One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.

Slides:



Advertisements
Similar presentations
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
McAfee One Time Password
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
The future of Desktops Transform Your Desktop with Virtualization.
eToken Virtual and MobilePASS
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
eToken PKI Client Overview
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Unified Logs and Reporting for Hybrid Centralized Management
RSA SecurID November 10, 2005.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Public Key Infrastructure from the Most Trusted Name in e-Security.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Motorola Mobility Services Platform
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Deploying and Managing Mobile Devices in the Enterprise.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview April 2006 ®
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Business Value - TCO How can Microsoft help? Business IT Scenario Solution Empower with self-service: Portals (Employee self-service)
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Building a Fully Trusted Authentication Environment
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
Craig Pringle & Derek Moir
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
HUB International: Software & Common Applications
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Forefront Security ISA
Access and Information Protection Product Overview October 2013
Check Point Connectra NGX R60
Public Key Infrastructure from the Most Trusted Name in e-Security
The Evolution of Secure Two Factor Authentication
System Center Marketing
Microsoft Virtual Academy
Presentation transcript:

One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009

Agenda The authenticator life-cycle management challenge eToken TMS (Token Management System) eToken TMS 5.1 Value Proposition Success Stories

Authentication Management Challenge Users Identities in the organization Security devices Authentication devices provided to users Organizational policies Access rights for user groups; required security measures Security applications Applications to be used by each user (e.g. network logon, disk encryption) A token management system enables full life-cycle management and centralized control of all authentication operations It involves a number of interrelated elements:

Authenticator assignment Authenticator enrollment Authenticator revocation/ disablement Authenticator update Password reset/change Authenticator replacement Authenticator Life-Cycle Management

eToken TMS Framework View Robust system for deploying, managing and using authenticators eToken TMS links users, organizational policies, security devices & security applications

eToken TMS Unique Selling Points One platform, one solution Simple IT infrastructure = less IT support Intuitive user self-service and automated processes Low TCO Flexibility to support new applications Authenticator inventory and usage control Enhanced user productivity and security, lost token replacement scenarios Regulatory compliance Reduced administrative errors

One platform, one solution From OTP to CBA and software authentication –Support for innovative new authenticators eToken PRO Anywhere eToken Virtual MobilePASS –Seamless migration from SafeWord OTP to eToken TMS and certificate-based authentication eToken TMS The Highlights

eToken TMS 5.1 Key Features Unified life-cycle management system for PKI and OTP Integrated with MS AD, ADAM, SQL, OpenLDAP, eDirectory Easy evolution from OTP to CBA and advanced apps Integrated with 3 rd party solutions – full disk encryption, digital signing Supports Windows, Mac, Linux Available in multiple languages Ensures data security Built-in data encryption Enhanced management Centralized client software deployment Web based self-service, help desk, admin tools, + enrollment portal Lost token on the road solution Enables compliance Role-based administration Auditing and reporting capabilities

eToken TMS 5.1 The Value Proposition For Your Customers

Who needs eToken TMS 5.1? Existing customers that need the new authenticators and/or features Existing SafeWord customers looking to add certificate based authentication New customers such as organizations with: Large authenticator deployments Multiple sites Fast moving businesses where a quick response time is critical The need to enable access to employees, partners or customers located offsite Compliance requirements

Freedom to evolve Move from OTP only to a more comprehensive environment including certificate-based authentication Supports certificate-based advanced security applications e.g. digital signing, disk encryption Extensive range of authenticators Smooth migration path from SafeWord to eToken TMS, including Safeword OTP authenticators Extensible, scalable authentication solution, from secure remote or web access today, to CBA and advanced applications such as digital signing, disk encryption tomorrow. Extensible, scalable authentication solution, from secure remote or web access today, to CBA and advanced applications such as digital signing, disk encryption tomorrow.

Vast range of authenticators and security apps New software authenticators: –eToken Virtual - full public key cryptographic token functionality completely in software. –MobilePASS - Convenience of one-time passwords generated on personal mobile devices or PCs Windows for PC and BlackBerry, Windows Mobile, Java ME-enabled devices, and Symbian for mobile devices Flexibility to choose Flexible, modular system supporting extensive OTP and PKI range of authenticators and security apps Flexible, modular system supporting extensive OTP and PKI range of authenticators and security apps

Easy OTP Deployment and Management dedicated installation option for OTP only Automatic OTP Sync that automatically resets the OTP seed in sync with the server, whenever necessary Easy integration with applications such as Citrix, OWA, IIS, IAS, including a new OTP plug-in for Outlook Web Access (OWA) 2007 Extended OTP authenticator support –GOLD including PIN protect, challenge response functionality –Alpine time and event based –eToken PASS (time based in addition to existing event based) Express OTP installation and configuration

Enabling your business anywhere eToken PRO Anywhere –Strong, certificate-based authentication, with plug and play simplicity –Zero footprint and no need for installation of desktop client software –Digital signing capabilities –Now, with remote user self-enrollment and secure access to advanced online services e.g. password reset Anywhere access to web-based applications, corporate networks, online services and business portals for authorized customers, partners and employees Anywhere access to web-based applications, corporate networks, online services and business portals for authorized customers, partners and employees

Managing authentication efficiently Extensible, open platform, with updated platform support SafeWord seamless migration eToken TMS self service & TMS remote support now available for Linux & MAC, in addition to Windows Badging /card printing: extensible connectivity to a range of third party card printers enabling integrated printing of employee cards Convenient and efficient authenticator life-cycle management Including deployments, assignments and revocations, plus remote self-service options supported by auditing and reporting capabilities. Convenient and efficient authenticator life-cycle management Including deployments, assignments and revocations, plus remote self-service options supported by auditing and reporting capabilities.

A few eToken TMS Success Stories Arab Bank, Switzerland Virgin Mobile, France Alfa Bank, Russia York Regional Police, Canada

Thank You