1 / 23

Leveraging the platform: consolidating your authentication processes

Leveraging the platform: consolidating your authentication processes. Logical Networks Under Attack. Source: www.datalossdb.org. Physical Security Matters. The Enterprise today. Physical. Partners. Customers. Logical. Employees. Remote Employees. Suppliers. Resource Protection.

drea
Download Presentation

Leveraging the platform: consolidating your authentication processes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Leveraging the platform: consolidating your authentication processes

  2. Logical Networks Under Attack Source: www.datalossdb.org

  3. Physical Security Matters

  4. The Enterprise today Physical Partners Customers Logical Employees Remote Employees Suppliers

  5. Resource Protection Physical • Physical Property • Laptops, servers, equipment • Employees Logical • Intellectual Property • Competitive Advantage • Customer information • Employee data

  6. Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Compliance Requirements HIPAAHealth Information Privacy and Security PIPEDA Personal Information Protection and Electronic Documents Act UK Data Protection Act

  7. TJX Companies, Inc. • Department store chain • Breach reported - 1.17.2007 • 94,000,000 records stolen • Settlement & other costs: $13,500,000+ Date of disclosure Source: www.datalossdb.org

  8. Heartland Payment Systems • Financial Payments company • Breach reported - 1.20.2009 • 130,000,000 records stolen • Settlement & other costs: $68,000,000+ Date of disclosure Source: www.datalossdb.org

  9. Balancing needs with effective implementation Considerations Drivers Physical and Logical Security Costs IP Protection Effectiveness Regulatory Pressures User Experience 9

  10. Problems

  11. Logical Access Websites & Remote Access • Complexity & cost of systems increasing • Unmanaged devices • Applications • Different user requirements • Fraud threats • Regulatory Compliance Windows Logon Encryption & Digital Signatures

  12. Issues with Username / Password • Frustration with number of passwords • Password reuse • Frequent Password changes • Subject to social engineering attacks “Forgotten passwords cost the typical IT department $200 per user per year” “…Between 20% to 50% of all help desk calls are for password resets”

  13. Legacy Physical Access (PACs) • Closed loop legacy systems • Easy to clone cards • No integration with Logical Access data Panel decides who can enter door radio Physical Access Reader Control Panel Logical Access data

  14. Multiple Identities and Credentials per User Logical Access • Physical Access 14

  15. Best Practices

  16. Versatile Authentication Platform Recommendation: Enterprises that want one infrastructure for all types of users: Look for a versatile authentication solution that supports and manages multiple authentication methods, provides dynamic policy setting capabilities and can handle different authentication methods for the same user under different scenarios. Ant Allan, Ray Wagner

  17. Gartner Recommendation Versatile / Adaptive Multiple Authenticators Use Cases Versatile Authentication Platform

  18. Versatile Authentication Platform • Single open platform, centralized policy management • User self administration • Deploy based on Risk, Usability, Cost Versatile Authentication Platform

  19. One Credential, multiple functions Physical • Simultaneous - legacy & new (PKI) systems. • Easy Transition • Secure Logical One Card • No password changes • Portable across devices • Multiple applications • Secure

  20. Broad based Coverage Physical Logical Employees Remote Employees

  21. Broad based Coverage Physical Partners Customers Versatile Authentication Platform Logical Employees Remote Employees Suppliers

  22. Entrust: Global Presence, Identity Focus 350 employees worldwide, focused on secure identities 24x7 best-in-class technical support We have a unique global position across financial institutions, enterprises and governments Privately held, profitable           

  23. Thank You

More Related