentication: Entrust Solution Flexible range of authenticators Across spectrum of security / usability Zero-touch fraud detection to spot unusual activity and stop malware Man in the Middle Attacker Man in the Browser Malware Username & Password Mutual Authentication IP Geolocation Device Fingerprint Knowledge-Based Authentication Grid Card / eGrid One-Time Password Tokens Out of Band Auth via SMS or Email Digital Certificates Smart Cards
Enterprise Authentication
Enterprise Identities: Problems Protect access to intellectual property and customer data Work from anywhere Stay out of employees’ way Audit access to resources Reduce transaction costs by moving online Employees Partners Contractors Other Businesses Mobile Devices Other internal Servers & Devices # of IDs 2000 2010
Enterprise Identities: Entrust’s Solution Broad range of authentication credentials For users, servers, devices Enables encryption and digital signature with strong identity Employees Partners Contractors Other Businesses Mobile Devices Other internal Servers & Devices
Web Site Authentication
Web site authentication: Problems Phishing attacks and other fraud often involve counterfeit websites Users cannot easily detect fake sites Numerous servers for IT staff to keep track of, ensuring no certificate expiries Expense of certs for numerous servers Customers, Employees Mobile Users Web servers, Exchange, Applications
Web site authentication: Entrust Solution SSL certificates for web sites, MS Exchange, code signing, Adobe PDF Stringent verification to prevent brand theft Helps user verify they are at correct site Enables browser to provide some automated protection Powerful certificate management tools Customers Mobile Users Entrust Verification
Identity-Based Security: a Layered Approach People, Servers,  Devices, Applications Credential issuance, audit,  lifecycle management Credential use, step-up, ongoing transaction analysis, and forensics
Entrust IdentityGuard ,[object Object],[object Object],[object Object],Username & Password Grid Versatile Authentication Platform Scratch Pad Digital Certificates OTP Tokens Smartcards & USB Tokens Mutual Auth IP-Geolocation Machine/ Device Auth Mobile Knowledge-Based
IP Geolocation ,[object Object],[object Object],[object Object]
Machine Authentication ,[object Object],[object Object],[object Object],IP: 216.191.253.108  Browser: IE 7.0 Screen Depth: 1024 … . …
Digital Certificates ,[object Object],[object Object],[object Object],[object Object]
Multiple Identities, one device Mix of Soft token only and Transaction Notification Independent activation and control Customizable branding per identity Mobile Authentication & Transaction Notification
OATH compliant Time-based soft token 30 second time window Brandable interface IDG Mobile – Soft Token
IDG Mobile - with Transaction Notification OATH Time-based Soft Token Transaction details confirmed out of band on mobile device No data entry OATH signature of transaction contents User confirms transaction or acts on suspect details
Soft Token Mobile Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Knowledge Authentication ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Grid Authentication C  2  3
Mini Tokens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pocket Tokens ,[object Object],[object Object],[object Object]
DisplayCard Tokens ,[object Object],[object Object],[object Object]
Mutual Authentication ,[object Object],[object Object],[object Object],Serial Number Replay Extended Validation Certificates Image  & Message Replay
Policy   & User Management Web based Administration
Reporting ,[object Object],[object Object]
Integrating IdentityGuard Remote Access Applications Microsoft Windows Servers End User Web Authentication Applications Enterprise Applications & Data Repository
2 nd  Factor Authentication Authentication  Platform Online  Application   Initial Logon User Name? Password? 2 nd  Factor Authentication 2 nd  Factor Challenge
Application: Remote Access End User Remote Access Applications ,[object Object],[object Object],[object Object]
Application: Enterprise Desktops & Servers End User Enterprise Servers Microsoft  Windows Desktops Administrators ,[object Object],[object Object],[object Object],Any user **** 1 6 3
Application: Extranet Access End User Web Authentication Applications ,[object Object],[object Object],[object Object]
Easily Extends across Enterprise Applications ,[object Object],[object Object],[object Object],AnyUser ******
IdentityGuard 2 nd  Factor Protection Remote Access Enterprise Servers Microsoft Desktops Extranet Access
Integrating IdentityGuard Remote Access Applications Microsoft Windows Servers End User Web Authentication Applications Enterprise Applications & Data Repository
Integrated with Leading Technology Partners Applications Application / Infrastructure  Remote Access  Platform
SSL VPN: Juniper
Web Application Integration ,[object Object],[object Object],[object Object],Customer Environment Existing Authentication/ Sign-on Application SSL SOAP
Microsoft Desktop & Server Integration ,[object Object],[object Object],[object Object],Existing Active Directory Enterprise Applications & Network Resources
Remote Access Integration ,[object Object],[object Object],Existing Remote Access Gateway (IP-SEC or SSL) Radius Directory  UN/PW auth with Active Directory or LDAP
Remote Access Authentication Flow VPN Client or Web Browser Remote Access Gateway 1. User enters authentication credentials 2 .  User credentials sent to IdentityGuard 4 .  IdentityGuard  challenge requested & presented 5. IdentityGuard  response sent to IG server 6. IdentityGuard  server returns accept/reject to VPN Client Repository 7. Success allows user entry  3 .  User credentials validated against directory
Repository Integration ,[object Object],[object Object],[object Object],JNDI SSL Directory Database
Thank you!

Contenu connexe

Tendances

STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSRapidSSLOnline.com
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Alliance
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management ProviderPriyanka Agarwal
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 

Tendances (19)

Access management
Access managementAccess management
Access management
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management Provider
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 

Similaire à ISS SA le presenta IdentityGuard de Entrust

ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxArchana833240
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...Nuno Árias Silva
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service Nya
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...Nuno Árias Silva
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 

Similaire à ISS SA le presenta IdentityGuard de Entrust (20)

ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
TugaIT 2017 Office 365 Multi-factor authentication with Microsoft Azure Activ...
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
SPSLisbon 2017 Office 365 Multi-factor Authentication with Microsoft Azure Ac...
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Information Security
Information SecurityInformation Security
Information Security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 

Plus de Information Security Services SA

Plus de Information Security Services SA (12)

Catalogo DMS
Catalogo DMSCatalogo DMS
Catalogo DMS
 
ISS SA Protección de la Información e Identidad
ISS SA Protección de la Información e IdentidadISS SA Protección de la Información e Identidad
ISS SA Protección de la Información e Identidad
 
ISS SA Comunicado de Prensa sobre Entrust
ISS SA Comunicado de Prensa sobre EntrustISS SA Comunicado de Prensa sobre Entrust
ISS SA Comunicado de Prensa sobre Entrust
 
ISS SA Reseña de sus Soluciones Julio 2011
ISS SA Reseña de sus Soluciones Julio 2011ISS SA Reseña de sus Soluciones Julio 2011
ISS SA Reseña de sus Soluciones Julio 2011
 
ISS S.A: le presenta Spector Pro de SpectorSoft
ISS S.A: le presenta Spector Pro de SpectorSoftISS S.A: le presenta Spector Pro de SpectorSoft
ISS S.A: le presenta Spector Pro de SpectorSoft
 
ISS S.A. le presenta Spector 360 de SpectorSoft
ISS S.A. le presenta Spector 360 de SpectorSoftISS S.A. le presenta Spector 360 de SpectorSoft
ISS S.A. le presenta Spector 360 de SpectorSoft
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
 
ISS SA: Autenticación de dos Factores para Consumidores
ISS SA: Autenticación de dos Factores para ConsumidoresISS SA: Autenticación de dos Factores para Consumidores
ISS SA: Autenticación de dos Factores para Consumidores
 
ISS SA: Spector360 Funcionalidad para Mantener la privacidad
ISS SA: Spector360 Funcionalidad para Mantener la privacidadISS SA: Spector360 Funcionalidad para Mantener la privacidad
ISS SA: Spector360 Funcionalidad para Mantener la privacidad
 
ISS SA le Presenta Spector 360 de SpectorSoft
ISS SA le Presenta Spector 360 de SpectorSoftISS SA le Presenta Spector 360 de SpectorSoft
ISS SA le Presenta Spector 360 de SpectorSoft
 
ISS SA: Lo nuevo en la Version 5.5 de UserLock
ISS SA: Lo nuevo en la Version 5.5 de UserLockISS SA: Lo nuevo en la Version 5.5 de UserLock
ISS SA: Lo nuevo en la Version 5.5 de UserLock
 
ISS SA le Presenta UserLock de IS Decisions
ISS SA le Presenta UserLock de IS DecisionsISS SA le Presenta UserLock de IS Decisions
ISS SA le Presenta UserLock de IS Decisions
 

Dernier

QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 

Dernier (20)

QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 

ISS SA le presenta IdentityGuard de Entrust

  • 1. What are the Challenges of Securing Identities online?
  • 2.
  • 3. Online Service Uptake Critical US Banking Delivery Transactions by Channel (2006-10p) May 31, 2008
  • 4. Online Service Uptake Critical Cost per Transaction (US $) May 31, 2008
  • 5. We Provide Identity-Based Security for: Consumers Enterprises Citizens Web Sites Online banking users, e-commerce site customers Travelers, and those accessing government services, in person or online Web servers (external and internal), email servers and code being distributed online Business and government employees, contractors, first responders, and devices
  • 7. Consumer Auth Problems Ongoing attacks against FI’s Corporate accounts being targeted Malware growing fast, hard to detect with Anti-Virus End-users often resist strong auth Source: Anti-Phishing Working Group, July/09 Man in the Middle Attacker Man in the Browser Malware
  • 8. Consumer Authentication: Entrust Solution Flexible range of authenticators Across spectrum of security / usability Zero-touch fraud detection to spot unusual activity and stop malware Man in the Middle Attacker Man in the Browser Malware Username & Password Mutual Authentication IP Geolocation Device Fingerprint Knowledge-Based Authentication Grid Card / eGrid One-Time Password Tokens Out of Band Auth via SMS or Email Digital Certificates Smart Cards
  • 10. Enterprise Identities: Problems Protect access to intellectual property and customer data Work from anywhere Stay out of employees’ way Audit access to resources Reduce transaction costs by moving online Employees Partners Contractors Other Businesses Mobile Devices Other internal Servers & Devices # of IDs 2000 2010
  • 11. Enterprise Identities: Entrust’s Solution Broad range of authentication credentials For users, servers, devices Enables encryption and digital signature with strong identity Employees Partners Contractors Other Businesses Mobile Devices Other internal Servers & Devices
  • 13. Web site authentication: Problems Phishing attacks and other fraud often involve counterfeit websites Users cannot easily detect fake sites Numerous servers for IT staff to keep track of, ensuring no certificate expiries Expense of certs for numerous servers Customers, Employees Mobile Users Web servers, Exchange, Applications
  • 14. Web site authentication: Entrust Solution SSL certificates for web sites, MS Exchange, code signing, Adobe PDF Stringent verification to prevent brand theft Helps user verify they are at correct site Enables browser to provide some automated protection Powerful certificate management tools Customers Mobile Users Entrust Verification
  • 15.
  • 16. Identity-Based Security: a Layered Approach People, Servers, Devices, Applications Credential issuance, audit, lifecycle management Credential use, step-up, ongoing transaction analysis, and forensics
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Multiple Identities, one device Mix of Soft token only and Transaction Notification Independent activation and control Customizable branding per identity Mobile Authentication & Transaction Notification
  • 22. OATH compliant Time-based soft token 30 second time window Brandable interface IDG Mobile – Soft Token
  • 23. IDG Mobile - with Transaction Notification OATH Time-based Soft Token Transaction details confirmed out of band on mobile device No data entry OATH signature of transaction contents User confirms transaction or acts on suspect details
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Policy & User Management Web based Administration
  • 32.
  • 33. Integrating IdentityGuard Remote Access Applications Microsoft Windows Servers End User Web Authentication Applications Enterprise Applications & Data Repository
  • 34. 2 nd Factor Authentication Authentication Platform Online Application   Initial Logon User Name? Password? 2 nd Factor Authentication 2 nd Factor Challenge
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. IdentityGuard 2 nd Factor Protection Remote Access Enterprise Servers Microsoft Desktops Extranet Access
  • 40. Integrating IdentityGuard Remote Access Applications Microsoft Windows Servers End User Web Authentication Applications Enterprise Applications & Data Repository
  • 41. Integrated with Leading Technology Partners Applications Application / Infrastructure Remote Access Platform
  • 43.
  • 44.
  • 45.
  • 46. Remote Access Authentication Flow VPN Client or Web Browser Remote Access Gateway 1. User enters authentication credentials 2 . User credentials sent to IdentityGuard 4 . IdentityGuard challenge requested & presented 5. IdentityGuard response sent to IG server 6. IdentityGuard server returns accept/reject to VPN Client Repository 7. Success allows user entry 3 . User credentials validated against directory
  • 47.

Notes de l'éditeur

  1. BUILDS: It’s a layered approach to protection, because there is no silver bullet, no one technique that meets threats today or going forward. First, you use an authentication platform that lets you mix and match a wide range of authenticators, to meet the cost, usability and security demands. [click] then that platform manages the lifecycle of these credentials, issuing them to people and machines [click] and, as those credentials are used, the banks constantly monitor transaction activity and step-up authentication as required
  2. Any standard x.509 certificate (Entrust, Microsoft, Verisign…)
  3. Easy to use and support Standards-based (Radius, J2EE, Web Services) Integrated with leading applications & environments Full web management
  4. Easy to use and support Standards-based (Radius, J2EE, Web Services) Integrated with leading applications & environments Full web management
  5. Easy to use and support Standards-based (Radius, J2EE, Web Services) Integrated with leading applications & environments Full web management
  6. Easy to use and support Standards-based (Radius, J2EE, Web Services) Integrated with leading applications & environments Full web management
  7. Easy to use and support Standards-based (Radius, J2EE, Web Services) Integrated with leading applications & environments Full web management
  8. Easy to use and support Standards-based (Radius, J2EE, Web Services) Integrated with leading applications & environments Full web management