SlideShare une entreprise Scribd logo
1  sur  24
© 2014 SecureAuth. All rights reserved.
2
Introduction……………………………………...…Steve Spaun
Channel Systems Overview and
The New Threat Landscape…………………..…Rick Geary
The Past, Present, and Future of
Authentication……………………………………..Milton Keath
Q&A……………………………………………...…Audience
Agenda and Speakers
© 2014 SecureAuth. All rights reserved.
©2012 Channel Systems, LLC. All Rights Reserved.
networking security storage mobility
Our Model
Our Goalis to educate and take a true Trusted Advisor approach to
help our customers solve complex use cases.
Our Focusis to continually represent some of the fastest growing and
game changing manufacturer’s technologies in Networking, Security,
Mobility and Storage.
Our Valueis to help our customers reduce risk, reduce cost, improve
business processes, centralize with an attractive Return on Investment
(ROI).
Our Visionis to continually be your analyst by doing research and due
diligence on new and upcoming Infrastructure technologies to add to
our portfolio that may help our customers.
Our Commitmentis to provide the best service and on time delivery
with the highest level of customer satisfaction.
.
TechnologyClients
OUR SOLUTIONS
We provide our clients with the best data center solutions in network, security, performance storage
and the endpoint.
Security Solutions Network Solutions
Advanced Malware Detection Access Control
Next Gen Firewall Wireless/WLAN
Database Firewall Load Balancers
Next-Gen NAC Core Network Services
Web App Firewall Gigabit Switches
Data Leakage Prevention Network Monitoring
Security Posture Management Change & Configuration Management
Security Information Event Mgmt Application Performance Monitoring
Identity Management WAN Optimization
Site-to-Site Encryption Routers and Switches
Mobility Performance Storage
Any Device; Any O/S; Any Application 100% Flash Array
Application Control NAS / SAN
Device Control 10X-50X Faster
Patch and Remediation 10X Smaller
Configuration Management 10X Less Power Consumption
Power Management 10X Easier
Antivirus Game-changing Performance
Disk Encryption Less Cost Than Spinning Disk
Identity & Threat Management Enterprise Reliability
Email & Content Management
The New Threat Landscape
© 2014 SecureAuth. All rights reserved.
2/3 of U.S. firms
report that
they have been the
victim of cyber attacks
40%
of all IT executives
expect a major
cybersecurity incident
115% CAGR
unique malware
since 2009
9,000+
malicious websites
identified per day
00.01 Every second 14 adults become a
victim of cyber crime
6.5xNumber of cyber
attacks since 2006
95new vulnerabilities
discovered each week
The IT Problem
NEW THREAT LANDSCAPE
Dynamic,
Polymorphic MalwareCoordinated Persistent Threat Actors
Multi-Vector Attacks Multi-Staged Attacks
Not Secure! What’s Changed?
© 2014 SecureAuth. All rights reserved.
10
Lets go back in history
At One Time… early 90s
The Analyst/Experts felt the ONLY way to
solve software distribution was:
• System Management Services or
• Service Oriented Management Systems
That is:
A centralized software distribution server
That kept all the “Thick Clients’ up to date
For all your latest apps
• Borland
• Sybase
• dBase
• Powerbuilder
Then:
• Every time the system needed to update
authentication and workflow:
• The CENTERALIZED server
• PUSHED to all the CONTROLLED
CLIENTS
Pretty dated Stuff, eh?
1995 Chrysler K-Car
© 2014 SecureAuth. All rights reserved.
11
Lets go back in history (cont)
 ISAPI (and other connectors) are old school
 They cause real issues in web deployments:
o Performance – they really degrade performance
o Functionality – They often break existing web and
operating functionality
o Maintenance – They require to be upgraded when web
site/app server are upgraded
• THIS IS THE #1 COMPLAINT FROM ENTERPRISES
However, in Mid 90’s web agents such as ISAPI filters
came out and WAM tools are still using them today.
1996 Hit
© 2014 SecureAuth. All rights reserved.
12
Lets go back in history (cont)
What Saved Us… mid 90’s and turn of the
Century
Was the Web
• Clientless Software
• Server Controlled Software
• No Thick Clients to update
• No devices to manage
And:
• WAMs: (Web Access Management)
• Centralized/Abstracted Web:
• SSO
• AuthN
• AuthZ
The Solution
• Allowed for access control
• To MILLIONS of Users
• And quantified/ access
• AuthN, AuthZ, Audit
• NO CLIENT UPDATES
This is at least, better, no?
2002 Toyota Celica
© 2014 SecureAuth. All rights reserved.
13
Lets go back in history (cont)
But, still have agents/connectors/filters.
This is where the ONESIES come in. Integrators come in and hack
a solution together. And what happens when a requirement changes
after 6 months?
Have to undo previous integration.
Have to pay for agent upgrades.
Authentication (2FA) and Trust (SSO) were treated as two
separate solutions.
© 2014 SecureAuth. All rights reserved.
TPAR (Target, Proxy, Authentication, Proxy)
© 2014 SecureAuth. All rights reserved.
15
3 Steps to Typical Enterprise Architecture
1. Development Team creates project
2. Enterprise Architecture Team designs workflow
A. You have to do SSO
B. What type of directory
C. How does it integrate into Apps and user Devices
D. All decisions are based on the 3 R’s
i. Roles
ii. Resources
iii. Regulations
3. Then the deployment guy has to do the integration
© 2014 SecureAuth. All rights reserved.
16
BUT
6 months later something changes
which can require major rewrite
© 2014 SecureAuth. All rights reserved.
17
AUTHENTICATION CHALLENGE
ENTERPRISES FACE
1XID
DEVICE
PASSWORD
FEW APPLICATIONS
2005
ENTERPRISE USERS:
2014
ENTERPRISE USERS:
nXIDS
DEVICES
PASSWORDS
MANY APPLICATIONS
VS.
BYOD
© 2014 SecureAuth. All rights reserved.
18
Most have heard of the AAA’s of Security
Authentication Authorization Accounting
Now there are actually 5 A’s of Security
Accept Authorization Authentication Accounting Assert
We will go more
in depth later about
TRAR along with the 5 and 6 A’s
Authentication and Trust in One Solution
© 2014 SecureAuth. All rights reserved. 2014 Chevy Volt
TRAR (Target, Redirect, Authentication, Redirect)
{Without Agents or Proxies}
Combining both
© 2014 SecureAuth. All rights reserved.
20
Present and very near Future
· Geo Fencing
· Geo Velocity
· IP Reputation
· Threat Intelligence
· TOR, Robot, Anonymizer proxy detection
Authentication, Risk Analysis, and Trust in One Solution
© 2014 SecureAuth. All rights reserved.
50th Anniversary
2015 Mustang
A classic just got better
Future of
Authentication
© 2014 SecureAuth. All rights reserved.
© 2014 SecureAuth. All rights reserved.
In a not too distant future
· Backend Attribute Exchange
Enterprise hosted data on demand through the cloud
· Combining Authentication, Big Data, Risk Analysis,
Business Intelligence and Trust together
Elio
Forward Thinking
© 2012 SecureAuth. All rights reserved.23
You have an opportunity to win an Amazon gift card
towards a 3D phone.
Schedule, by July 18th 2014, a webinar/technical demo
with Channel Systems for a SecureAuth demo and your
name will be entered into a drawing for the phone.
Please send your request to solutions@channelsys.com.
Channel Systems Certified partner of SecureAuth
24
Q&A
Who Title E-mail Phone
Steve Spaun Vice President sspaun@channelsys.com +1.817.475.5850
Rick Geary President rick@channelsys.com +1.919.699.0180
Milton Keath Sr. Sales
Engineer
milton@secureauth.com +1.817.200.7566
SecureAuth
Sales
SecureAuth
Sales
sales@secureauth.com +1.949.777.6959
Contest Entry Amazon 3D
Phone
solutions@channelsys.com
© 2014 SecureAuth. All rights reserved.

Contenu connexe

Tendances

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP MarketSolarwinds N-able
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
Hackers Locked
Hackers Locked Hackers Locked
Hackers Locked Sam S
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureCprime
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecurityFlexera
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways IISPEastMids
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferberMoshe Ferber
 

Tendances (20)

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Hackers Locked
Hackers Locked Hackers Locked
Hackers Locked
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance Security
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
 
Sophos 2010
Sophos 2010 Sophos 2010
Sophos 2010
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 

En vedette

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presentionrodrida1
 
271 300 - st-flash
271 300 - st-flash271 300 - st-flash
271 300 - st-flashDonGilgamesh
 
La Letra Chica / Small Print
La Letra Chica / Small PrintLa Letra Chica / Small Print
La Letra Chica / Small Printjimenezgustavo
 
Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)Liburutegiak Kultura Saila
 
IvaBelovariZivotopis
IvaBelovariZivotopisIvaBelovariZivotopis
IvaBelovariZivotopisIva Belovari
 
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012Grupo ROP Argentina
 
Techos sandwich Autoportantes
Techos sandwich AutoportantesTechos sandwich Autoportantes
Techos sandwich AutoportantesAzul Talleres
 
Tendencias Social Media 2016
Tendencias Social Media 2016Tendencias Social Media 2016
Tendencias Social Media 2016Adsmurai
 
Presentación 1º secundaria - CCA
Presentación 1º secundaria - CCAPresentación 1º secundaria - CCA
Presentación 1º secundaria - CCAKin Camp
 
Estrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de MarketingEstrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de MarketingGermán Piñeiro Vázquez
 
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany IP-ShareMedia UG (haftungsbeschränkt)
 
Revista Forever Decembrie
Revista Forever DecembrieRevista Forever Decembrie
Revista Forever DecembrieIuliana Fartade
 
E4U Screening Service
E4U Screening ServiceE4U Screening Service
E4U Screening Servicemadhu54321
 
Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1guestab659f
 
SBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPTSBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPTEight Trails
 

En vedette (20)

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
271 300 - st-flash
271 300 - st-flash271 300 - st-flash
271 300 - st-flash
 
La Letra Chica / Small Print
La Letra Chica / Small PrintLa Letra Chica / Small Print
La Letra Chica / Small Print
 
Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)
 
IvaBelovariZivotopis
IvaBelovariZivotopisIvaBelovariZivotopis
IvaBelovariZivotopis
 
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
 
Techos sandwich Autoportantes
Techos sandwich AutoportantesTechos sandwich Autoportantes
Techos sandwich Autoportantes
 
Tendencias Social Media 2016
Tendencias Social Media 2016Tendencias Social Media 2016
Tendencias Social Media 2016
 
Presentación 1º secundaria - CCA
Presentación 1º secundaria - CCAPresentación 1º secundaria - CCA
Presentación 1º secundaria - CCA
 
Estrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de MarketingEstrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de Marketing
 
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
 
Revista Forever Decembrie
Revista Forever DecembrieRevista Forever Decembrie
Revista Forever Decembrie
 
E4U Screening Service
E4U Screening ServiceE4U Screening Service
E4U Screening Service
 
Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1
 
SBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPTSBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPT
 

Similaire à Advanced Authentication: Past, Present, and Future

Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxssuserba2d14
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile ComputingE Radar
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraVistara
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzSeniorStoryteller
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Codemotion
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolDavid Castro
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingJoshuaCiccone2
 
MindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationMindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationBrad Skeel
 

Similaire à Advanced Authentication: Past, Present, and Future (20)

Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptx
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile Computing
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
MindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationMindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_Presentation
 

Plus de SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationSecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationSecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOSecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017SecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceSecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2SecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationSecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 

Plus de SecureAuth (20)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 

Dernier

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Dernier (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Advanced Authentication: Past, Present, and Future

  • 1. © 2014 SecureAuth. All rights reserved.
  • 2. 2 Introduction……………………………………...…Steve Spaun Channel Systems Overview and The New Threat Landscape…………………..…Rick Geary The Past, Present, and Future of Authentication……………………………………..Milton Keath Q&A……………………………………………...…Audience Agenda and Speakers © 2014 SecureAuth. All rights reserved.
  • 3. ©2012 Channel Systems, LLC. All Rights Reserved. networking security storage mobility
  • 4. Our Model Our Goalis to educate and take a true Trusted Advisor approach to help our customers solve complex use cases. Our Focusis to continually represent some of the fastest growing and game changing manufacturer’s technologies in Networking, Security, Mobility and Storage. Our Valueis to help our customers reduce risk, reduce cost, improve business processes, centralize with an attractive Return on Investment (ROI). Our Visionis to continually be your analyst by doing research and due diligence on new and upcoming Infrastructure technologies to add to our portfolio that may help our customers. Our Commitmentis to provide the best service and on time delivery with the highest level of customer satisfaction. . TechnologyClients
  • 5. OUR SOLUTIONS We provide our clients with the best data center solutions in network, security, performance storage and the endpoint. Security Solutions Network Solutions Advanced Malware Detection Access Control Next Gen Firewall Wireless/WLAN Database Firewall Load Balancers Next-Gen NAC Core Network Services Web App Firewall Gigabit Switches Data Leakage Prevention Network Monitoring Security Posture Management Change & Configuration Management Security Information Event Mgmt Application Performance Monitoring Identity Management WAN Optimization Site-to-Site Encryption Routers and Switches Mobility Performance Storage Any Device; Any O/S; Any Application 100% Flash Array Application Control NAS / SAN Device Control 10X-50X Faster Patch and Remediation 10X Smaller Configuration Management 10X Less Power Consumption Power Management 10X Easier Antivirus Game-changing Performance Disk Encryption Less Cost Than Spinning Disk Identity & Threat Management Enterprise Reliability Email & Content Management
  • 6. The New Threat Landscape © 2014 SecureAuth. All rights reserved.
  • 7. 2/3 of U.S. firms report that they have been the victim of cyber attacks 40% of all IT executives expect a major cybersecurity incident 115% CAGR unique malware since 2009 9,000+ malicious websites identified per day 00.01 Every second 14 adults become a victim of cyber crime 6.5xNumber of cyber attacks since 2006 95new vulnerabilities discovered each week The IT Problem
  • 8. NEW THREAT LANDSCAPE Dynamic, Polymorphic MalwareCoordinated Persistent Threat Actors Multi-Vector Attacks Multi-Staged Attacks Not Secure! What’s Changed?
  • 9. © 2014 SecureAuth. All rights reserved.
  • 10. 10 Lets go back in history At One Time… early 90s The Analyst/Experts felt the ONLY way to solve software distribution was: • System Management Services or • Service Oriented Management Systems That is: A centralized software distribution server That kept all the “Thick Clients’ up to date For all your latest apps • Borland • Sybase • dBase • Powerbuilder Then: • Every time the system needed to update authentication and workflow: • The CENTERALIZED server • PUSHED to all the CONTROLLED CLIENTS Pretty dated Stuff, eh? 1995 Chrysler K-Car © 2014 SecureAuth. All rights reserved.
  • 11. 11 Lets go back in history (cont)  ISAPI (and other connectors) are old school  They cause real issues in web deployments: o Performance – they really degrade performance o Functionality – They often break existing web and operating functionality o Maintenance – They require to be upgraded when web site/app server are upgraded • THIS IS THE #1 COMPLAINT FROM ENTERPRISES However, in Mid 90’s web agents such as ISAPI filters came out and WAM tools are still using them today. 1996 Hit © 2014 SecureAuth. All rights reserved.
  • 12. 12 Lets go back in history (cont) What Saved Us… mid 90’s and turn of the Century Was the Web • Clientless Software • Server Controlled Software • No Thick Clients to update • No devices to manage And: • WAMs: (Web Access Management) • Centralized/Abstracted Web: • SSO • AuthN • AuthZ The Solution • Allowed for access control • To MILLIONS of Users • And quantified/ access • AuthN, AuthZ, Audit • NO CLIENT UPDATES This is at least, better, no? 2002 Toyota Celica © 2014 SecureAuth. All rights reserved.
  • 13. 13 Lets go back in history (cont) But, still have agents/connectors/filters. This is where the ONESIES come in. Integrators come in and hack a solution together. And what happens when a requirement changes after 6 months? Have to undo previous integration. Have to pay for agent upgrades. Authentication (2FA) and Trust (SSO) were treated as two separate solutions. © 2014 SecureAuth. All rights reserved. TPAR (Target, Proxy, Authentication, Proxy)
  • 14. © 2014 SecureAuth. All rights reserved.
  • 15. 15 3 Steps to Typical Enterprise Architecture 1. Development Team creates project 2. Enterprise Architecture Team designs workflow A. You have to do SSO B. What type of directory C. How does it integrate into Apps and user Devices D. All decisions are based on the 3 R’s i. Roles ii. Resources iii. Regulations 3. Then the deployment guy has to do the integration © 2014 SecureAuth. All rights reserved.
  • 16. 16 BUT 6 months later something changes which can require major rewrite © 2014 SecureAuth. All rights reserved.
  • 17. 17 AUTHENTICATION CHALLENGE ENTERPRISES FACE 1XID DEVICE PASSWORD FEW APPLICATIONS 2005 ENTERPRISE USERS: 2014 ENTERPRISE USERS: nXIDS DEVICES PASSWORDS MANY APPLICATIONS VS. BYOD © 2014 SecureAuth. All rights reserved.
  • 18. 18 Most have heard of the AAA’s of Security Authentication Authorization Accounting Now there are actually 5 A’s of Security Accept Authorization Authentication Accounting Assert We will go more in depth later about TRAR along with the 5 and 6 A’s Authentication and Trust in One Solution © 2014 SecureAuth. All rights reserved. 2014 Chevy Volt TRAR (Target, Redirect, Authentication, Redirect) {Without Agents or Proxies} Combining both
  • 19. © 2014 SecureAuth. All rights reserved.
  • 20. 20 Present and very near Future · Geo Fencing · Geo Velocity · IP Reputation · Threat Intelligence · TOR, Robot, Anonymizer proxy detection Authentication, Risk Analysis, and Trust in One Solution © 2014 SecureAuth. All rights reserved. 50th Anniversary 2015 Mustang A classic just got better
  • 21. Future of Authentication © 2014 SecureAuth. All rights reserved.
  • 22. © 2014 SecureAuth. All rights reserved. In a not too distant future · Backend Attribute Exchange Enterprise hosted data on demand through the cloud · Combining Authentication, Big Data, Risk Analysis, Business Intelligence and Trust together Elio Forward Thinking
  • 23. © 2012 SecureAuth. All rights reserved.23 You have an opportunity to win an Amazon gift card towards a 3D phone. Schedule, by July 18th 2014, a webinar/technical demo with Channel Systems for a SecureAuth demo and your name will be entered into a drawing for the phone. Please send your request to solutions@channelsys.com. Channel Systems Certified partner of SecureAuth
  • 24. 24 Q&A Who Title E-mail Phone Steve Spaun Vice President sspaun@channelsys.com +1.817.475.5850 Rick Geary President rick@channelsys.com +1.919.699.0180 Milton Keath Sr. Sales Engineer milton@secureauth.com +1.817.200.7566 SecureAuth Sales SecureAuth Sales sales@secureauth.com +1.949.777.6959 Contest Entry Amazon 3D Phone solutions@channelsys.com © 2014 SecureAuth. All rights reserved.