Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

Govern the Flow of Data: Moving from Chaos to Control
Mobile Devices in the DoD
1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
McAfee One Time Password
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
© 2012 SecureAuth. All rights reserved. 2-Factor Authentication and Single Sign-On in a Mobile World Thursday, December 5,
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
4/6/ :35 AM © 2004 Microsoft Corporation. All rights reserved.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
IT Analytics for Symantec Endpoint Protection
2 Connecting Active Directory To Cloud Services Jorgen Thelin Senior Program Manager Microsoft Corporation Session Code: IDA306.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Backup Modernization with NetBackup Appliances
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
 Lynn Ayres Program Manager Identity Services  Tore Sundelin Program Manager Identity Services BB29.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Next Generation Partner Program Fady Iskander Symantec Corp.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
Secure Windows App Development. Authentication.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Windows Phone Intended use:These slides tell the business story with information on mobilizing business apps in Windows Phone 7.5 (code named “Mango”)
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Deployment Planning Services
Make your app a native part of Office with Add-ins
Deployment Planning Services
SaaS Application Deep Dive
6/17/2018 3:45 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Modernizing your Remote Access
The power of common identity across any cloud
Forefront Security ISA
Security in Windows Store apps
Using AAD B2C for WordPress & Secure Deployment Scenario
Microsoft Virtual Academy
Office 365 Identity Management
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/24/2018 4:51 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Microsoft Ignite NZ October 2016 SKYCITY, Auckland
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
12/25/2018 5:11 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Enabling the hybrid cloud with remote access appliances
4/3/2019 3:20 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
The complete developer's guide to the SkyDrive API
Microsoft Data Insights Summit
Azure AD Simon May Technical Evangelist.
Presentation transcript:

Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM

Agenda Smart Identity Protection That Works for You and Your Users 3 Calibrating Identity Protection Principles 1 The Reality of Doing Business 2 Validation & ID Protection Service Overview 3 Demos: eBay, SSL VPN, Symantec O3 portal 4

Smart Identity Protection That Works for You and Your Users 4 Calibrating Identity Protection Principles

CIA Security Principals Have not Changed Smart Identity Protection That Works for You and Your Users 5 ConfidentiallyIntegrity Availability Usability

Bus Emergency Exit Smart Identity Protection That Works for You and Your Users 6

Last Night, at My Hotel Room - Oh yes, I know I am a Security Geek Smart Identity Protection That Works for You and Your Users 7

Authentication Process Who Trusts Who? Smart Identity Protection That Works for You and Your Users 8 Websites, Intranet shares, applications Websites, Intranet shares, applications Access Control who can do what? Authorization what can you do? Authentication how can you prove that? Identification who you are? User, Device

Smart Identity Protection That Works for You and Your Users 9 The Reality of Doing Business People are Always on

New Technologies, New Behaviors 10 Smart Identity Protection That Works for You and Your Users

Networks Wi-Fi WiMAX 3G VPN Corporate Kiosk People Are the New Perimeter Smart Identity Protection That Works for You and Your Users Laptop PDA iPad Desktop Laptop Phone iPad PDA Laptop Desktop Smartcards Consumer Government Partners Employee 11

Smart Identity Protection That Works for You and Your Users 12 Validation & ID Protection Service (VIP) Overview

Authentication as a Service Enterprise Consumer Portal, Business Partner Extranet Corporate Network Symantec Hosted Real Time Authentication User with VIP Credential OTP Intelligent Authentication Out of Band Smart Identity Protection That Works for You and Your Users

Easy to Use Management Portal 14 Smart Identity Protection That Works for You and Your Users

Strategic Strong Authentication Approach Symantec Validation and Identity Protection (VIP) Standalone OTP Credentials Hardware Token Mobile, Desktop Software Embedded Out-of-Band SMS Voice Call Strong Device IDs Client-based Device ID Clientless Device ID Risk- Based Intelligent Authentication Provides Flexible Options Smart Identity Protection That Works for You and Your Users

Strong Security and a Better User Experience Broad Credentials (OTP) Hardware, software, out-of-band Mobile: 900+ popular handsets with Free end-user download VIP credential embedded in hardware – Intel IPT Risk-based Authentication Device ID and user behavior Challenge risky logins Transaction monitoring Enterprise integration Popular enterprise applications, such as VPNs, SSO Custom app integration via API Smart Identity Protection That Works for You and Your Users

Symantec VIP Enterprise Deployment Architecture Smart Identity Protection That Works for You and Your Users 17

VIP Supports Many 3 rd Party Integrations Array Networks Barracuda Check Point Citrix Systems Cisco IBM Juniper Microsoft and more at… authentication-service/agents-options- add-ons Smart Identity Protection That Works for You and Your Users

19 Demos: eBay, SSL VPN, Symantec O3 portal Low-cost and easy-to-use cloud-based strong authentication

Embedded OTP demo: Pin-and-In

Embedded OTP Demo: Pin-and-In (continued)

Symantec Authentication Security and Reliability Experience 15 years Validating Websites, User, and Devices, with over 400,000 clients world wide Secure Bandwidth 3 Billion Secure Validations a Day with 100 % uptime for over the last 5 years in a Saas Model 24 Smart Identity Protection That Works for You and Your Users

A Few VIP Customers 25 Smart Identity Protection That Works for You and Your Users

Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Smart Identity Protection That Works for You and Your Users 26 Petri Ala-Annala