SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
USP SES and the Location Layer:
Geolocation for adaptive Access Control and Privileges
Extremely secure
SUMMARY
1.  Goodbye to Microsoft TMG
2.  Hello USP SES
3.  How USP SES Makes Location Work For You
4.  USP SES Use Cases #1
5.  USP SES Use Cases #2
6.  USP SES Use Cases #3
7.  Identity Fraud and Location
8.  USP SES Use Cases #4
9.  USP SES Use Cases #5
10.  USP SES: Fast facts
Page 2Cybersecurity
1. Goodbye to Microsoft TMG
Page 3Cybersecurity
And hello to USP SES
Microsoft have discontinued their TMG solution set
This impacts both TMG and UAG.
è An alternative is needed
This gives you a chance to find a solution that is:
•  Better suited to a modern environment
/ uses standard interfaces
•  Greater functionality
•  Simpler to use
Turnkey offering for SAP and other web portal protection against
widely used cyber threats.
Authentication management and Single Sign On (SSO) across disparate
applications (incl. Office 365 and Google Docs).
A simplified way of handling a hybrid application environment.
Geolocation-Aware Adaptive Authorization.
	
2. Hello USP SES
A simple to use configuration interface
USP SES have a replacement solution for Microsoft’s TMG which gives you:
Cybersecurity Page 4
•  Being able to use location opens up
powerful controls
•  Control of incoming requests
•  Control of authentication
•  Control of permissions
Gartner statement on geolocation to allow for
adaptive authentication:
“Geolocation data is growing in importance
relative to classic, credential-based
authentication data as a way of mitigating
authentication and authorization risk.”
Gartner: Geolocation Access Control and Privacy August 2012
Page 5
3. Going Further: How USP SES Makes Location Work For You
Cybersecurity
Incoming Request Control
USP SES WAF can be configured to control access based on analysis of:
- Geographical location
- Reputation, i.e. if an address is known to be used for hacking the
reputation will be low
Certain locations / IP addresses are known to be used by cybercriminals.
Allows you to manage access requests coming in from the TOR network and VPN’s.
Cybersecurity Page 6
Access privileges can be controlled through location awareness
Users in known ‘problem’ locations or known bad IP addresses
will have restricted access to resources.
Way of adding in more granular control to privileged access policies
Set up service to issue content to users based on their location at login
Permissions Control
Cybersecurity Page 7
USP SES has extended monitoring and
reporting capability to use data based on
location awareness functionality.
Location based reporting can be offered,
including:
•  Location based service usage
•  Location based security incident monitoring
and reporting
•  Use of anonymous networks for access
•  Report use of known bad IP addresses for
access
Monitoring and Reporting
Cybersecurity Page 8
Cyber security risk management using geolocation controls
Web based attacks can be controlled through geolocation settings.
Incoming requests from bad IP addresses or known hacker locations can be blocked.
E.g. known locations / countries where brute force attacks originate.
Profiling and behavioral analysis can be performed.
4. USP SES Use Cases #1
Cybersecurity Page 9
Geolocation adds another layer of security controls:
PWC 2015 Information Security Breaches Survey: http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-digital.pdf
Ponemon Institute: 2015 Cost of Cybercrime Study: http://www-03.ibm.com/security/data-breach/
Akamai, State of the Internet Report: http://www.stateoftheinternet.com/downloads/pdfs/2014-q4-state-of-the-internet-report.pdf
Some cyber security / location satistics:
9/10
Organization had suffered
a security breach in 2014
65 M$
In 2015 annual cost for
cybercrime ranged from
$3.1 million to 65 million
Top countries for hackers:
–  China: 41%
–  USA: 13%
–  Taiwan: 4.4%
–  Russia: 3.2%
–  Turkey: 2.9%
–  South Korea: 2.8%
–  India: 2.4%
–  Brazil: 2.3%
–  Germany: 1.8%
–  Hong Kong: 1.3%
Cybersecurity Page 10
Compliance with health / financial record access:
Granular authentication based on geolocation/IP address
Employees can access SAP or other web based content
Access within the organization (IP address or geolocation)
•  single factor (1st) login credential only required
Access from an IP address or location outside of the workplace
(e.g. on the road or from home)
•  1st and 2nd factor required
Access from locations that are outside those accepted by the organization
•  1st factor PLUS 2nd factor PLUS security question required
Or completely block access
	
	
5. USP SES Use Case #2
Cybersecurity Page 11
Consumer access controls via location settings
User’s identity and associated access to government services is geolocation controlled.
If user is in their home country, they are allowed to access the text service and upload their tax return.
If not, they cannot do their tax returns until they are in home country.
An extension of the use case would allow the user to setup other locations (e.g. holiday location) to
access government services using their identity.
In addition USP SES has the ability to block anonymous networks such as TOR, VPN’s and proxies.
6. USP SES Use Case #3
Cybersecurity Page 12
Geolocation helps to protect identity
fraud.
High profile case was IRS breach of 2015
and secondary attack of 2016 – tax
return fraud case.
Could have been prevented with
geolocation controls.
Geolocation controls add additional layer
of security to identity.
7. Indentity Fraud and Location
Cybersecurity Page 13
Indentity fraud victims and their losses
Cybersecurity Page 14
BYOD has introduced new potential security issues to the enterprise
Common delivery across devices means that data, once hidden, needs additional layers
of access control.
Can control data leaving a country / jurisdiction.
Geolocation offers this additional layer to add in these controls:
- in a non-intrusive manner – devices have built in location mechanisms
- Adaptive, only when needed, i.e. using location policies
	
8. USP SES Use Case #4
Page 15Cybersecurity
Gartner: http://www.gartner.com/newsroom/id/2466615
SecuredEdge Networks: http://www.securedgenetworks.com/blog/BYOD-Security-The-Number-One-BYOD-Concern
BYOD Statistics
Page 16Cybersecurity
50%
of companies
will expect
employees to use
their own devices
at work by 2017
80%
of BYOD at work
are unmanaged
35%
of workers store
their work passwords
on their phones
Location awareness reporting and alerts for fraud profiling
Location awareness of user access and incoming traffic allows you to:
- Detect and prevent fraud
Use IP address location with fraud profiling (recognise behavioural patterns based
on location).
- Provide real-time incident management with alerts informing of incoming cyber
threats from blacklisted locations.
Also offers monitoring of employees and can offer KYC options.
9. USP SES Use Cases #5
Page 17Cybersecurity
10. USP SES: Fast facts
Page 18Cybersecurity
Simple way to manage hybrid IT systems from one console
Offers multitude of authentication controls
Multiple factor
Single sign on
Integration with any IDM system to build flexible and strong access control
Highly customizable with adaptable, standard interfaces
Adaptive access control with geolocation features
company/united-security-providers
companies/unitedsecurityprovidersag
www.united-security-providers.com

Contenu connexe

Tendances

SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computingJorge Sebastiao
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya RansomwareSiemplify
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSTobias Koprowski
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A FootholdClaranet UK
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Website security
Website securityWebsite security
Website securityRIPPER95
 
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 

Tendances (20)

SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computing
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Application security
Application securityApplication security
Application security
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 
Website security
Website securityWebsite security
Website security
 
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 

En vedette

F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
Wapples brochure v1 4 eng
Wapples brochure v1 4 engWapples brochure v1 4 eng
Wapples brochure v1 4 enghasbro505
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerDavid McGeough
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Akamai Technologies
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 
Tripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best PracticesTripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best PracticesTripwire
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEStefanini
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew JamesKonica Minolta
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Technology
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testingTestplant
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterTegile Systems
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysPanos Kontopoulos
 

En vedette (14)

F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
Wapples brochure v1 4 eng
Wapples brochure v1 4 engWapples brochure v1 4 eng
Wapples brochure v1 4 eng
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Tripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best PracticesTripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best Practices
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew James
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDays
 

Similaire à USP SES and the Location Layer: Geolocation for adaptive Access Control and Privileges

Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Eswar Publications
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...ashoksankar
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Protecting pii and phi exec summary
Protecting pii and phi   exec summaryProtecting pii and phi   exec summary
Protecting pii and phi exec summaryJoe Orlando
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 

Similaire à USP SES and the Location Layer: Geolocation for adaptive Access Control and Privileges (20)

Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security Firewall
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Protecting pii and phi exec summary
Protecting pii and phi   exec summaryProtecting pii and phi   exec summary
Protecting pii and phi exec summary
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 

Dernier

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Dernier (20)

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

USP SES and the Location Layer: Geolocation for adaptive Access Control and Privileges

  • 1. USP SES and the Location Layer: Geolocation for adaptive Access Control and Privileges Extremely secure
  • 2. SUMMARY 1.  Goodbye to Microsoft TMG 2.  Hello USP SES 3.  How USP SES Makes Location Work For You 4.  USP SES Use Cases #1 5.  USP SES Use Cases #2 6.  USP SES Use Cases #3 7.  Identity Fraud and Location 8.  USP SES Use Cases #4 9.  USP SES Use Cases #5 10.  USP SES: Fast facts Page 2Cybersecurity
  • 3. 1. Goodbye to Microsoft TMG Page 3Cybersecurity And hello to USP SES Microsoft have discontinued their TMG solution set This impacts both TMG and UAG. è An alternative is needed This gives you a chance to find a solution that is: •  Better suited to a modern environment / uses standard interfaces •  Greater functionality •  Simpler to use
  • 4. Turnkey offering for SAP and other web portal protection against widely used cyber threats. Authentication management and Single Sign On (SSO) across disparate applications (incl. Office 365 and Google Docs). A simplified way of handling a hybrid application environment. Geolocation-Aware Adaptive Authorization. 2. Hello USP SES A simple to use configuration interface USP SES have a replacement solution for Microsoft’s TMG which gives you: Cybersecurity Page 4
  • 5. •  Being able to use location opens up powerful controls •  Control of incoming requests •  Control of authentication •  Control of permissions Gartner statement on geolocation to allow for adaptive authentication: “Geolocation data is growing in importance relative to classic, credential-based authentication data as a way of mitigating authentication and authorization risk.” Gartner: Geolocation Access Control and Privacy August 2012 Page 5 3. Going Further: How USP SES Makes Location Work For You Cybersecurity
  • 6. Incoming Request Control USP SES WAF can be configured to control access based on analysis of: - Geographical location - Reputation, i.e. if an address is known to be used for hacking the reputation will be low Certain locations / IP addresses are known to be used by cybercriminals. Allows you to manage access requests coming in from the TOR network and VPN’s. Cybersecurity Page 6
  • 7. Access privileges can be controlled through location awareness Users in known ‘problem’ locations or known bad IP addresses will have restricted access to resources. Way of adding in more granular control to privileged access policies Set up service to issue content to users based on their location at login Permissions Control Cybersecurity Page 7
  • 8. USP SES has extended monitoring and reporting capability to use data based on location awareness functionality. Location based reporting can be offered, including: •  Location based service usage •  Location based security incident monitoring and reporting •  Use of anonymous networks for access •  Report use of known bad IP addresses for access Monitoring and Reporting Cybersecurity Page 8
  • 9. Cyber security risk management using geolocation controls Web based attacks can be controlled through geolocation settings. Incoming requests from bad IP addresses or known hacker locations can be blocked. E.g. known locations / countries where brute force attacks originate. Profiling and behavioral analysis can be performed. 4. USP SES Use Cases #1 Cybersecurity Page 9
  • 10. Geolocation adds another layer of security controls: PWC 2015 Information Security Breaches Survey: http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-digital.pdf Ponemon Institute: 2015 Cost of Cybercrime Study: http://www-03.ibm.com/security/data-breach/ Akamai, State of the Internet Report: http://www.stateoftheinternet.com/downloads/pdfs/2014-q4-state-of-the-internet-report.pdf Some cyber security / location satistics: 9/10 Organization had suffered a security breach in 2014 65 M$ In 2015 annual cost for cybercrime ranged from $3.1 million to 65 million Top countries for hackers: –  China: 41% –  USA: 13% –  Taiwan: 4.4% –  Russia: 3.2% –  Turkey: 2.9% –  South Korea: 2.8% –  India: 2.4% –  Brazil: 2.3% –  Germany: 1.8% –  Hong Kong: 1.3% Cybersecurity Page 10
  • 11. Compliance with health / financial record access: Granular authentication based on geolocation/IP address Employees can access SAP or other web based content Access within the organization (IP address or geolocation) •  single factor (1st) login credential only required Access from an IP address or location outside of the workplace (e.g. on the road or from home) •  1st and 2nd factor required Access from locations that are outside those accepted by the organization •  1st factor PLUS 2nd factor PLUS security question required Or completely block access 5. USP SES Use Case #2 Cybersecurity Page 11
  • 12. Consumer access controls via location settings User’s identity and associated access to government services is geolocation controlled. If user is in their home country, they are allowed to access the text service and upload their tax return. If not, they cannot do their tax returns until they are in home country. An extension of the use case would allow the user to setup other locations (e.g. holiday location) to access government services using their identity. In addition USP SES has the ability to block anonymous networks such as TOR, VPN’s and proxies. 6. USP SES Use Case #3 Cybersecurity Page 12
  • 13. Geolocation helps to protect identity fraud. High profile case was IRS breach of 2015 and secondary attack of 2016 – tax return fraud case. Could have been prevented with geolocation controls. Geolocation controls add additional layer of security to identity. 7. Indentity Fraud and Location Cybersecurity Page 13
  • 14. Indentity fraud victims and their losses Cybersecurity Page 14
  • 15. BYOD has introduced new potential security issues to the enterprise Common delivery across devices means that data, once hidden, needs additional layers of access control. Can control data leaving a country / jurisdiction. Geolocation offers this additional layer to add in these controls: - in a non-intrusive manner – devices have built in location mechanisms - Adaptive, only when needed, i.e. using location policies 8. USP SES Use Case #4 Page 15Cybersecurity
  • 16. Gartner: http://www.gartner.com/newsroom/id/2466615 SecuredEdge Networks: http://www.securedgenetworks.com/blog/BYOD-Security-The-Number-One-BYOD-Concern BYOD Statistics Page 16Cybersecurity 50% of companies will expect employees to use their own devices at work by 2017 80% of BYOD at work are unmanaged 35% of workers store their work passwords on their phones
  • 17. Location awareness reporting and alerts for fraud profiling Location awareness of user access and incoming traffic allows you to: - Detect and prevent fraud Use IP address location with fraud profiling (recognise behavioural patterns based on location). - Provide real-time incident management with alerts informing of incoming cyber threats from blacklisted locations. Also offers monitoring of employees and can offer KYC options. 9. USP SES Use Cases #5 Page 17Cybersecurity
  • 18. 10. USP SES: Fast facts Page 18Cybersecurity Simple way to manage hybrid IT systems from one console Offers multitude of authentication controls Multiple factor Single sign on Integration with any IDM system to build flexible and strong access control Highly customizable with adaptable, standard interfaces Adaptive access control with geolocation features