SlideShare a Scribd company logo
Managed
Authentication
Securing access to critical data


E-business helps organizations work more effectively             _ User provisioning, account creation/deletion, logging
and efficiently, providing access to corporate information          and auditing
assets in ways never dreamed possible previously.                _ 24/7 Tata Communications’ Service Desk to support
However, as companies open their networks to distributed           token-related end-user inquiries — PIN resets, lost/
computing and a variety of remote users, valuable and              damaged token replacements, application issues, account
sensitive information is potentially exposed. Security             lockouts, modification of users and token resynchronization
breaches result in data theft and financial fraud, which can      _ Comprehensive reporting — on-demand and scheduled for
cause major financial losses and brand damage. For this             IT audits and internal billback
reason, organizations are enhancing security systems by          _ Self-service portal which enables end-users and
adding an authentication layer to verify network users.            administrators to track token usage, report generation,
                                                                   PIN generation, PIN resets and emergency token requests
To help provide this protection, Tata Communications offers      _ Money-back guarantees on the performance and
Managed Authentication as part of its portfolio of Managed         responsiveness of our Managed Authentication Service
Security Services. Leveraging two-factor authentication,         _ Performance-based SLAs and multiple service levels to
the Managed Authentication Service utilizes both a user-           best address an organization’s unique requirements
created personal identification number (PIN) and a randomly
generated token code to protect network-connected                Key Benefits
assets against unauthorized access. The token-generating         _ Cloud based model offers low cost of operation, low CAPEX,
mechanism can include a physical device carried by users           built-in scalability, reliability and out-of-the-box integration
or a software application loaded onto users’ existing cell         with existing infrastructure.
phones, PDAs or desktops.                                        _ With in-the-cloud 2FA validation, Tata Communications
                                                                   handles the complexity of securing, managing, and
Key Service Features                                               maintaining the infrastructure for strong authentication
_ Fully managed and secure authentication servers hosted at      _ Helps reduce complexity of deployment, staffing
  the Tata Communications’ Security Services Operations Center     requirements, administrative and logistics overhead, user
_ Integration and configuration of the customer’s internal          management and infrastructure costs for lower TCO
  client applications                                            _ Performance-based Service Level Agreements (SLAs) -
_ Choice of multiple form factors — Hard tokens, Desktop Soft      covering change management, proactive system
  Tokens and Mobile Soft Tokens                                    monitoring, responsiveness, availability and token
_ Token life cycle management and token provisioning               replacement




                                                                                                         Enterprise
                                                                                              Managed Security Services
Managed Authentication
—Token Options




Managed Authentication — Token Options

An organization can select the token option most appropriate for their users and security policies.


Soft Token Managed Authentication                                                  Hard Token Managed Authentication

Tata Communications’ Soft Token Authentication has been                            Tata Communications’ hardware token, provided by RSA, is
developed to help companies authenticate users securely                            a physical device that generates a One-Time Password (OTP)
and conveniently without additional security hardware. Users                       every 60 seconds. Tata Communications supports complete
are no longer required to carry around multiple multiple                           end-to-end deployment and management of these tokens
hardware tokens. Instead, users can install token software on                      by administering the procurement, provisioning, application
their existing cell phones, PDAs or desktops.                                      integration and end-user support.

_ Mobile token software can be easily installed on the user’s                      _ Unique time-synchronous approach automatically changes
  mobile device and run on Blackberry, iPhone, or any Java                           the user’s password every 60 seconds
  enabled mobile device                                                            _ RSA SecurID® authentication is built upon the Advanced
_ No replacement costs incurred — soft tokens from Tata                              Encryption Standard (AES) algorithm, a recognized
  Communications never expire                                                        standard that is continuously scrutinized and challenged
_ Cellular network connectivity or SMS client are not required                       by cryptologists around the world to ensure its strength
  to generate token codes                                                            and dependability
_ Multiple integration points for existing application and                         _ RSA SecurID Tokens support interoperability with over
  services (HTTPS Servlet, Radius, Secure Web Services)                              350 partner applications, including VPN, wireless, network
_ Supports multiple tokens on a single device                                        communications, web applications and more
                                                                                   _ Token replacement and emergency token code provided to
                                                                                     ensure continuity of service




For more information on Managed Authentication Service or other Managed Security Services, please visit
www.tatacommunications.com/enterprise/security or email security.solution@tatacommunications.com




                                                                                                                www.tatacommunications.com




    © 2009 Tata Communications Transformation Services Ltd. All Rights Reserved.                                     2P_TC_MTA-data-sheet-V1.7_oct-2009

More Related Content

PDF
Signify Software Tokens
PDF
Juniper Enterprise Guest Access
PDF
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
PDF
PIV Card based Identity Assurance in Sun Ray and IDM environment
PDF
Msk security non linear authenticaiton
PDF
Two factor authentication-in_your_network_e_guide
PDF
Pg 2 fa_tech_brief
DOC
test
Signify Software Tokens
Juniper Enterprise Guest Access
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
PIV Card based Identity Assurance in Sun Ray and IDM environment
Msk security non linear authenticaiton
Two factor authentication-in_your_network_e_guide
Pg 2 fa_tech_brief
test

What's hot (17)

PDF
Hitachi ID Identity Manager: Self-service and automated user provisioning
PDF
Enterprise Mobile Security for PeopleSoft
PPT
PDF
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
PDF
Hitachi ID Password Manager Brochure
PDF
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
PDF
Defining Enterprise Identity Management
PDF
Sp 29 two_factor_auth_guide
PDF
Session 7 e_raja_kailar
PDF
Smart software-manager-satellite-enhanced-edition-datasheet
PPTX
Access management
PDF
Ct 1 Danielson
PDF
From Password Reset to Authentication Management
PDF
Managing Passwords for Mobile Users
PDF
Implementing vpn using direct access technology
PPTX
PROACTEYE ACCESS MANAGEMENT
PDF
Entitlement and Compliance Management: Trends and 2012 Vision
Hitachi ID Identity Manager: Self-service and automated user provisioning
Enterprise Mobile Security for PeopleSoft
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager Brochure
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Defining Enterprise Identity Management
Sp 29 two_factor_auth_guide
Session 7 e_raja_kailar
Smart software-manager-satellite-enhanced-edition-datasheet
Access management
Ct 1 Danielson
From Password Reset to Authentication Management
Managing Passwords for Mobile Users
Implementing vpn using direct access technology
PROACTEYE ACCESS MANAGEMENT
Entitlement and Compliance Management: Trends and 2012 Vision
Ad

Similar to 2p Mta Data Sheet V1.7 X1a (20)

PDF
Signify Software Tokens
PDF
Rsa Secur Id From Signify
PDF
Rsa Secur Id From Signify
PDF
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
PDF
Ams 2 fa april 2013
PDF
CERT_ver-1.4
PDF
Signify Passcode On Demand
PDF
Signify Passcode On Demand
PDF
eMCA Suite
PDF
App viewx cert+
PDF
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
PDF
10695 sidtfa sb_0210
PDF
Brochure stonegate sslvpn-x_a4x
PDF
Scc soft token datasheet
PDF
Entrust IdentityGuard Mobile
PDF
Entrust datacard --Authentication solutions overview
PDF
Vaultless_Tokenization_Payments_Industry
DOCX
Multifactor authenticationMultifactor authentication or MFA .docx
DOC
status
DOC
Signify Software Tokens
Rsa Secur Id From Signify
Rsa Secur Id From Signify
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
Ams 2 fa april 2013
CERT_ver-1.4
Signify Passcode On Demand
Signify Passcode On Demand
eMCA Suite
App viewx cert+
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
10695 sidtfa sb_0210
Brochure stonegate sslvpn-x_a4x
Scc soft token datasheet
Entrust IdentityGuard Mobile
Entrust datacard --Authentication solutions overview
Vaultless_Tokenization_Payments_Industry
Multifactor authenticationMultifactor authentication or MFA .docx
status
Ad

More from alwayson (7)

PDF
Az Managed Ocs
PDF
Az Managed Mobility Services
PDF
Az Managed Exchange Services(1)
PDF
Sas Avaya Cm Bas Admin
PDF
Glovia Remote Managed Services
PDF
Dev004103
PDF
10833 Ovrvw Ds V14 11 5
Az Managed Ocs
Az Managed Mobility Services
Az Managed Exchange Services(1)
Sas Avaya Cm Bas Admin
Glovia Remote Managed Services
Dev004103
10833 Ovrvw Ds V14 11 5

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction

2p Mta Data Sheet V1.7 X1a

  • 1. Managed Authentication Securing access to critical data E-business helps organizations work more effectively _ User provisioning, account creation/deletion, logging and efficiently, providing access to corporate information and auditing assets in ways never dreamed possible previously. _ 24/7 Tata Communications’ Service Desk to support However, as companies open their networks to distributed token-related end-user inquiries — PIN resets, lost/ computing and a variety of remote users, valuable and damaged token replacements, application issues, account sensitive information is potentially exposed. Security lockouts, modification of users and token resynchronization breaches result in data theft and financial fraud, which can _ Comprehensive reporting — on-demand and scheduled for cause major financial losses and brand damage. For this IT audits and internal billback reason, organizations are enhancing security systems by _ Self-service portal which enables end-users and adding an authentication layer to verify network users. administrators to track token usage, report generation, PIN generation, PIN resets and emergency token requests To help provide this protection, Tata Communications offers _ Money-back guarantees on the performance and Managed Authentication as part of its portfolio of Managed responsiveness of our Managed Authentication Service Security Services. Leveraging two-factor authentication, _ Performance-based SLAs and multiple service levels to the Managed Authentication Service utilizes both a user- best address an organization’s unique requirements created personal identification number (PIN) and a randomly generated token code to protect network-connected Key Benefits assets against unauthorized access. The token-generating _ Cloud based model offers low cost of operation, low CAPEX, mechanism can include a physical device carried by users built-in scalability, reliability and out-of-the-box integration or a software application loaded onto users’ existing cell with existing infrastructure. phones, PDAs or desktops. _ With in-the-cloud 2FA validation, Tata Communications handles the complexity of securing, managing, and Key Service Features maintaining the infrastructure for strong authentication _ Fully managed and secure authentication servers hosted at _ Helps reduce complexity of deployment, staffing the Tata Communications’ Security Services Operations Center requirements, administrative and logistics overhead, user _ Integration and configuration of the customer’s internal management and infrastructure costs for lower TCO client applications _ Performance-based Service Level Agreements (SLAs) - _ Choice of multiple form factors — Hard tokens, Desktop Soft covering change management, proactive system Tokens and Mobile Soft Tokens monitoring, responsiveness, availability and token _ Token life cycle management and token provisioning replacement Enterprise Managed Security Services
  • 2. Managed Authentication —Token Options Managed Authentication — Token Options An organization can select the token option most appropriate for their users and security policies. Soft Token Managed Authentication Hard Token Managed Authentication Tata Communications’ Soft Token Authentication has been Tata Communications’ hardware token, provided by RSA, is developed to help companies authenticate users securely a physical device that generates a One-Time Password (OTP) and conveniently without additional security hardware. Users every 60 seconds. Tata Communications supports complete are no longer required to carry around multiple multiple end-to-end deployment and management of these tokens hardware tokens. Instead, users can install token software on by administering the procurement, provisioning, application their existing cell phones, PDAs or desktops. integration and end-user support. _ Mobile token software can be easily installed on the user’s _ Unique time-synchronous approach automatically changes mobile device and run on Blackberry, iPhone, or any Java the user’s password every 60 seconds enabled mobile device _ RSA SecurID® authentication is built upon the Advanced _ No replacement costs incurred — soft tokens from Tata Encryption Standard (AES) algorithm, a recognized Communications never expire standard that is continuously scrutinized and challenged _ Cellular network connectivity or SMS client are not required by cryptologists around the world to ensure its strength to generate token codes and dependability _ Multiple integration points for existing application and _ RSA SecurID Tokens support interoperability with over services (HTTPS Servlet, Radius, Secure Web Services) 350 partner applications, including VPN, wireless, network _ Supports multiple tokens on a single device communications, web applications and more _ Token replacement and emergency token code provided to ensure continuity of service For more information on Managed Authentication Service or other Managed Security Services, please visit www.tatacommunications.com/enterprise/security or email security.solution@tatacommunications.com www.tatacommunications.com © 2009 Tata Communications Transformation Services Ltd. All Rights Reserved. 2P_TC_MTA-data-sheet-V1.7_oct-2009