1 / 37

Identity and Access Management SafeWord Reseller Presentation

Identity and Access Management SafeWord Reseller Presentation. Jun 07, 2007. Singular Focus. To deliver comprehensive & integrated enterprise gateway security solutions Network Gateway, Application Gateway, Inbound & Outbound protection One of the largest independent security companies.

alka
Download Presentation

Identity and Access Management SafeWord Reseller Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity and Access ManagementSafeWordReseller Presentation Jun 07, 2007

  2. Singular Focus • To deliver comprehensive & integrated enterprise gateway security solutions • Network Gateway, Application Gateway, Inbound & Outbound protection • One of the largest independent security companies Market Leadership Technology Leadership Scale & Financial Strength • #1 in SCM Appliances • #1 in messaging security appliance • #2 in URL seats • 60% of Fortune 500; 56% of DJ Global 50; 70% of top 25 banks • TrustedSource, real-time Internet reputation system for proactive security • Most comprehensive, integrated application gateway security solution • 80 patents pending or • granted • Annual run rate over $300M • Profitable • ~ 1000 employees • Solutions deployed in 106 countries Lasting power – protects your investments; Ability to invest in new technologies; Service & support large orgs. worldwide Proven, enterprise-class security solution you can depend upon Security solutions with accurate & reliable protection Minimal administration, lowest TCO Secure Computing Highlights

  3. Trusted Provider to Blue Chip Enterprises

  4. SafeWord Representative Customers

  5. SafeWord Consistently Recognized as Best in Class SafeWord PremierAccess wins Best Two-Factor Authentication Award from SC Magazine 2006 Finalist, 2005 Network Computing Well-Connected Awards, Authentication Server, SafeWord score: A- Group test: Five-star rating“Recommended” two-factor authentication

  6. Four Key Market Drivers Viability of Security Vendors Move to Integrated Appliances • 800 security vendors • 90 percent < $15M revenue • Viability at risk • Customers & Channel want to protect their investments Integrated Appliances Lots of Point Appliances Layered Security Approach Proactive & Reliable Threat Detection Global Intelligence Application Gateway Signatures Network Gateway • AV, IDS • Anti-Spam Messaging Firewalls IDS VPN Web Local Behavior Other Apps • Anomalous behavior at the box

  7. Secure your MessagingCommunication Anti- Spam Secure your Network Edge Firewall IPS AV Anti- Virus POLICY MANAGER Compliance Connex Control POLICY MANAGER Intrusions Encryption Secure your Web Communication Encryption Anti- Virus Webwasher Compliance POLICY MANAGER SafeWord Authorization Authentication URL Filtering POLICY MANAGER Anti- Malware Connex Control Ensure proper Identity & Access Sidewinder IronMail/IronIM Central Management Network Gateway Application Gateway Enterprise Gateway SecurityIntegrated, Best-of-Breed Appliances Data & Users Internet

  8. Strong User AuthenticationSafeWord

  9. Sensitive Data is Available at Users’ Fingertips • Customer data • Financial information • Human Resources records • Mission-critical applications • Credit card data • Health care information • Company proprietary information Networks provide access to sensitive data

  10. More Users Have Access to Your Networks More Users = Higher Risk of Unauthorized Access • Employees • Business Partners • Customers • Guest and temporary workers • Hackers! Applications Business Partner Admin Gateway Custom apps Web apps SSL VPN Terminal Services Web Mail Citrix Outlook Email Databases File shares

  11. SafeWordAccess Begins with Identity • ACCESS • Enable remote and internal access • Remote Access SSL VPN • Internal Network Access Control (NAC) • Wireless LAN • Remote Web Access • Single Sign-on • MANAGEMENT • Manage users and enforce policy • Active Directory (AD) • LDAP • RADIUS • Policy enforcement and reporting • Endpoint Security • IDENTITY • Establish proof-positive identity of all users • Strong authentication with tokens • Strong authentication with smart cards • Strong authentication with biometrics • Memorized passwords

  12. The Password Risk Passwords are weak because… • Only one-factor authentication • Easy to crack • Dictionary generators • Easy to guess • Personal information accounts for high percentage of user passwords • Easy to steal from users • Keystroke loggers, phishing • Difficult to remember and use: high help-desk costs “Within the next two years, we will see that the threat of malware in remote access situations will make passwords totally obsolete – in fact, this is the one use case in which a majority of large enterprises are already using stronger authentication, although uptake among companies of all sizes is much lower, at about 10 percent.” Ant Allen, Gartner Group IAM Summit, December 2006

  13. NEW! SafeWord Alpine Token • Standards-based tokens that never expire • Compliant with OATH standards • Time-synch option: 10-60 second intervals • On-demand passcode retrieval • Only see the passcode when button is pushed • Saves battery life, no watching the clock, waiting for a passcode

  14. SafeWord Tokens Standards Based - OATHNon-expiringEvent-based orTime-based Industry’s most convenient form factor Robust and Reliable

  15. SafeWord User experience

  16. HSPD-12 SOXHIPPA GBL ConsolidatedRapidCost-effective Identity and Access Lifecycle Access Begins with Identity Enforce Policy 1 Password Token Smart Card Biometric Proximity shaggy123 Identity Strength Access Policy Grant/Deny Identify Authorize 2 3 Audit Analyze Compliance Log Events Real-time Authentication Historical Administration Forensic

  17. Typical Deployment Options VPN FW Applications RADIUS Remote Access • Email • Business • Partner • Admin SafeWord Server SafeWord Agent Active Directory Citrix OWA Database FW Server Farm Authentication Web Access SafeWord Agent Access Control andPersonalization SafeWord Server Files Database Applications SafeWord Agent Windows Inside the Perimeter SafeWord Agent UNIX SafeWord Server SafeWord Agent Application Active Directory

  18. Scalability: Replication and Load Balancing • Replication ring for load balancing and high availability across the data center or across the globe • Scalability for large enterprises • High performance to handle high volume and large number of users 101010101010 Performance 101010101010 101010101010 Global Local SafeWord easily scales from 10s to 1,000,000s of users

  19. Choice of Management Tools: Active Directory or SafeWord Enterprise Solution Pack (ESP) Console “SafeWord is just about the easiest product to manage in this group, particularly for Microsoft-based servers.” SC Magazine Group Test, Two-factor Authentication, September 2006

  20. SafeWord Active Directory Management • Use the tools you know • Manage users and assign tokens to users from the Microsoft Management Console • Managed entirely through Active Directory • SafeWord tab added to Microsoft Management Console (MMC) • Administrators can easily: • Assign tokens to users • Assign, update user PINs • Generate emergency backup passwords • Test tokens

  21. SafeWord Enterprise Solution Pack • Delegated administration using SafeWord PremierAccess administration console. • Web-based user enrollment • Advanced user self-enrollmentcapabilities • Users can easily self-enroll and activate their account through the embedded Web Enrollment Center. • Additional ESP value • Additional authenticator options • Keypad tokens • Software tokens • MobilePass SMS/email password delivery • Digital certificates and smart card • Memorized password support • Built-in RADIUS server • Web application access control • Windows domain and UNIX desktop login • Advanced access control rules • Windows and Solaris support SafeWord PremierAccess wins Best Two-Factor Authentication Award from SC Magazine 2006

  22. SafeWord Key Features • Multiple form factors with one infrastructure • Simple password • One time passcodes with non-expiring hardware and software tokens • Digital certificates and smartcards • Easy, efficient management with choice of • Active Directory • Native management console • Standards based • OATH • X.509 • RADIUS • Total Identity and Access management solutions with SafeWord SecureWire access gateway • Remote Access • Wireless LAN access • Internal network access

  23. Three SafeWord Packages • SafeWord RemoteAccess • Simple, easy-to-use solution • Secure authentication for remote access in Microsoft environments using Active Directory • Includes SafeWord for Citrix, Check Point, Nortel Networks, Cisco compatible • SafeWord PremierAccess 4.0 • Same capabilities as RemoteAccess, plus: • Support for Windows Domain login • Support for Terminal Services login • Easy upgrade path from RemoteAccess to PremierAccess • Enterprise Solution Pack (ESP) • Add-on package to PremierAccess • Advanced user management, support for all form factors, advanced reporting, rich access control

  24. SafeWord Feature Detail

  25. SafeWord Feature Detail

  26. Authentication Market “Robust” • FBR Research Report, April 18, 2007: “Authentication Spending Should Be Robust in 2007” • “It appears that spending on authentication solutions should see a ‘robust year’ in 2007, as many organizations that were once "on the fence" now appear to be getting ready to sign on the dotted line.” • “Regulatory pressures (e.g. FFIEC-banks), more sophisticated hacker attacks, necessity of guarding intellectual property, and customer privacy issues are driving many IT departments to beef up authentication levels within their respective organizations.” • “Customers and consultants with whom we have spoken echo a recurring theme, ‘passwords are not sufficient anymore,’ as many organizations are looking for more safety nets to guard their network/intellectual property. As one CTO told us, ‘it's a small price to pay considering the potential risk to my organization if something goes wrong.’

  27. Remote Access • Mobile workforce • Business partners • Customers • SSL VPN • E-mail/Outlook Web Access • Citrix SafeWord Solutions – Key Market Drivers Web Access • Retail financial • Partner portals • Subscription services • Add Security • Prevent Fraud Inside the Network Perimeter Compliance • Windows login • Unix login • System administrator login • Custom applications • Cash management • Workflow/approval • Access begins with Identity • Who: Strong Authentication • What & Where: Access Control • When: Audit logging & reports • Regulatory: HIPAA, SOX, HSPD-12

  28. Technology Evolution Identity and Access Management (IAM) Integrated Multi-Layered Access Gateways Network Access Control (NAC) Wireless Access Remote Access Integrated Pervasive Strong User Authentication Integrated Access and Identity Device based Centralized Identity Federation Compliance Identity Services Access Control • Tokens • Smart Cards • Biometrics • Proximity Point Product • Password • VPN • Citrix • Operating System Yesterday Tomorrow

  29. Case Studies and Competitive

  30. Case Study • Largest bank in Latin America needed improved authentication of online banking customers. • Deployed over 300,000 tokens for business banking and rolling out 1,000,000 additional tokens for retail banking customers. • SCUR was trusted business partner, integrated PremierAccess into existing banking infrastructure • Proven, scalable, easy-to-use solution won deal over RSA and Vasco Banamex FDIC • The Federal Deposit Insurance Corporation employs thousands of people at locations throughout the United States. • FDIC chose SafeWord PremierAccess to protect data used by employees who telecommute or access agency resources remotely. • Secure Computing provided a robust and proven solution with financial institutions that was interoperable with a number of third party systems.

  31. Case Study Oklahoma City Information Technology Department • Kindred provides health services at hospitals and nursing centers for 34,000 patients each day • HIPAA requirements mandated improved remote access protocol for employees and health workers accessing health data via Microsoft and Citrix applications. • SafeWord APIs integrated with Kindred’s legacy access control with no customization • Robust, reliable software and durable tokens won out over RSA. Kindred Healthcare • Secure remote access with Cisco VPN and SafeWord two factor authentication for city employees accessing from dozens of locations around the city, while traveling or from home. • Reduced authentication related help desk time from 30% to 5% • Eliminated redundant user database entries with Active Directory Management. • User self-enrollment reduced initial rollout and new user enrollment administration overhead

  32. Case Study • Technical professional services, 20,000 employees, 25 offices, 150 remote locations • Stringent password policy; SafeWord relieves lockouts and help desk calls • SafeWord plugged in easily to AECOM’s Cisco ACS environment • No need to change or disrupt existing infrastructure; scalability key for continued rollouts • Distributed locations roll out 100 new SafeWord users each month AECOM LAM Research • One of largest manufacturers of semiconductor processing equipment; security breach a huge risk to customers • Passwords inefficient and could be used by former employees • SafeWord compatible with tokens from a previous project, easy to migrate or “trade up” • Plug-in authentication for Cisco routers, Microsoft RAS, and ISDN • One solution enabled login for low-speed dial up access and high-speed ISDN connections

  33. 5-User Starter Pack Promotion • SafeWord for Citrix/Cisco discount campaign • 90% off 5-user starter pack (Citrix, Cisco, CheckPoint, Nortel, RemoteAccess) • Seed the market, push for add-on sales, easy upgrade to PremierAccess

  34. RSA: Why SafeWord is a Better Choice • SafeWord tokens never expire, better TCO • RSA tokens expire after 2 or 3 years and must be replaced • True Active Directory (AD) integration • Branded solutions with industry leaders such as Citrix, Cisco, CheckPoint, and Nortel • Alpine token offers new form factor and more flexible functionality • Choice of event- or time-synch tokens • Remote access, wireless, and Network Access Control from a single vendor • PKI authentication support built in • EMC’s acquisition raises questions about RSA’s security focus • Customers and resellers question RSA’s commitment to supporting new and existing business • Confusion with RSA’s new “identity”

  35. RSA Replacement Program • SafeWord “Upgrade Program” for RSA Customers • Free replacement licenses • 50% off tokens and 50% off first year support • 50% off Enterprise Solution Pack • $1 per token SPIFF in North American resellers • Authentication Broker available to phase in token replacements

  36. Sample RSA Replacement Savings Replace tokens for up to 60% off Replacement calculator available

  37. Secure Computing – Your Security Partner ENTERPRISE GATEWAY SECURITY Piece of mind with proven, reliable & proactive security solutions Comprehensive, Integrated Business Value On-going Support • Security that works – accurate & reliable • Lowest TCO, Minimal administration • Enterprise-class security solution you can depend upon • Integrated with your infrastructure tools • Service & support large orgs. worldwide • Able to continue R&D investment

More Related