1 / 11

Building a Fully Trusted Authentication Environment

Building a Fully Trusted Authentication Environment. IBM-SafeNet Joint Solutions Strong Authentication for ISAM-Protected Resources. An Introduction to IBM-SafeNet’s Joint Solutions 2014. Who we Are . Trusted to protect the world’s most sensitive data.

oberon
Download Presentation

Building a Fully Trusted Authentication Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Building a Fully Trusted Authentication Environment IBM-SafeNet Joint Solutions Strong Authentication for ISAM-Protected Resources An Introduction to IBM-SafeNet’s Joint Solutions 2014

  2. Who we Are Trusted to protect the world’s most sensitive data We control access to the most sensitive corporate information– more than 35 million identities protected via tokens, smartcards, and mobile devices managed on-premise and in the cloud. FOUNDED 1983 Baltimore, MD OWNERSHIP Private REVENUE ~330m GLOBAL FOOTPRINT +25,000 Customers in 100 countries We are the de facto root of trust–deploying more than 86,000 key managersand protecting up to 750,000,000 encryption keys. We protect the most money that moves–over 80% of the world’s intra-bank fund transfers and nearly $1 trillion per day. ACCREDITED Products certified to the highest security standard EMPLOYEES +1,400 In 25 countries We monetize the most high-value software–more than 100 million license keys protect and manage on-premise, embedded, and cloud applications globally.

  3. Gartner Magic Quadrant for User Authentication 2013 • The most highly ranked vendor • Considered the most visionary • Cited for the best execution • Recognized as having: • Very sound market understanding • Very strong product strategy • Innovation

  4. Today’s Enterprise Challenges Web ITSECURITY BOUNDARIES CHANGING • Network • Mobile / PC PASSWORDS EASILY COMPROMISED COMPLIANCE WITH REGULATIONS REQUIRED POLICIES

  5. The Solution: Comprehensive IAM Solution + Strong, Two-Factor Authentication

  6. IBM and SafeNet’s Joint Solution • Combines two best-in-class products: • IBM Security Access Manager (ISAM for Web/Mobile) • SafeNet Authentication Solutions • Streamlines and hardens access to resources by providing: • Identity and Access Management (ISAM for Web/Mobile) • Web SSO (ISAM for Web/Mobile) • Strong multi-factor authentication (SafeNet Authentication) • Offers added layer of protection via: • One-time passwords (OTPs) • Certificate-based authentication (CBA) • Is certified by IBM as Ready for IBM Security Intelligence

  7. ISAM for Web/Mobile with SafeNet Authentication

  8. ISAM for Web/Mobile with SafeNet Certificate-based Solutions

  9. Key Benefits of IBM and SafeNet’s Joint Solution • Enables secure access to corporate resources • Identity and access control policies centrally managed from ISAM • Limits the number of passwords vulnerable to compromise • Restricts user access to the corporate resources necessary to a job function • Provides organizational efficiencies • IBM/SafeNet solution reduces the total cost of ownership for an organization’s identity management and user authentication scheme • Deploys without changing existing architecture • Supports a wide range of authentication methods • Supports existing investment in authentication solutions and incremental migration • OTP authentication provided by SafeNet Authentication Service–a 100% cloud-based service that does not require additional hardware or infrastructure • Certificate-based authentication–performed locally on user’s system, eliminating need for architectural changes • Mobile Access – Supports strong authentication to web-based applications • Supports numerous use cases, for example, requiring strong authentication for privileged users, such as IT admins, mandating strong authentication for remote access (VPNs) or remote workforce (contractors and partners, etc.)

  10. Why SafeNet? Next Generation Authentication from the Leading Authentication Vendor • Frictionless Authentication • Choice of delivery platforms • Automated administration, user & token management • Broadest range of authentication methods • Broad use case support • Security and Trust • Use of industry standards • Hardware-based root of trust • Control over authentication data • Certified products • Transparency and Visibility • Extensive reporting and auditing

  11. Thank You Questions? 11

More Related