Soft-Tronik - Partner Security Konferencia č Bezpe nostné riešenia pre Business akceleráciu Karol Piling [email protected] +421905856352 SE C&EE IT Customer Landscape 2 Introducing Information-centric Security secure enterprise data Preserve the confidentiality and integrity of critical data wherever it resides secure employee access Enable secure, anytime, anywhere access to corporate resources secure access secure data customers secure partner access Open internal systems to trusted partners partners secure customer access employees Offer self-service channels, prevent fraud, and enhance consumer confidence security information management manage security information Comply with security policy and regulations 3 RSA SecurID update Growing Need for Secure Information Access… From Outside and Within the Organization From outside the organization: From inside the organization: Secure Remote Access Secure Enterprise Access Corporate Office Corporate Office Terminal Services Microsoft Logon Terminal Web Apps E-mail Services Wireless Network VPN Web and Browser Apps IT Enterprise Infra- Desktop SSO structure Apps 5 RSA SecurID Time Synchronous Two-Factor Authentication RSA RSA Authentication Agent Authentication Manager RAS, VPN, 003322884488 Web Server, WAP Algorithm etc. Algorithm Time Seed Time Seed SSaammee SSeeeedd SSaammee TTiimmee 6 RSA SecurID – a broad range of form factors today RSA SecurID Hardware Tokens • SID700, • SID900 – Transaction signing token - Classic SecurID • SID800 as a smart card and SecurID token • Two factor with windows credential or certificate • Key for unlocking Hard Disk Encryption solution s • Access to Digital Certificates for secure e- mail, signing, and file encryption needs Boot and HDD encryption • Pointsec, Safeboot, Ultimaco, Winmagic ... www.rsasecured.com 7 RSA SecurID authentication for Secure Remote Access ® Securing the Remote Desktop and Laptop Boot Process Windows Windows Web Host Citrix Hard Disk Windows Java Encryption Solution Secures OS Operating System Secure before it starts System Files Data End-user certificate User found in Disk cross-referenced Encryption Vendor Database Replacing user names and passwords with strong authentication when logging into disk encryption solution ensures greater desktop and laptop security 8 Who are our SecurID Ready Authenticator Partners? Description Partner RIM • Converged PDA & Phone Smart Motorola • Use as standalone SID token Phones Nokia or for mobile VPNs Sony Ericsson • USB Memory Stick with SanDisk Secure Storage RedCannon Flash Drives • Potential for additional MXI applications IronKey • Fingerprint reader embedded UPEK Biometrics in laptop, PC, mobile phone. AuthenTec • Used for 2 or 3 factor ID Privaris • Smart card for mobile devices. SIM Vodafone Trusted • Processor for secure key Platform Broadcom generation and management Modules 9 . What is our Software Token offering? Desktop Software Token SecurID Toolbar Token Mobile Software Tokens • RIM Blackberry • Microsoft PocketPC • Palm OS • Java Phone • Windows Mobile 5.0 10
Description: