We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJamari Kyte
Modified over 2 years ago
Nordic Edge Authentication PlatformEasy, Quick, Reliable Authentication for Both Local and Cloud Applications © Nordic Edge™ – The provider of secure identity solutions
Agenda About Nordic Edge Solution Overview OTP3™ Server Pledge YubiKeyCustomer Case Study Legacy Token Migration © Nordic Edge™ – The provider of secure identity solutions
About Nordic Edge Experts in Identity Management and Access Control with both on premise and in the cloud solutions Offers a broad range of Identity Management and Strong Authentication solutions Founded in 2001 in Sweden Profitable with award winning growth Over 300 customers in over 30 countries An independent company © Nordic Edge™ – The provider of secure identity solutions
Customers © Nordic Edge™ – The provider of secure identity solutions
Customer Challenges Username/password no longer offers needed protection, even with strong password policy Current OTP solutions too expensive and inflexible Support migration to cloud without loss of security and control Adapt to changing requirements and increasing use of mobile devices Increasing regulatory compliance requirements (PCI, SOX, HIPAA, etc…) © Nordic Edge™ – The provider of secure identity solutions
Nordic Edge Strong Authentication- Two-factor authentication - Provisioning - Single Sign-On Cloud Services Local Network NE Two-factor Authentication Server Authentication Methods - SMS - Mobile Token - Pledge - YubiKeys - OATH Tokens (- Pre-fetched codes) (- / Chat) (- X.509 certificates) (- Legacy Tokens) LDAP SQL Internet Remote Access © Nordic Edge™ – The provider of secure identity solutions
Nordic Edge Solution ComponentsCore: Nordic Edge One Time Password Server (OTP3™) Main Authentication Options Nordic Edge Pledge Mobile and PC Token Nordic Edge SMS Service Yubico YubiKey USB Token OATH Hardware Token (HOTP, TOTP, OCRA) Optional Add-Ons Nordic Edge Password Kiosk Self Service Portal AxiaD IDS Installation and Support Services © Nordic Edge™ – The provider of secure identity solutions
Nordic Edge One Time Password ServerSupports a wide range of authentication methods: Mobile Token - Pledge USB Key - YubiKey SMS Others: Pre-fetched codes, / Chat, X.509 certificates, Third Party Tokens (Oath) Policy based enforcement / choice of authentication methods Strong authentication to both local and cloud applications © Nordic Edge™ – The provider of secure identity solutions
Nordic Edge One Time Password ServerRedundant Scalable Architecture Failover – avoid downtime Limitless amount of OTP Servers – supporting millions of users Java based – run on preferred platform In production over a million users on one site Flexible Comprehensive database support – adapt you current infrastructure Fast installation Many Integrations – easy to implement in new environment: © Nordic Edge™ – The provider of secure identity solutions
Automate and streamline administrationUser self enrollment (customized) User self administration (Password Kiosk) Automatic Key Enrollment Benefits: Significantly reduce administrator time to operate and support solution Better customer service through automation © Nordic Edge™ – The provider of secure identity solutions
Nordic Edge Pledge Mobile TokenSoftware that securely generates One Time Password Runs on all leading platforms: Blackberry, iPhone, iPad, Android, Windows Mobile PC/Mac Automatic key enrollment No administration Customized look Support for signing Multiple profiles © Nordic Edge™ – The provider of secure identity solutions
Pledge Token Benefits Automatic, over the air download and enrollment for instant access Reduce costs Automated provisioning License included for free with OTP Software license Save from avoiding physical distribution of hardware tokens Security PIN protected (optional) All key material is fully encrypted. User Convenience No need to carry a separate OTP token © Nordic Edge™ – The provider of secure identity solutions
SMS Service Redundant SMS Server PlatformValidates that message has actually been sent One fixed price globally Benefits No software to install or manage Main or backup authentication option © Nordic Edge™ – The provider of secure identity solutions
YubiKey Innovative OTP token: The ”keyboard authenticator”Simple touch on YubiKey touch button for automatic entry of key identifier and one time password into login field Works on all computers and platforms No client software needed ccccccccehllvjjitleikcffjndtjkgnrejudfrjncun ccccccccehllcrnhttrgbgikrcctihnlhclrvhkldcdj IDENTIFIER ONE TIME PASSWORD © Nordic Edge™ – The provider of secure identity solutions
YubiKey Benefits Flexible Compact and Robust designYubiKey 32 bit time variant OTP OATH with or without Identifier OTP Two virtual YubiKeys in one Compact and Robust design Waterproof, hermetically sealed Crush safe (survives being run over by a car) High durability gold contact (+100,000 inserts in USB-port) No battery, no LCD display, no moving parts © Nordic Edge™ – The provider of secure identity solutions
Password Kiosk & Self Service PortalCreate custom self service portals Streamline and automate user provisioning Offer users increased functionality Significantly reduce operational costs © Nordic Edge™ – The provider of secure identity solutions
Cloud Migration Bridge implementation into cloud environments with Intel’s Expressway Cloud Access 360 solution: SSO Provisioning Fully integrated with Nordic Edge OTP server Leverage the benefits of cloud services without adding to risk © Nordic Edge™ – The provider of secure identity solutions
Competitive DifferentiationNordic Edge OTP RSA SecurID Open, Standards Based Closed, Proprietary NE supports multiple OTP algorithms, including OATH TOTP, HOTP, OCRA and Yubico Only Time Based SecurID OTP algorithm Competitively priced with multiple options not requiring renewal Expensive, with tokens requiring renewal Latest Generation Fundamental Principles unchanged for 20 years Customers can have full control of key material Keeps backup of key material © Nordic Edge™ – The provider of secure identity solutions
What our customers are saying"We were impressed by the rapid implementation of the system, but also by the ease-of-use for our users and the low administration required" Prof. Gerd Stöwer, CEO Münster/Osnabrück Airport "We are very satisfied with Your product. It’s very stable, easy to use, fast, reliable and it has good logging abilities. So we think that Nordic Edge OTP server was the best choice to our services" Ernest Jojart, member of the developer team in AXA Group "The OTP server has saved us from having a hacker gaining access using stolen credentials on a remote system. It also alerted the user, who could report the intrusion attempt to the system administrator. The system has been up and running without a single failure since we brought it online in 2008.” Jonas Lindemann, Senior system manager, Lunds Universitet © Nordic Edge™ – The provider of secure identity solutions
Customer Case Study Solution Overview BenefitsHughes is the world’s leading provider of satellite broadband for home and office, delivering innovative network technologies, managed services, and solutions for enterprises and governments globally. Solution Overview Benefits Uses Nordic Edge OTP3 Server as their back-end authentication server and IM Suite for Self-Enrollment and Administration Portal Switched from distributing RSA SecurID tokens to Yubico “YubiKeys” to their customers Installed User Self Enrollment Portal to enable users to automatically enroll previously unassigned tokens and manage these tokens Uses a combination of Yubico OATH YubiKeys and ActivIdentity OATH display tokens Large cost saver in distribution, administration and purchase of YubiKeys instead of RSA tokens Less Administration - user self enrollment saves Hughes huge amounts of time and money More flexible back-end in the Nordic Edge OTP3 Server Can use any combination of OATH tokens, Pledge and SMS authentication More secure back-end (no seed file handling) © Nordic Edge™ – The provider of secure identity solutions
Conclusion Nordic Edge Strong AuthenticationVersatile and robust platform for all enterprise needs Choice of authentication methods Rapid installation, integration and deployment Support for YubiKey Low cost of operation through maximized self service Attractive pricing model © Nordic Edge™ – The provider of secure identity solutions
Migration from Legacy Solution, e.g. RSA SecurIDBackup Slides Migration from Legacy Solution, e.g. RSA SecurID © Nordic Edge™ – The provider of secure identity solutions
Authentication ServerLegacy Token Setup Remote Access Product Legacy Authentication Server Legacy Token Token Db User 5 ID-123 User 4 ID-124 User 6 ID-241 © Nordic Edge™ – The provider of secure identity solutions
Legacy --> Nordic EdgeAuthentication Server Legacy Token DB Legacy Token User 5 ID-123 User 4 ID-124 User 6 ID-241 Remote Access Product One Time Password Server YubiKey 1) Vasco users will still use their Vasco token when logging in 2) Once Vasco users are enrolled with Pledge or SMS, several options are available a) The Vasco token is disabled and the user must use Pledge/SMS b) The Vasco token is still enabled for the user and the user has a choice between Vasco, Pledge/SMS c) Prioritized authentication methods can be configured. All authentication methods are available according to priority for each user. Users LDAP User 1 Pledge ID-231 User 2 Legacy token ID-123 User 3 YubiKey ID-414 Pledge © Nordic Edge™ – The provider of secure identity solutions
Pledge Enrollment Overview© Nordic Edge™ – The provider of secure identity solutions
Pledge Enrollment (cont).© Nordic Edge™ – The provider of secure identity solutions
Thank you! Henrik Åkerstrand Business Development Manager Jan T. Johansen Sales Manager North America (510) © Nordic Edge™ – The provider of secure identity solutions
McAfee One Time Password
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Instantly Deliver and Track Training to Learners Anytime, Around the World and on Any Device Within Your Office 365 Environment with LMS365 OFFICE 365.
SharePoint ShortUrl and SharePoint Document Merge SharePoint and Office 365 Add-ins to Increase Productivity and Improve User Adoption! OFFICE 365 APP.
Short Customer Presentation September The Company Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Which server is right for you? Get in Contact with us
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Building a Fully Trusted Authentication Environment
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
1 Effective, secure and reliable hosted security and continuity solution.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Easily Organize Common Templates, Phrases, Statements and More to Quickly Reuse Within Microsoft Office 365 Using Dolphin Compose WHAT WE OFFER Replace.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
OPC Systems.NET. Open Automation Software Based in Lakewood, Colorado USA Founded in 1994 OPC Systems.NET released in 2004 Over 100k+ server licenses.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
Designing Enterprise Mobility Cortado Corporate Server.
Welcome To AVCO Systems Ltd INTRODUCTIONS. About Avco Established 1986 Providing bespoke solutions for over 25 years Turnover 2.2 Million with 40 Employees.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
RSA SecurID November 10, 2005.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
StageNow The easy way to stage Android mobile computers from Zebra Technologies.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Enterprise Messaging & Collaboration. e-Interact Modules.
Page 1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Take Control of Your Contracts with Dolphin 365, a Companion Product to Microsoft Office 365 That Leverages Your Investment and Reduces Risk OFFICE 365.
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
Stephen Crick Business Development Manager Tokenless™ Authentication.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
EToken PRO Anywhere. Agenda eToken PRO Anywhere Overview Market background and target markets Identifying the opportunity Implementation and Pricing.
THE EASY WAY TO STAGE ZEBRA’S ANDROID MOBILE COMPUTERS
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda The challenge: Authenticator life-cycle management eToken TMS (Token Management System) eToken.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
© 2017 SlidePlayer.com Inc. All rights reserved.