DOE Challenges How are Labs responding Security – Full disk encryption – Authentication – Threat management Directory services Energy conservation mandates.

Slides:



Advertisements
Similar presentations
Solutions for a Secure Digital World Multi-vendor Multi-factor Security.
Advertisements

automated single login access to Novell storage resources
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Access Control with Advanced Facial Recognition Technology The Face ID 3 gives users a contactless and hassle-free verification option. SALES TRAINING|
Digital Certificate Installation & User Guide For Class-2 Certificates.
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Mobile Devices in the DoD
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Identity and Access IDPrime MD 8840 and IDCore 8030 MicroSD cards
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
August 2004 Providing Industry-wide Security and Identity Management Solutions.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
Portable encryption technologies at Sandia Jeremy Baca Cyber Security Technologies Department Sandia National Labs Sandia is a multiprogram laboratory.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Data Encryption Overview South Seas Corporation Jared Owensby.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Sr. Manager Global Business Solutions Carlos Capó Master Macs in Business Easily integrate Macs into a Microsoft Shop.
LabMan Conference: June 8 & 9, 2010 Lauren Nicholas, Moravian College
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Charismathics tech networking for earth. 2 OASIS London, Nov 27th and 28th 2006, Sven Goßel, Desktops Laptops USB Memory Palm PocketPC BlackBerry.
NIH Policy Manual 2811 Policy on Smart Card Authentication iTrust Forum Mark L. Silverman December 10, 2009
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
SODA Archiving October 2013
Practical Computer Literacy Week-02
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Electronic Product Environmental Assessment Tool S.C. Association of Governmental Purchasing Officials, Inc. Spring Training Seminar March 12, 2008.
Electronic Product Environmental Assessment Tool Environmental Purchasing Goes High Tech
Securing SSH Admin Access
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
Secure Network Connectivity Claus Jespersen Solution Architect (the new) HP
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
1 1 Social Security Platform James Wu We Simplify Security.
Dial-In Number: (562) Webinar ID: Encrypt It Huh? What are you talking about? Dial-In Number: Webinar ID:
Identity and Access Management
Basharat Institute of Higher Education
Secure Connected Infrastructure
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Hardware Cryptographic Coprocessor
Product Manager, Keon PKI
Cisco Express Foundation for Systems Engineers Exam Name : practice-questions.html.
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
KMIP Entity Object and Client Registration
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
AppExchange Security Certification
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
Enabling the hybrid cloud with remote access appliances
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Install AD Certificate Services
PLANNING A SECURE BASELINE INSTALLATION
Azure AD Simon May Technical Evangelist.
Presentation transcript:

DOE Challenges How are Labs responding Security – Full disk encryption – Authentication – Threat management Directory services Energy conservation mandates Desktop management

Secure Foundation Security - Full Disk Encryption Security - Full Disk Encryption

Knowing the Players and their Products PointSec PC Mac Edition SecureDoc for Mac OS Whole Disk Encryption Full Disk Encryption Players - Software

Knowing the Players and their Products Seagate Momentus 5400 SecureDoc for Mac OS Full Disk Encryption Players - Hardware

Secure Foundation Security - Authentication Authentication

Smart cards Keychains Smart Cards as Keychains Integrating complex devices into OS X Credential System

Pre-installed Smart Card Support /System/Library/Security/tokend/ “CAC” US Government (CAC, GSC-IS) “BELPIC” Belgian Personal ID Card “JPKI” Japanese PKI Card “PIV” *New in 10.5 US Government “Personal Identity Verification”

Pre-installed Smart Card Reader Support /usr/libexec/SmartCardServices/drivers/ “CCID” USB Class Readers ■ Chip Card Interface Device USB Readers ■ Athena, CRYPTOCard, GemPlus, SCM PC Card Readers ■ CRYPTOCard, SCM, OMNIKey PCMCI A

Secure Foundation Security - Threat Management Security - Threat Management

Security Threat Management Shawn Geddis Enterprise Security Consulting Engineer MacOS X Security Tuesday, 11:45am Carolina Ballroom Apple Booth on Tuesday

Secure Foundation DirectoryServicesDirectoryServices

Directory Services Active Directory Possible solutions Active directory plug-in with MacOS X Basic functionality (name, password, home directory, UID, GID) Open Directory with MacOS X Server for MCX settings Third party solutions ADmit Mac by Thursby Extend AD schema

Secure Foundation EnergyConservationEnergyConservation

EPEAT Gold Why is it important? As of January 15, 2009, all Federal agencies must purchase 95% or higher EPEAT registered products in relevant product categories

EPEAT Gold What is it? 23 Required and 28 Optional Criteria Carbon Footprint Energy Star 4.0 for energy usage Product design, packaging design, warranty extension, end of life Gold certification means product meets all required criteria PLUS at least 75% of optional criteria APPLE PRODUCTS ARE EPEAT GOLD CERTIFIED

EPEAT Gold What is it?

EPEAT Gold Apple Energy Savings

Secure Foundation DesktopManagementDesktopManagement

Desktop Management What’s out there? Apple Remote Desktop (ARD) Third party solutions – Casper, LANrev, LANdesk Customer built solutions – PNL