1 / 14

Building a Fully Trusted Authentication Environment

Building a Fully Trusted Authentication Environment. SafeNet: A Fully Trusted Name in Security and Authentication for 15 Years. Authentication Portfolio Overview James Torson Channel Account Manager. Who We Are .

stacy
Download Presentation

Building a Fully Trusted Authentication Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Building a Fully Trusted Authentication Environment SafeNet: A Fully Trusted Name in Security and Authentication for 15 Years Authentication Portfolio Overview James Torson Channel Account Manager

  2. Who We Are Trusted to protect the world’s most sensitive data for the world’s most trusted brands and governments FOUNDED 1983 Baltimore, MD OWNERSHIP Private We are The Data Protection Company REVENUE ~455m GLOBAL FOOTPRINT +25,000 Customers in 100 countries Protecting What Matters Where it Matters ACCREDITED Products certified to the highest security standard EMPLOYEES +1,600 In 25 countries We Know Crypto

  3. SafeNet Data Protection Product Portfolio Identity & Transaction Data & Communication Trusted Authentication Environment HSM Data Encryption and Control High-Speed Network Encryption Broadest range of authenticators, from smart cards and tokens to mobile phone auth—all managed from a single trusted platform Offering the most secure, and easiest to integrate technology for securingPKI identities and transactions SafeNet high-speed network encryptors combine the highest performance, lowest latency and aunified managementplatform • DataSecure – a Universalplatform deliveringintelligent data protection and control for information assets from the datacenter to the cloud

  4. SafeNet Authentication 4

  5. Market Segments and Use Cases • Enterprise • Government • Financial Services • Network access • Remote access • SaaS access • VDI access • Mobile device authentication • End-point security (FDE, PBA) • 2FA for privileged access • G2B /G2C • Document filing • Online tax filing • National ID • Document signing • High Assurance Solutions • Type 1 • SUITE B • Customer access • Transaction security • Transaction signing • Non-repudiation 5

  6. Significant Market Trends Escalated Risk Landscape • Complex IT Environment • Breaches • APTs • Malware / MitB • Social networking • Consumerization • Accelerated mobile device adoption • Cloud • Multiple access points • IT manageability • Differentiated authentication methods for different environments • Transaction security – more than just authentication • User acceptance • Cost

  7. Start with a Unified Back-End That Delivers Multiple Solutions • One Server for centralized deployment and management • One Server for VPNs, VDIs, OWA, Web-based portals,and Cloud applications • One Server for Identity Federation (SAML) • One Server to authenticate access from mobile devices • One Server supports multiple authentication methods (Context/Risk, OOB, OTP, PKI) • One Server for multiple form factors: smartcards, USB, software • One Server = simplified management, greater flexibility and lower TCO

  8. Delivered in the Cloud OR on Premise Authentication to the Cloud and From the Cloud. Authentication delivered As a Service or On-premises

  9. Within A Fully Trusted Authentication Environment • Addresses the risks and threats of today, while laying a strong foundation for the needs of the future. Control: Choice: Future-Proof: • Full control over token secret data • Additional layers of protection • Multiple authentication methods & form factors • Single authentication platform ready for evolving use cases (cloud, mobile, transaction signing) Customer Control Over Security

  10. The Freedom to Choose and Evolve: Multiple Form Factors and Authentication Methods Context-based Authentication USB Authenticators OTP Authenticators Smart Cards Software Authenticators Hybrid Authenticators OOB (SMS) Authentication Offering the broadest range of authenticators, from smart cards and tokens to mobile phone auth—all managed from a single platform 10

  11. And Support for Multiple Use Cases

  12. Summary – Key Value Proposition Helping customers successfully achieve the right balance of risk mitigation, cost effectiveness and usability Cost Implement & manage solutions for numerous use cases with a single authentication back-end and centralized administration delivered in the cloud or on premise usability Simplify the user experience for both IT and users with different authentication devices and streamlined management Address risk with embedded secure cloud access, strong authentication for mobile device access and support for advanced security applications

  13. 2012 Magic Quadrant for User Authentication Gartner ranks SafeNet @ the top of the Leader’s Quadrant ! (out of 22 companies analyzed)

  14. Thank You Questions? 14

More Related