Deepnet Unified Authentication for Outlook Anywhere.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Simple and Secure Approach to Discovery at the Desktop.
1 Cypak core technology A new, cool and convenient way to identify your customers Combat fraud and keep your customer happy.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Overview of Wireless Network Steven Fetcie Infrastructure Manager Information Services.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Wireless policies & network lockdowns Deb Ranard Scott Matheson.
eToken PKI Client Overview
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
RSA SecurID November 10, 2005.
Active Directory Integration with Microsoft Office 365
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
Fermilab VPN Service What is a VPN ?.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
Windows 2003 and 802.1x Secure Wireless Deployments.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Gavin Carius Architect Microsoft Services SVR311.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
HOW-TO guide This tutorial has sound.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Module 8: Configuring Network Access Protection
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Module 9: Fundamentals of Securing Network Communication.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Windows 2000 Certificate Authority By Saunders Roesser.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
The Right Access for the Right People to the Right Applications under the Right Circumstances.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Wireless and Mobile Security
Adxstudio Portals Training
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
LO2 Understand the key components used in networking.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Secure Connected Infrastructure
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Operating Systems Security
Presentation transcript:

Deepnet Unified Authentication for Outlook Anywhere

Internet Outlook Client RPC over HTTP Exchange Server AD Outlook Anywhere - Logon with a Static Password Verify: Username/Password 2 3 Verify: successful Logon: Username/Password 1 4 Logon: successful Key Benefits: No need for VPN Anywhere Access Full Outlook Functions Key Issues:  Weak Authentication  Unmanaged Devices  Insecure Local History

Outlook Client RPC over HTTP Exchange Server AD Outlook Anywhere - Logon with Device Authentication Verify: Username Password 7 8 Verify: successful 9 Logon: successful Deepnet Outlook Agent Deepnet Exchange Agent Logon: Username Password 1 Deepnet Authentication Server 5 Verify: successful Username Password 6 2 DevicePass Generating Device Fingerprint Username Password Users are only allowed to use Outlook Anywhere on registered and trusted PCs or laptops

Deepnet DevicePass - Real Device Authentication Machine Fingerprint = Chassis S/N Motherboard ID Hard Disk S/N CPU ID BIOS Video Card Sound Card Network Card MAC Address More…

Enhanced Polices To achieve the ultimate security, the company can choose to apply some additional enhanced policies to the users who use the Outlook Anywhere on laptops, such as:- The machine must have Anti-Virus installed & running! The hard disk must be Full-Disk encrypted!

Problems Solved! Key Issues:  Weak Authentication  Unmanaged Devices  Insecure Local History Deepnet Solutions: Strong, two-factor authentication Managed and Trusted devices only Enforce Full-Disk Encryption policy