DAS/BEST ITSecurity Division. RSA SecurID Software Tokens: Make strong authentication a convenient part of doing business. Deploy RSA software tokens.

Slides:



Advertisements
Similar presentations
Window-Eyes EXPERIENCE THE WORLD LIKE NEVER BEFORE. The most comprehensive screen reader software package for the blind and visually impaired.
Advertisements

McAfee One Time Password
Designing Enterprise Mobility Cortado Corporate Server.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Objectives Overview Define an operating system
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
XProtect® Expert 2013 Product presentation
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Define objects and their relationships to multimedia Explain the fundamentals of C, C++, Java, JavaScript, JScript, C#, ActiveX and VBScript Discuss security.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
 Visual Studio has great support for building ASP.NET web applications  Real web application development involves more than just copying the files created.
Public Key Infrastructure from the Most Trusted Name in e-Security.
General Presentation August Based out of the Netherlands 8 years of development Launched in May Sales offices in Los Angeles, Amsterdam, Hong.
Operating Systems Chapter 4.
Your storage on the ground; Your files in the cloud.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 5: Multimedia on the Web.
Computer Concepts 2014 Chapter 7 The Web and .
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Developer TECH REFRESH 15 Junho 2015 #pttechrefres h Strategies for Developing Cross-Platform Applications Dinis Vieira.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Explain the purpose of an operating system
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
WINDOWS 8. INTRODUCING WINDOWS 8 TECHNOLOGY FEATURES The built-in assistive technologies in Windows 8 work with both Windows 8 applications and with.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Chapter 2 Securing Network Server and User Workstations.
Microsoft Management Seminar Series SMS 2003 Change Management.
Trunica Inc. 500 East Kennedy Blvd #300 Tampa, FL Cross Platform Mobile Apps With Cordova and Visual Studio 2015 © Copyright 2015.
Basics of testing mobile apps
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Introduction TO Network Administration
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Best 5 Mobile App Development Tools for Developer's to think beyond the Limitation.
1 1 Social Security Platform James Wu We Simplify Security.
OneDrive for Home. Office 365 and OneDrive: Services available to staff for home use.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Daniel, Stephen & Thomson
MaaS360 MDM for iOS, Android & Windows Phone 7
100% Exam Passing Guarantee & Money Back Assurance
File Management in the Cloud
Self-service enrollment for Windows desktops
How to have an Espresso Espresso User Guide.
OpenWells Cross-Platform Mobile Application
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
What is an Operating System?
Cloud Connect Seamlessly
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Which is right for your business, Office 365 or Microsoft 365?
Public Key Infrastructure from the Most Trusted Name in e-Security
Chapter 3 – part2.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Open Automation Software
Digital Literacy 1.00 Computer Basics
CLASSROOM PROJECTION SYSTEM
Presentation transcript:

DAS/BEST ITSecurity Division

RSA SecurID Software Tokens: Make strong authentication a convenient part of doing business. Deploy RSA software tokens on mobile devices—smartphones, tablets, and PCs— and transform them into intelligent security tokens. SecurID Software Tokens use the same time-based algorithm used in RSA SecurID Hardware Tokens.

The advantage of the Software Token seeds are: Extend term from 3yrs to 5yrs Administration overhead No travel required to obtain the software token Necessary billing paperwork can be managed electronically Reduced chance of token loss Ease of reassigning, no need to retrieve the hardware Requests are managed the same way as hardware tokens. Billing Software tokens are just a few cents more than hardware tokens, therefore billing remains the same. Note: billing begins the day after a token is assigned

Platform Flexibility SecurID Software Tokens support a variety of the most popular and widely deployed mobile platforms. Android iOS Microsoft Windows

Strong two-factor authentication to protected services Application available for download through Google Play (Android Market) Support for QR Code, Dynamic Seed Provisioning (CT-KIP), and file-based provisioning Support for up to 10 RSA SecurID tokens per device Support for copying the tokencode/passcode Android Features

Strong two-factor authentication to protected services App available for download through the Apple App Store Support for up to 10 software tokens per device Token provisioning from QR Code (for iOS 7 or higher), URL link, or file attachment Token import log for troubleshooting Redesigned UI iOS Features

Strong two-factor authentication to protected network resources Software token automation for integration with available RSA SecurID Partner applications Silent installation and silent upgrade Multiple token provisioning options including Dynamic Seed Provisioning (CT-KIP) Web plug-in for fast access to protected web sites with Microsoft Internet Explorer Interoperability with Windows screen readers for visually impaired users Microsoft Windows Features

Strong two-factor authentication to protected network resources Similar functionality and end-user experience to the Microsoft Windows version to simplify administration of mixed Windows and Mac OS X environments Multiple token provisioning options including Dynamic Seed Provisioning (CT-KIP) Native 64-bit application for integration support with 64-bit partner applications where required Mac OS X Features

Records and Auditing Only VPN liaisons for each agency are authorized to request remote access to their Agencies data. Accurate records must be maintained by the liaisons to account for access to Agency data. Software token activation codes will be valid for 72 hours from the point of assignment. Software token seeds will be disabled after 5 days if the signed SDP-6 is not returned to the ITSecurity Division. All forms should be returned to BEST-DL VPN Admins

Additional documentation will be available on the ITSecurity webpage when soft tokens are in production. Contact Information DAS/BEST ITSecurity Division David Geick, Director – Sheri DeVaux, Manager – RSA Administrators BEST-DL VPN Admins DAS/BEST ITSecurity Division