The Evolution of Secure Two Factor Authentication

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Enabling VDI & Application Virtualization
Secure Lync mobile Authentication
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
IBM Software Group ® Accessing Domino via Outlook iNotes Access for Microsoft Outlook - Notes Domino 5.5 – Domino Access for MS Outlook - Notes Domino.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
IT can provide users with a common identity across on-premises or cloud- based services, leveraging Windows Server Active Directory and Azure Active.
Active Directory Integration with Microsoft Office 365
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Active Directory Integration with Microsoft Office 365 Ross Adams & Jono Luk Program Managers Microsoft Corporation OSP321.
Public Key Infrastructure from the Most Trusted Name in e-Security.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Scenario covered in this presentation Separate credential from on- premises credential Authentication occurs via cloud directory service Does not.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Copyright © 2007, SAS Institute Inc. All rights reserved. SAS Activity-Based Management Survey Kit (ASK): User Management & Security.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
5 | Microsoft Confidential 6 | Microsoft Confidential.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
1 © Copyright 2010 EMC Corporation. All rights reserved.  Consolidation  Create economies of scale through standardization  Reduce IT costs  Deliver.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Module 1: Introduction to Windows 2000 and Networking.
Slavko Kukrika MVP Connect Windows 10 to the Cloud – Cloud Join.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
SendPro is the Easy-to-Use, Online Solution that Simplifies Office Shipping for USPS ®, FedEx ® and UPS ® – Integrated with the Features of Windows 10.
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1 Oxford Identity Summit May, 25 th 2016 CREATING A CITIZEN IDENTITY.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
CLOUDENTIFY.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Protect Manage Optimize Why LastPass Enterprise? Protect Manage Optimize.
AuthLite 2-Factor for Windows Administration
Self-service enrollment for Windows desktops
Windows 10 Enterprise E3 for Small and Medium Business
6/17/2018 5:54 AM OSP322 Getting the best of both worlds, making the most of SharePoint hybrid search solutions Shyam Narayan Microsoft © 2013 Microsoft.
Power BI Security Best Practices
Cloud Connect Seamlessly
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
05 | AD to Windows Azure AD IT Professionals
Public Key Infrastructure from the Most Trusted Name in e-Security
Office 365 Identity Management
NHS Identity Authentication fit for modern health and social care
Microsoft Virtual Academy
Presentation transcript:

The Evolution of Secure Two Factor Authentication

Mi-Token R&D - Sydney Australia Introducing Mi-Token? Mi-Token Mi-Token R&D - Sydney Australia Australian Owned Based in USA – Austin Texas R&D in Australia - Sydney Offices in Australia, USA, and Dubai Started 2009 Developed for a Leading Bank in Australia. Evolved into an independent solution. Mi-Token Inc. was founded in 2009 Global Business Expertise Experience in the cryptographic, authentication

Authentication ? Businesses want Security – with Compliance and Affordability Regulatory compliance – Mandated 2FA Ability to evolve and scale as a business grows Lowering TCO IT Admins want Ease of Setup and Administration Ease of Solution Setup and user configuration Simple 2FA integration with Windows applications (Exchange, Sharepoint) Adding 2FA (or 2 Phase Logon) should be simple, flexible and scalable Simply put… you want to sleep at night Users want Flexibility and Ease of use Two-Factor Authentication that doesn’t hinder their work Flexibility to use tokens without the hassle of help-desk calls Option to use multiple tokens based on apps or roles

Mi-Token Overview Token Independent Soft Tokens No Dedicated Server All hard tokens are interchangeable with soft tokens, and a backup SMS system. Mi-Token provides soft-tokens for every user – complementary with every licence. No Dedicated Server Reduced OPEX Mi-Token doesn’t require a dedicated server to run, lowering costs. Mi-Token utilizes Windows Security and Replication functionality. Token Self registration can also reduce OPEX ADFS Integration Phased Implementation Mi-Token integration with ADFS 3.0 enabling seamless 2FA for Exchange, Sharepoint and Remote Desktop (with Windows Server R2012). Mi-Token provides an option of ‘No Token Required’ until a user has an assigned token. Great for large 2FA rollouts.

Mi-Token OVerview Highly Scalable Fast Deployment Ease of Management Mi-Token plugs directly into the Windows environment and has been designed to scale and propagate security policies utilizing the existing Windows technology Mi-Token offers complementary Soft Tokens for a fast, trouble-free rollout. Phased deployment allows ‘No Token Required’ to be activated until the user has a registered token Auto Registration is available with Yubikeys Ease of Management Multiple Tokens Mi-Token offers simple token management, integrated with Windows Active Directory Mi-Token allows users to use several token form-factors simultaneously (for use in different conditions) and reducing helpdesk support. Parallel Deployment Parallel Deployment for phased or partial replacement of other tokens.

Latest Features ADFS Integration OWA Integration Integration with ADFS 3.0 (Windows Server 2012 R2) ADFS provides SSO for Windows Applications With Mi-Token ADFS Integration – all MS and SAML enabled apps can use 2FA ADFS Consulting services are available from Mi-Token OWA Integration Mi-Token Integration with OWA (no ADFS) Simple plugin installation Integrates with EPC

Latest Features 2 Phase Logon Gradual Rollout 2 Phase Logon only works when you don’t have an assigned token If you’re a Tokenless user, the API service will send an SMS to the mobile The User then enters the 2FA credential Gradual Rollout Designed for large implementations Tokenless user can logon without a token prior to token being assigned Once a token is assigned the user must use the token credentials Gradual Rollout is similar to 2 Phase – without the SMS

ROADMAP Internet of Things Proximity Authentication Authorization services – Permits, Physical Access Geo-Fenced Authentication Access to Critical Services (Scada) Proximity Authentication BTLE Devices Smart Office/Home