© 2005-07 NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.

Slides:



Advertisements
Similar presentations
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Advertisements

Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
McAfee One Time Password
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
1 Managing Identity Threats May Where are the threats ? Customer Web/App Server Vulnerabilities: Trojan sniffers Soliciting to enter credentials.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
FIT3105 Security and Identity Management Lecture 1.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
CONFIDENTIAL & PROPRIETARY 1 WAF and Identity and Access Management Integration The Next Step in the Evolution of Application Security Best Practices Jan.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Security-Authentication
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Certificate and Key Storage Tokens and Software
The Office of Information Technology Two-Factor Authentication.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Authentication.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Information Security for Managers (Master MIS)
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
WIRELESS LAN SECURITY Using
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
“Stronger” Web Authentication: A Security Review Cory Scott.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
1 Lect. 20. Identification. 2  Entity Authentication (Identification) Over the communication network, one party, Alice, shows to another party, Bob,
A Practical Comparison of Modern Authentication Mechanisms.
BeamAuth : Two-Factor Web Authentication with a Bookmark 14 th ACM Conference on Computer and Communications Security Ben Adida Presenter : SJ Park.
How to Deploy and Get the Most Out of Tokens Paul Caskey PKI Deployment Forum 2008.
Online Parking System.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Access Control / Authenticity Michael Sheppard 11/10/10.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Deploying Mobility Securely. The Risks It’s just my calendar! Theft and loss Personal device ownership Malicious software Cracking and hacking.
CSCE 201 Identification and Authentication Fall 2015.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Challenge/Response Authentication
CLOUDENTIFY.
ActivID Tap Authentication HID Global
Challenge/Response Authentication
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Office 365 Identity Management
Strong Password Authentication Protocols
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Exercise: Password Auditing
Ones Technology Products & Solutions
Presentation transcript:

© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation

© NeoAccel, Inc. What is Authentication? Authentication is the process of identifying a user. Authentication is the process of establishing whether or not a real-world subject is who or what its identifier says it is. The verification of the identity of a person or process.

© NeoAccel, Inc. Why Passwords are not enough Vulnerable to network sniffing Crack programs to decode passwords Vulnerable to system compromises Availability of tools to perform automated dictionary attacks on passwords It is sharable Solution : use complex and strong password

© NeoAccel, Inc. Uneasiness of using strong password Long & Complex Passwords Limited duration for password validity Continuous password change & resets password generation

© NeoAccel, Inc. To the rescue What’s The Solution?.... TWO FACTOR AUTHENTICATION

© NeoAccel, Inc. Two Factor Authentication Two-Factor Authentication: What is it?... Something you know… Something you are… + OR Something you have...

© NeoAccel, Inc. Something You Know “Something You Know…….” User Id & Password PIN (Personal Identification Number) Account Number Certificates

© NeoAccel, Inc. Something You Have “Something You Have….” A physical element (Token) which is in the sole possession of the valid owner, and of which only one physical copy exists. Smart Cards Multi-Function Devices USB Token OTP Token Tokens

© NeoAccel, Inc. Something You Are “Something You Are….” Biometrics Voice Recognition Retinal Scan Finger Print Recognition

© NeoAccel, Inc. Why Two Factor is Strong Identity theft prevention Prevention from phishing & replay attacks Loss of one of the factors does not compromise security Lost token’s or certificates can be revoked

© NeoAccel, Inc. Two Factor Authentication RSA Secure ID Hardware One Time Password (OTP) Tokens Software based OTP Tokens SSL Client Certificate on Tokens Two Factor authentication in NeoAccel SSL VPN-Plus

© NeoAccel, Inc. RSA Secure ID Admin activates RSA Token for each user and provides to the user User provides username and One Time Password code generated by RSA token to login into SSL VPN-Plus SSL VPN-Plus Gateway talks to RSA Secure ID RADIUS Server to authenticate the user If required RSA Server can ask for Next PIN or Change PIN

© NeoAccel, Inc. RSA Secure ID User Interface SSL VPN-Plus Web Access Terminal No client software required Secure Simplified Access

© NeoAccel, Inc. Hardware OTP Tokens Cheap alternative to RSA Secure ID solution Admin activates OTP Token for each user and provides to the user User provides username and One Time Password code generated by token to login into SSL VPN-Plus SSL VPN-Plus Gateway talks to OTP Token Server to authenticate the user

© NeoAccel, Inc. Hardware OTP Tokens…contd Any third party OTP Hardware Token that provides RADIUS or AD interface is supported by SSL VPN-Plus Tested with Aladdin, Secure Computing, Vasco tokens

© NeoAccel, Inc. Software based OTP Tokens Cheapest OTP Solution OTP is generated by software agent running on PC, mobile, PDA, palmtop, etc. User need to carry extra device Admin provides PIN and software to user to install on the device used by User

© NeoAccel, Inc. Software based OTP Tokens…contd Any third party Software Token is supported if the server module provides RADIUS or AD interface SSL VPN-Plus has been tested with Wikid Software Token solution (User need to carry extra device)

© NeoAccel, Inc. SSL Client Certificate Authenticate users based on the SSL Client Certificate produced by user at the time of login Admin creates SSL Client certificates for users and provide to users via or place it on hardware tokens User provides SSL Certificate at the time of login when asked by Gateway Gateway uses CA cert specified by Admin to verify the validity of Client Certificate

© NeoAccel, Inc. SSL Client Certificate…contd Easy to deploy and manage Based on proven most secure PKI technology Client Certificate can be installed on user’s PC or a USB token that can be easily carried by user Client Certificate can be easily revoked if device carrying the certificate is lost

© NeoAccel, Inc. The End NeoAccel, NAM-Plus, SSL VPN-Plus, Intelligent Connection Acceleration Architecture, ICAA, TSSL, and Secure Everything are trademarks of NeoAccel, Inc. All other names are or may be trademarks of their respective owners.