Cloud Security Julian Lovelock VP, Product Marketing, HID Global.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Sessions about to start – Get your rig on!. Notes from the field – Implement Hybrid Search and OneDrive for Business Chris Zhong - Microsoft Aaron Dinnage.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Introduction to VertX EVO Hardware. EVO V1000 Controller An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2010 HID Global Corporation. All rights.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Dell Connected Security Solutions Simplify & unify.
Security considerations for mobile devices in GoRTT
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Identity Assurance Emory University Security Conference March 26, 2008.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Building a Fully Trusted Authentication Environment
Access resources in a federation partner organization.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Manage and secure identities in a cloud and mobile world
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Securing the Cloud Authentication Perspective. Moving to the Cloud is like Moving your data from your own personal safe, to a safety deposit box.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Implementing and Managing Azure Multi-factor Authentication
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda Mobile Device Manager
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Deployment Planning Services
Security as A Service Components
Examine common architectures for hybrid identity
Security managed from the cloud.
Office 365 with confidence: security features for Office 365
Company Overview & Strategy
Cloud Connect Seamlessly
Understanding IDENTITY Assurance
Azure AD Deployment Are you maximising your Azure AD investment?
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Access and Information Protection Product Overview October 2013
Check Point Connectra NGX R60
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
System Center Marketing
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Global One Communications
Presentation transcript:

Cloud Security Julian Lovelock VP, Product Marketing, HID Global

Which part are we talking about? Cloud Security Don’t loose it Don’t get it stolen Secure infrastructure Secure operations Close back doors Enterprise Identity Management User Access management for the cloud This part Cloud access from mobile devices Enterprise BYOD strategy

Things to think about Avoid more user account silos. Secure access over the internet.

Authenticate Device What’s needed? A Layered Approach with Versatile Authentication An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2011 HID Global Corporation. All rights reserved. An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2011 HID Global Corporation. All rights reserved. Authenticate user Authenticate to the Cloud Determine Risk Authenticate from anywhere, anytime Risk Based Authentication Layer 3Pattern-based intelligence OOB Verification KBA Layer 2End-point Authentication Device identification and Profiling Proxy Detection Geo-location and velocity check Layer 1User Authentication (Multifactor) Something you know (passwords) Something you have (token or tokenless) Something you are (biometrics, Behaviormetrics)

User Access Management for the cloud Options Open Access Accessible on the public internet. Username / password, per cloud application.

Open Access Behind the VPN Remote users must first authenticate to the VPN, then enter username & password. User Access Management for the cloud Options

Open Access Behind the VPN Federated Identity Mngment User authenticates to central portal, through which he/she gains access to multiple cloud / internal applications User Access Management for the cloud Options

Open Access Behind the VPN Federated Identity mngmt Native strong auth Strong authentication to the individual cloud software application User Access Management for the cloud Options

User Access Management for the cloud Selection criteria External threats Open Access Behind the VPN Federated Identity mngmt Native strong auth Protection against attacks lauched over the internet, such as APTs, ad hoc hacking attempts and ex- employees

External threats Internal Threats Open Access Behind the VPN Federated Identity provider Native strong auth Protection against fraud from internal employees User Access Management for the cloud Selection criteria

External threats Internal Threats BYOD Open Access Behind the VPN Federated Identity mngmt Native strong auth Suitability to access from personal mobile devices User Access Management for the cloud Selection criteria

External threats Internal Threats BYODUser Convenience Open Access Behind the VPN Federated Identity mngmt Native strong auth Ease of access for legitimate users User Access Management for the cloud Selection criteria

External threats Internal Threats BYODUser Convenience Audit & Compliance Open Access Behind the VPN Federated Identity mngmt Native strong auth Retention of a centralized record of user access across different applications. Application of access policy User Access Management for the cloud Selection criteria

External threats Internal Threats BYODUser Convenience Audit & Compliance Open Access Behind the VPN Federated Identity mngmt Native strong auth -

External threats Internal Threats BYODUser Convenience Audit & Compliance Open Access Behind the VPN Federated Identity mngmt Native strong auth - -

External threats Internal Threats BYODUser Convenience Audit & Compliance Open Access Behind the VPN Federated Identity mngmt Native strong auth - -

External threats Internal Threats BYODUser Convenience Audit & Compliance Open Access Behind the VPN Federated Identity mngmt Native strong auth - -

Federated Identity Management Solution IdP Product (e.g. 4TRESS) Manage user credentials Authenticate users Apply policy Assert Identity to service provider Authentication for VPN & internal applications

Thank You Questions