SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Quest® Defender Provides Secure, Affordable
Two-Factor Authentication for Oklahoma City
Oklahoma City, Okla., boasts a population of 558,000 residents and owns one of the largest city owned
and operated municipal Wi-Fi mesh network in the world. This network encompasses over 620 square
miles to date and provides access to over 150 different applications that are vital to public safety and
city operations. The city’s information technology department provides support for technology-based
communication and information systems, enabling the delivery of efficient and effective services to city
employees.
To improve the security of its networks and systems, Oklahoma City turned to Quest for a feature-rich,
two-factor authentication solution.
The Challenge
Oklahoma City’s IT department is responsible for protecting all of the city’s data. Most users, however,
used to authenticate to the system using a simple username and password, which created a serious
security risk.
“Passwords are a security issue because users don’t like to change them regularly,” said Steven Eaton,
information security manager for Oklahoma City. “In addition, if longer more complex passwords are
required, users start writing them down because they can’t remember them, defeating their purpose of
enhancing security.”
As a proactive and forward-thinking organization, the city’s IT group decided to implement security
recommendations for user access based on best practices. “We realized we needed to step up to two-
factor authentication to ensure the security of our network,” stated Eaton.
Two-factor authentication typically combines “something you know” (such as a username and password
or pin) with “something you have” (such as a smart card or hardware token) to verify that users logging in
are who they say they are.
The city already had a two-factor authentication solution in place for remote access, but it was expensive.
Moreover, it needed a solution that would integrate with Active Directory (AD), and deployed easily across
the enterprise to more than 5,000 users.
The Quest Solution
The city’s IT group carefully evaluated solutions from five major vendors. Following extensive evaluation
and testing of the technologies available, Quest Defender emerged as the clear winner. Defender
bases all administration and identity management on Active Directory, thus it could use the city’s
existing investment in AD and eliminate the costs involved in setting up and maintaining the additional
infrastructure needed for other two-factor solutions. “We try to leverage existing investments whenever
possible,” stated Eaton. “Since Defender integrates so seamlessly with Active Directory we were able to
accomplish that in addition to being able to use Active Directory as the single source for authentication
credentials and management.” Moreover, Defender works with any OATH-compliant hardware token, and
is easy to roll out.
In addition, the IT group was pleased to find that Defender was compatible with encryption software it
also planned to deploy. “We were able to get all of it to work together seamlessly, which was a big plus for
us,” reported Eaton.
“Our users like Defender better than
passwords. They recognize that it actually
saves them time since they no longer
have to remember longer more complex
passwords or call the help desk for
password resets.”
–	 Steven Eaton
	 IS Information Security Manager
	 Oklahoma City
Overview
Headquarters
Oklahoma City, Oklahoma
Services
City services
Critical Needs
To improve network security by
implementing two-factor authentication
Solution
Quest® Defender
Results
Provides affordable two-factor
•	
authentication for all employees
Improves user productivity by
•	
eliminating the need to remember
longer more complex passwords
without sacrificing security
Enabled gradual, seamless rollout, with
•	
token self-registration and temporary
token assignments
Case Study
The Bottom Line
Deployment of Defender has been nearly flawless for the city. . Because of Defender’s ZeroIMPACT
approach, the IT group has been able to perform a gradual, controlled migration to two-factor
authentication, resulting in 30% fewer issues than it had expected with other solutions. “We’ve been able
to roll out Defender department by department, which works well for us,” said Eaton. “We’ve already
deployed nearly 500 tokens, and we’ve had only two trouble calls.”
Defender’s self-registration feature has been one key to the city’s deployment success. Another is
Defender’s scripted auto install. “Defender’s deployment is virtually transparent to the end user,” said
Eaton. “Once everyone in a department has registered their tokens, we group their computers in the
system and ask these users to reboot,” explained Eaton. “The software is automatically installed, and the
users can start benefiting from Defender immediately.”
Defender has already improved productivity among users and the IT group by alleviating issues with
lost or forgotten tokens. “With our old solution, if users lose a token, they were dead in the water until
we could get them new ones,” stated Eaton. “With Defender, we can give the users a temporary token
and quickly get them back to work. Similarly, if vendors lose their tokens and need to VPN in to do some
work, we can grant access temporarily.”
Users who have moved from using passwords to the Defender two-factor authentication system have
also seen productivity improvements. “We had some initial pushback,” reported Eaton, “But now users
actually like it better than passwords. They recognize that it actually saves them time since they no
longer have to remember longer more complex passwords or call the help desk for password resets.”
The city plans to completely replace its former authentication solution with Defender, and appreciates
being able to do so gradually. “As each of the old tokens dies, we will replace it with a new Defender
token,” said Eaton. Oklahoma City has been pleased not only with the quality of the Defender solution,
but also with the responsiveness of Quest Support. “Whenever you deploy a new product, you run into
some problems, because every environment’s unique,” explained Eaton. “But Quest’s support staff bent
over backwards to get all of our problems resolved and worked through all our issues. We’re very happy
with Quest.”
About Oklahoma City
Founded in a single day on April 22, 1889, Oklahoma City has grown to a population of 558,000 residents.
At 621 square miles, this sprawling capital city is one of the largest cities in land area in the United States.
For more information, visit okc.gov.
About Quest Software, Inc.
Quest Software, Inc., a leading enterprise systems management vendor, delivers innovative products
that help organizations get more performance and productivity from their applications, databases,
Windows infrastructure, and virtual environments. Quest also provides customers with client
management through its ScriptLogic subsidiary and server virtualization management through its
Vizioncore subsidiary. Through a deep expertise in IT operations and a continued focus on what works
best, Quest helps more than 100,000 customers worldwide meet higher expectations for enterprise IT.
Quest Software can be found in offices around the globe and at www.quest.com.
Quest Software Incorporated. • To learn more about our solutions, contact your local sales representative
or visit www.quest.com • Headquarters: 5 Polaris Way, Aliso Viejo, CA 92656, USA
© 2009 Quest Software Incorporated. ALL RIGHTS RESERVED. Quest Software and Defender are trademarks and registered
trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are
property of their respective owners.
CSW-OKC-Defender-US-MJ-032409
“We try to leverage existing investments
whenever possible. Since Defender
integrates so seamlessly with Active
Directory we were able to do that
in addition to being able to use
Active Directory as a single source
for authentication credentials and
management.”
–	 Steven Eaton
	 IS Information Security Manager
	 Oklahoma City

Contenu connexe

Tendances

Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Watson AI platform for business - IBM Cloud
Watson AI platform for business - IBM CloudWatson AI platform for business - IBM Cloud
Watson AI platform for business - IBM CloudSarmad Ibrahim
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
Using Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixUsing Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixIBM
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPriyanka Aash
 
cyber law analyst certification
cyber law analyst certificationcyber law analyst certification
cyber law analyst certificationVskills
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Okta-Inc
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappearsUlf Mattsson
 

Tendances (20)

Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Watson AI platform for business - IBM Cloud
Watson AI platform for business - IBM CloudWatson AI platform for business - IBM Cloud
Watson AI platform for business - IBM Cloud
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
Aniket_resume
Aniket_resumeAniket_resume
Aniket_resume
 
Future of Serverless
Future of ServerlessFuture of Serverless
Future of Serverless
 
Using Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on BluemixUsing Watson to build Cognitive IoT Apps on Bluemix
Using Watson to build Cognitive IoT Apps on Bluemix
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New AuthenticationPasswords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
Passwords and Fingerprints and Faces—Oh My! Comparing Old and New Authentication
 
cyber law analyst certification
cyber law analyst certificationcyber law analyst certification
cyber law analyst certification
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappears
 

Similaire à Quest defender provides_secure__affordable_two-factor_authentication_for_oklahoma_city_1

EarthLink Cloud Workspace
EarthLink Cloud WorkspaceEarthLink Cloud Workspace
EarthLink Cloud WorkspaceMike Ricca
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Spectrum Success Story
Spectrum Success StorySpectrum Success Story
Spectrum Success StoryImprivata
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_finalwbrewin
 
REAL TIME POLLING SYSTEM
REAL TIME POLLING SYSTEMREAL TIME POLLING SYSTEM
REAL TIME POLLING SYSTEMIRJET Journal
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Single Sign-On: Our Path to Password Elimination
Single Sign-On: Our Path to Password EliminationSingle Sign-On: Our Path to Password Elimination
Single Sign-On: Our Path to Password EliminationSymantec
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTSplunk
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out SecurityFresche Solutions
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT GatewayJohn Koot
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochurefranciscolorca
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsCisco Case Studies
 
O'Reilly Velocity Europe
O'Reilly Velocity EuropeO'Reilly Velocity Europe
O'Reilly Velocity EuropeRekha Joshi
 
Intecracy Group Presentation
Intecracy Group PresentationIntecracy Group Presentation
Intecracy Group PresentationSoftengi
 

Similaire à Quest defender provides_secure__affordable_two-factor_authentication_for_oklahoma_city_1 (20)

Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
EarthLink Cloud Workspace
EarthLink Cloud WorkspaceEarthLink Cloud Workspace
EarthLink Cloud Workspace
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Spectrum Success Story
Spectrum Success StorySpectrum Success Story
Spectrum Success Story
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
 
Kela
Kela Kela
Kela
 
REAL TIME POLLING SYSTEM
REAL TIME POLLING SYSTEMREAL TIME POLLING SYSTEM
REAL TIME POLLING SYSTEM
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Single Sign-On: Our Path to Password Elimination
Single Sign-On: Our Path to Password EliminationSingle Sign-On: Our Path to Password Elimination
Single Sign-On: Our Path to Password Elimination
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out Security
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT Gateway
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
O'Reilly Velocity Europe
O'Reilly Velocity EuropeO'Reilly Velocity Europe
O'Reilly Velocity Europe
 
Intecracy Group Presentation
Intecracy Group PresentationIntecracy Group Presentation
Intecracy Group Presentation
 

Plus de Hai Nguyen

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 

Plus de Hai Nguyen (20)

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 

Quest defender provides_secure__affordable_two-factor_authentication_for_oklahoma_city_1

  • 1. Quest® Defender Provides Secure, Affordable Two-Factor Authentication for Oklahoma City Oklahoma City, Okla., boasts a population of 558,000 residents and owns one of the largest city owned and operated municipal Wi-Fi mesh network in the world. This network encompasses over 620 square miles to date and provides access to over 150 different applications that are vital to public safety and city operations. The city’s information technology department provides support for technology-based communication and information systems, enabling the delivery of efficient and effective services to city employees. To improve the security of its networks and systems, Oklahoma City turned to Quest for a feature-rich, two-factor authentication solution. The Challenge Oklahoma City’s IT department is responsible for protecting all of the city’s data. Most users, however, used to authenticate to the system using a simple username and password, which created a serious security risk. “Passwords are a security issue because users don’t like to change them regularly,” said Steven Eaton, information security manager for Oklahoma City. “In addition, if longer more complex passwords are required, users start writing them down because they can’t remember them, defeating their purpose of enhancing security.” As a proactive and forward-thinking organization, the city’s IT group decided to implement security recommendations for user access based on best practices. “We realized we needed to step up to two- factor authentication to ensure the security of our network,” stated Eaton. Two-factor authentication typically combines “something you know” (such as a username and password or pin) with “something you have” (such as a smart card or hardware token) to verify that users logging in are who they say they are. The city already had a two-factor authentication solution in place for remote access, but it was expensive. Moreover, it needed a solution that would integrate with Active Directory (AD), and deployed easily across the enterprise to more than 5,000 users. The Quest Solution The city’s IT group carefully evaluated solutions from five major vendors. Following extensive evaluation and testing of the technologies available, Quest Defender emerged as the clear winner. Defender bases all administration and identity management on Active Directory, thus it could use the city’s existing investment in AD and eliminate the costs involved in setting up and maintaining the additional infrastructure needed for other two-factor solutions. “We try to leverage existing investments whenever possible,” stated Eaton. “Since Defender integrates so seamlessly with Active Directory we were able to accomplish that in addition to being able to use Active Directory as the single source for authentication credentials and management.” Moreover, Defender works with any OATH-compliant hardware token, and is easy to roll out. In addition, the IT group was pleased to find that Defender was compatible with encryption software it also planned to deploy. “We were able to get all of it to work together seamlessly, which was a big plus for us,” reported Eaton. “Our users like Defender better than passwords. They recognize that it actually saves them time since they no longer have to remember longer more complex passwords or call the help desk for password resets.” – Steven Eaton IS Information Security Manager Oklahoma City Overview Headquarters Oklahoma City, Oklahoma Services City services Critical Needs To improve network security by implementing two-factor authentication Solution Quest® Defender Results Provides affordable two-factor • authentication for all employees Improves user productivity by • eliminating the need to remember longer more complex passwords without sacrificing security Enabled gradual, seamless rollout, with • token self-registration and temporary token assignments Case Study
  • 2. The Bottom Line Deployment of Defender has been nearly flawless for the city. . Because of Defender’s ZeroIMPACT approach, the IT group has been able to perform a gradual, controlled migration to two-factor authentication, resulting in 30% fewer issues than it had expected with other solutions. “We’ve been able to roll out Defender department by department, which works well for us,” said Eaton. “We’ve already deployed nearly 500 tokens, and we’ve had only two trouble calls.” Defender’s self-registration feature has been one key to the city’s deployment success. Another is Defender’s scripted auto install. “Defender’s deployment is virtually transparent to the end user,” said Eaton. “Once everyone in a department has registered their tokens, we group their computers in the system and ask these users to reboot,” explained Eaton. “The software is automatically installed, and the users can start benefiting from Defender immediately.” Defender has already improved productivity among users and the IT group by alleviating issues with lost or forgotten tokens. “With our old solution, if users lose a token, they were dead in the water until we could get them new ones,” stated Eaton. “With Defender, we can give the users a temporary token and quickly get them back to work. Similarly, if vendors lose their tokens and need to VPN in to do some work, we can grant access temporarily.” Users who have moved from using passwords to the Defender two-factor authentication system have also seen productivity improvements. “We had some initial pushback,” reported Eaton, “But now users actually like it better than passwords. They recognize that it actually saves them time since they no longer have to remember longer more complex passwords or call the help desk for password resets.” The city plans to completely replace its former authentication solution with Defender, and appreciates being able to do so gradually. “As each of the old tokens dies, we will replace it with a new Defender token,” said Eaton. Oklahoma City has been pleased not only with the quality of the Defender solution, but also with the responsiveness of Quest Support. “Whenever you deploy a new product, you run into some problems, because every environment’s unique,” explained Eaton. “But Quest’s support staff bent over backwards to get all of our problems resolved and worked through all our issues. We’re very happy with Quest.” About Oklahoma City Founded in a single day on April 22, 1889, Oklahoma City has grown to a population of 558,000 residents. At 621 square miles, this sprawling capital city is one of the largest cities in land area in the United States. For more information, visit okc.gov. About Quest Software, Inc. Quest Software, Inc., a leading enterprise systems management vendor, delivers innovative products that help organizations get more performance and productivity from their applications, databases, Windows infrastructure, and virtual environments. Quest also provides customers with client management through its ScriptLogic subsidiary and server virtualization management through its Vizioncore subsidiary. Through a deep expertise in IT operations and a continued focus on what works best, Quest helps more than 100,000 customers worldwide meet higher expectations for enterprise IT. Quest Software can be found in offices around the globe and at www.quest.com. Quest Software Incorporated. • To learn more about our solutions, contact your local sales representative or visit www.quest.com • Headquarters: 5 Polaris Way, Aliso Viejo, CA 92656, USA © 2009 Quest Software Incorporated. ALL RIGHTS RESERVED. Quest Software and Defender are trademarks and registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. CSW-OKC-Defender-US-MJ-032409 “We try to leverage existing investments whenever possible. Since Defender integrates so seamlessly with Active Directory we were able to do that in addition to being able to use Active Directory as a single source for authentication credentials and management.” – Steven Eaton IS Information Security Manager Oklahoma City