20 likes | 147 Views
Explore the essentials of identity management in today's interconnected digital landscape. This seminar focuses on how to take control of access to corporate resources, ensuring that users are securely authenticated across various devices, including desktops, laptops, and smartphones. Learn about credential management and effective strategies for maintaining various security levels within an organization. Gain insights into using smart cards, tokens, and OTP applications to create a robust yet easily manageable security framework, ready for the cloud and addressing the challenges of data security in small to large enterprises.
E N D
Seminar key points : take the control • Identity management • Who has access to which corporate resource. • What role to preserve different security levels within the company • It must be powerful but easy to use. • Credential management • User Securely Authenticated on any communication or personal corporate tool (office desktop, laptop , smartphone, remote access). • Smart card, token, Smartphone OTP application. • Foundation for all applications • Ready for the cloud – The new challenge to secure data!
The Pillars of Security in the new I.T. World Small Enterprise SECURITY FIREWALL to protect Identity and Credentials vs. risks and threats of the interconnected digital world I.P. Protection D.L.P. Document Dematerialization Office Macro or script protection Remote Access & VPN/SSL Digital Signature, Workflow Secure Logon & Pre-Boot Authent. S.S.O. & Application secure access Medium Enterprise Microsoft Identity Lifecycle Manager 2010 Complete suite of identity manage- ment over etherogeneous systems Gemalto Protiva Strong Auth. Solution OTP or PKI .NET based strong authentication smart card & tokens Large Enterprise Identity Management Manage new identities and roles in the company safely and in a flexible way Credential Management Storage of personal credential on Secure Tokens or Smart Cards to preserve the identity safe from attacks Banks and Financial Institutions Government and Public Institutions SECURITY