SlideShare a Scribd company logo
Protecting the Keys to the Kingdom
The Case for Adaptive AuthenticationforVPNs
2Protecting the Keys to the Kingdom
Today’s Speaker
Tim Arvanites
Vice President of Technical Services
SecureAuth
3Protecting the Keys to the Kingdom
Housekeeping
+ All attendee audio lines are muted
+ Submit questions via questions panel at any time!
+ Questions will be answered at the end of the presentation
+ Contact us at webinars@secureauth.com
+ Slides and recording will be sent
4Protecting the Keys to the Kingdom
Agenda
+ Today’s Reality
+ The Alternative
+ Adaptive Authentication in SecureAuth IdP
+ Live Demo – SecureAuth IdP
+ Q & A
5Protecting the Keys to the Kingdom
6Protecting the Keys to the Kingdom
The reality is….
• Preventativemeasures are failing
• We’re never going to totally stop an attack
• There are humans involved (on both sides)
• Passwords are no longer good enough
• VPNs are the “keys to your kingdom”
7Protecting the Keys to the Kingdom
Lets Examine an Attack
8Protecting the Keys to the Kingdom
Lets Examine an Attack
9Protecting the Keys to the Kingdom
Tighter security has a price
• Consumerization of IT
• Leading our users to demand less “friction”
• BUT two-factor is becoming more mainstream
• Biometrics are going commercial
• Is 2-Factor the best we’ve got?
So what’s the alternative?
11Protecting the Keys to the Kingdom
Adaptive Authentication
• Using an open-ended variety of identity-relevantdata to
incrementally elevate the trust in a claimed identity*
• When layered they’re powerful
• Device Fingerprinting • Geo-fencing
• IP Reputation • Geo-velocity
• Directory Lookup • Behavioral Analysis
• Geo-location • Etc.
*Gartner - A Taxonomy of User Authentication Methods, April 2014
12Protecting the Keys to the Kingdom
Device Fingerprinting
• First-time authentication - register the endpointfingerprint
• Subsequentauthentications- validatethe endpointagainst the
stored fingerprint
• Fingerprintsincludecertain characteristicsaboutan endpointsuch
as:
• web browser configuration • device IPaddress
• language • screen resolution
• installedfonts • browser cookies settings
• browser plugin • time zone
13Protecting the Keys to the Kingdom
IP Reputation Data
14Protecting the Keys to the Kingdom
Identity Store Lookup
+ Compare information to identities kept in a directory or user
store
- Group membership
- Object attributes
15Protecting the Keys to the Kingdom
Geo-location
+ Comparethe currentgeographicallocation (a physical,meaningful
location) against known good/bad locations
16Protecting the Keys to the Kingdom
Geo-fencing
+ Determine if the authentication location is within
a geographical area or ‘virtual barrier’
17Protecting the Keys to the Kingdom
Geo-velocity
+ Comparecurrentlocation and login history to determinewhether
an improbabletraveleventhas occurred
18Protecting the Keys to the Kingdom
• Analyze behavior that can be used to verify a person
• Gather & store characteristics about the way the user interacts with a
device such as:
• Keystroke dynamics
• Mouse movements
• Gesturepatterns
• Motion patterns
Behavioral Analysis
19Protecting the Keys to the Kingdom
Where does it help?
20Protecting the Keys to the Kingdom
Putting it all together
21Protecting the Keys to the Kingdom
Putting it all together
• Implement these techniques in layers
• Analyze, score and develop risk profile
• Take action based on result:
• Allow
• Step up
• Redirect
• Deny
• Tailor to your organizations risk tolerance
• Deliver security with low friction - users are unaware
22Protecting the Keys to the Kingdom
There is hope
• Adaptive authentication: an emerging trend in
authentication technology
• You can achieve:
• Greater analysis and control of authentication
• Balance between security and a better user experience
• Preventativemethods are failing, but you can tighten the net
around attackers
SecureAuth IdP
24Protecting the Keys to the Kingdom
Locking the doors isn’t enough…
+ Attackers are focusing efforts on stealing credentials
– Once inside they move laterally through your network, evading
detection
+ Simply having password-based security is not enough
– You must also be analyzing login attempts in real time
+ Adaptive authentication can..
– Prevent intruders from getting to apps and data
– Maintain user experience
– Keep you from being the next headline
25Protecting the Keys to the Kingdom
One Approach
SSL
VPN
Identity Provider
Adapter
Identity
Provider
Authentication
Adapter
DMZ SaaS Adaptive
Authentication
Server
On Premise Adaptive
Authentication Server
Provider Hosting
Facility
26Protecting the Keys to the Kingdom
Another Approach
Two-Factor
Authentication Policies
Analyze
Administrator
Audit LogsHigh Risk - Deny Access
Low Risk - Proceed
Medium Risk - Step Up
Authentication
27Protecting the Keys to the Kingdom
SecureAuth IdP
Two-Factor + Adaptive
Authentication
Assert
Administrator
Policies
Audit Logs
Accept, Authorize and Authenticate
Analyze
VPN
On premise
Web
Cloud
Mobile
28Protecting the Keys to the Kingdom
The
SecurePath to
Strong Access
Control
Consume any identity
from various sources
Map identity to existing
data stores for
authentication
information
Utilize one or more of
20+ methods to
confirm user identity
Transparently assert
identity to
on-premise, cloud,
mobile and VPN
resources (SSO)
Centralize and inspect
access control activity
29Protecting the Keys to the Kingdom
IdP Adaptive Authentication
Before authentication begins IdP examines the IP address
+ Compares to defined white and black lists
– Inspects full or partial addresses, ranges of addresses, and country
codes
+ Analyzes using real-time data from Norse Corporation
– Assigns a risk score
– Takes action based on selected risk threshold
IP Inspection
30Protecting the Keys to the Kingdom
IdP Adaptive Authentication
+ During authorization IdP inspects the identity
– Consumes information in the data store
– Compares defined group memberships to authorization restrictions
– Takes action based on defined criteria
Group Membership
31Protecting the Keys to the Kingdom
IdP Adaptive Authentication
At authentication IdP examines:
+ Digital Fingerprints
– Compares client-unique informationfrom browser or device to stored profile
– Action taken when variances exceed defined threshold
+ Geo-location/velocity
– Compares last log in time and location to currentlogin attempt
– Responds based on allowable travelparameters
Heuristics and Velocity
32Protecting the Keys to the Kingdom
IdP Adaptive Authentication
+ Pass
– User is authenticated
+ Redirect
– Use is redirected to a customizable URL
+ Challenge
– User is routed through additional multi-factor workflow(s)
+ Hard Stop
– Authentication is halted and a custom error message is displayed
User Response Options
Live Demo
34Protecting the Keys to the Kingdom
• Founded in 2006
• Privately held company
• HQ in Irvine, California
• 10 technology patentsand
counting
• Technology partners:
Cisco, Juniper, F5, Citrix,
Microsoft,Amazonand
Google
Our mission: to deliver unbelievablevalue to our customersby linking legacy and emerging
technologyinvestmentsusingnew and innovativetechniquesforsecureuser accesscontrol
SecureAuth Corporation
35Protecting the Keys to the Kingdom
Why SecureAuth?
+ We are an innovator of identity and information security solutions
that deliver secure access control in ways you never thought
possible
• Culture of innovation
• Customer focused
• Standards based – no lock in!
36Protecting the Keys to the Kingdom
SecureAuth IdP
Q&A
The intellectual contentwithinthisdocumentisthe propertyof SecureAuth
and must not be shared withoutprior consent.

More Related Content

PPTX
501 ch 2 understanding iam
PDF
PKI Industry growth in Bangladesh
PPTX
How to write secure code
PDF
Hunting: Defense Against The Dark Arts v2
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
The Shifting Landscape of PoS MalwareOutput
PPTX
Protecting Sensitive Data (and be PCI Compliant too!)
PPTX
Insider threats webinar 01.28.15
501 ch 2 understanding iam
PKI Industry growth in Bangladesh
How to write secure code
Hunting: Defense Against The Dark Arts v2
Combating Insider Threats – Protecting Your Agency from the Inside Out
The Shifting Landscape of PoS MalwareOutput
Protecting Sensitive Data (and be PCI Compliant too!)
Insider threats webinar 01.28.15

What's hot (20)

PDF
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
PDF
Avoiding the Pitfalls of Hunting - BSides Charm 2016
PPTX
SafeNet overview 2014
PDF
DNS Measurement Activity on ITB 2010
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PPTX
Certificate pinning in android applications
PDF
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
PDF
Secure Your Encryption with HSM
PPTX
Cryptzone: What is a Software-Defined Perimeter?
PDF
Common crypto attacks and secure implementations
PPTX
How to do Cryptography right in Android Part One
PDF
LASCON 2014: Multi-Factor Authentication -- Weeding out the Snake Oil
ODP
Java zone ASVS 2015
PPTX
How to do right cryptography in android part 3 / Gated Authentication reviewed
PDF
Zerotrusting serverless applications protecting microservices using secure d...
PPTX
Let's get started with passwordless authentication using windows hello in you...
PPTX
Cryptzone AppGate Technical Architecture
PPTX
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
PDF
Securing Your Mobile Applications
PDF
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
Avoiding the Pitfalls of Hunting - BSides Charm 2016
SafeNet overview 2014
DNS Measurement Activity on ITB 2010
How Google Protects Its Corporate Security Perimeter without Firewalls
Certificate pinning in android applications
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Secure Your Encryption with HSM
Cryptzone: What is a Software-Defined Perimeter?
Common crypto attacks and secure implementations
How to do Cryptography right in Android Part One
LASCON 2014: Multi-Factor Authentication -- Weeding out the Snake Oil
Java zone ASVS 2015
How to do right cryptography in android part 3 / Gated Authentication reviewed
Zerotrusting serverless applications protecting microservices using secure d...
Let's get started with passwordless authentication using windows hello in you...
Cryptzone AppGate Technical Architecture
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Securing Your Mobile Applications
Juan Francisco Losa - Nuevos enfoques de seguridad en un Banco Digital [roote...
Ad

Similar to Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for VPNs (20)

PPTX
How to Stop Cyber Attacks Using Adaptive Authentication
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPTX
AY - Adaptive Access Control
PDF
'A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem'
PPTX
The Death of 2FA and the Birth of Modern Authentication
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PDF
An Introduction to Authentication for Applications
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
PDF
Solving problems with authentication
PPTX
2017 Predictions: Identity and Security
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PDF
76 s201923
PDF
Smart Cards & Devices Forum 2013 - Security on mobile
PPTX
FIDO Alliance - Simpler Stronger Authentication.pptx
PPTX
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PPT
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
Strong authentication implementation guide
 
PDF
UNIT 2 Information Security Sharad Institute
How to Stop Cyber Attacks Using Adaptive Authentication
#MFSummit2016 Secure: Mind the gap strengthening the information security model
AY - Adaptive Access Control
'A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem'
The Death of 2FA and the Birth of Modern Authentication
Webinar: Goodbye RSA. Hello Modern Authentication.
An Introduction to Authentication for Applications
Taking Control of the Digital and Mobile User Authentication Challenge
 
Solving problems with authentication
2017 Predictions: Identity and Security
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
76 s201923
Smart Cards & Devices Forum 2013 - Security on mobile
FIDO Alliance - Simpler Stronger Authentication.pptx
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Strong authentication implementation guide
 
UNIT 2 Information Security Sharad Institute
Ad

More from SecureAuth (17)

PPT
Portal Protection Using Adaptive Authentication
PPTX
SecureAuth Solution Enhancements in 2017
PDF
Passwordless is Possible - How to Remove Passwords and Improve Security
PDF
Top 5 Reasons to Choose Adaptive SSO
PDF
What's New in SecureAuth IdP in 2017
PPTX
Why Two-Factor Isn't Enough
PDF
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
PPTX
A CISO's Guide to Cyber Liability Insurance
PPTX
The Rise of California Cybercrime
PPTX
What's New in IdP 9.0 Behavioral Biometrics and more…
PPTX
What’s New In SecureAuth™ IdP, 8.2
PPTX
What to Expect in 2016: Top 5 Predictions for Security and Access Control
PPTX
Balancing User Experience with Secure Access Control in Healthcare
PDF
Advanced Authentication: Past, Present, and Future
PPTX
The Future of Mobile Application Security
PPTX
Modern Architectures
PPTX
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
Portal Protection Using Adaptive Authentication
SecureAuth Solution Enhancements in 2017
Passwordless is Possible - How to Remove Passwords and Improve Security
Top 5 Reasons to Choose Adaptive SSO
What's New in SecureAuth IdP in 2017
Why Two-Factor Isn't Enough
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
A CISO's Guide to Cyber Liability Insurance
The Rise of California Cybercrime
What's New in IdP 9.0 Behavioral Biometrics and more…
What’s New In SecureAuth™ IdP, 8.2
What to Expect in 2016: Top 5 Predictions for Security and Access Control
Balancing User Experience with Secure Access Control in Healthcare
Advanced Authentication: Past, Present, and Future
The Future of Mobile Application Security
Modern Architectures
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers

Recently uploaded (20)

PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
L1 - Introduction to python Backend.pptx
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Understanding Forklifts - TECH EHS Solution
PPT
Introduction Database Management System for Course Database
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
System and Network Administraation Chapter 3
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
VVF-Customer-Presentation2025-Ver1.9.pptx
L1 - Introduction to python Backend.pptx
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Navsoft: AI-Powered Business Solutions & Custom Software Development
CHAPTER 2 - PM Management and IT Context
PTS Company Brochure 2025 (1).pdf.......
ManageIQ - Sprint 268 Review - Slide Deck
Understanding Forklifts - TECH EHS Solution
Introduction Database Management System for Course Database
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
System and Network Administraation Chapter 3
Design an Analysis of Algorithms II-SECS-1021-03
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Softaken Excel to vCard Converter Software.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
How Creative Agencies Leverage Project Management Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025

Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for VPNs

  • 1. Protecting the Keys to the Kingdom The Case for Adaptive AuthenticationforVPNs
  • 2. 2Protecting the Keys to the Kingdom Today’s Speaker Tim Arvanites Vice President of Technical Services SecureAuth
  • 3. 3Protecting the Keys to the Kingdom Housekeeping + All attendee audio lines are muted + Submit questions via questions panel at any time! + Questions will be answered at the end of the presentation + Contact us at webinars@secureauth.com + Slides and recording will be sent
  • 4. 4Protecting the Keys to the Kingdom Agenda + Today’s Reality + The Alternative + Adaptive Authentication in SecureAuth IdP + Live Demo – SecureAuth IdP + Q & A
  • 5. 5Protecting the Keys to the Kingdom
  • 6. 6Protecting the Keys to the Kingdom The reality is…. • Preventativemeasures are failing • We’re never going to totally stop an attack • There are humans involved (on both sides) • Passwords are no longer good enough • VPNs are the “keys to your kingdom”
  • 7. 7Protecting the Keys to the Kingdom Lets Examine an Attack
  • 8. 8Protecting the Keys to the Kingdom Lets Examine an Attack
  • 9. 9Protecting the Keys to the Kingdom Tighter security has a price • Consumerization of IT • Leading our users to demand less “friction” • BUT two-factor is becoming more mainstream • Biometrics are going commercial • Is 2-Factor the best we’ve got?
  • 10. So what’s the alternative?
  • 11. 11Protecting the Keys to the Kingdom Adaptive Authentication • Using an open-ended variety of identity-relevantdata to incrementally elevate the trust in a claimed identity* • When layered they’re powerful • Device Fingerprinting • Geo-fencing • IP Reputation • Geo-velocity • Directory Lookup • Behavioral Analysis • Geo-location • Etc. *Gartner - A Taxonomy of User Authentication Methods, April 2014
  • 12. 12Protecting the Keys to the Kingdom Device Fingerprinting • First-time authentication - register the endpointfingerprint • Subsequentauthentications- validatethe endpointagainst the stored fingerprint • Fingerprintsincludecertain characteristicsaboutan endpointsuch as: • web browser configuration • device IPaddress • language • screen resolution • installedfonts • browser cookies settings • browser plugin • time zone
  • 13. 13Protecting the Keys to the Kingdom IP Reputation Data
  • 14. 14Protecting the Keys to the Kingdom Identity Store Lookup + Compare information to identities kept in a directory or user store - Group membership - Object attributes
  • 15. 15Protecting the Keys to the Kingdom Geo-location + Comparethe currentgeographicallocation (a physical,meaningful location) against known good/bad locations
  • 16. 16Protecting the Keys to the Kingdom Geo-fencing + Determine if the authentication location is within a geographical area or ‘virtual barrier’
  • 17. 17Protecting the Keys to the Kingdom Geo-velocity + Comparecurrentlocation and login history to determinewhether an improbabletraveleventhas occurred
  • 18. 18Protecting the Keys to the Kingdom • Analyze behavior that can be used to verify a person • Gather & store characteristics about the way the user interacts with a device such as: • Keystroke dynamics • Mouse movements • Gesturepatterns • Motion patterns Behavioral Analysis
  • 19. 19Protecting the Keys to the Kingdom Where does it help?
  • 20. 20Protecting the Keys to the Kingdom Putting it all together
  • 21. 21Protecting the Keys to the Kingdom Putting it all together • Implement these techniques in layers • Analyze, score and develop risk profile • Take action based on result: • Allow • Step up • Redirect • Deny • Tailor to your organizations risk tolerance • Deliver security with low friction - users are unaware
  • 22. 22Protecting the Keys to the Kingdom There is hope • Adaptive authentication: an emerging trend in authentication technology • You can achieve: • Greater analysis and control of authentication • Balance between security and a better user experience • Preventativemethods are failing, but you can tighten the net around attackers
  • 24. 24Protecting the Keys to the Kingdom Locking the doors isn’t enough… + Attackers are focusing efforts on stealing credentials – Once inside they move laterally through your network, evading detection + Simply having password-based security is not enough – You must also be analyzing login attempts in real time + Adaptive authentication can.. – Prevent intruders from getting to apps and data – Maintain user experience – Keep you from being the next headline
  • 25. 25Protecting the Keys to the Kingdom One Approach SSL VPN Identity Provider Adapter Identity Provider Authentication Adapter DMZ SaaS Adaptive Authentication Server On Premise Adaptive Authentication Server Provider Hosting Facility
  • 26. 26Protecting the Keys to the Kingdom Another Approach Two-Factor Authentication Policies Analyze Administrator Audit LogsHigh Risk - Deny Access Low Risk - Proceed Medium Risk - Step Up Authentication
  • 27. 27Protecting the Keys to the Kingdom SecureAuth IdP Two-Factor + Adaptive Authentication Assert Administrator Policies Audit Logs Accept, Authorize and Authenticate Analyze VPN On premise Web Cloud Mobile
  • 28. 28Protecting the Keys to the Kingdom The SecurePath to Strong Access Control Consume any identity from various sources Map identity to existing data stores for authentication information Utilize one or more of 20+ methods to confirm user identity Transparently assert identity to on-premise, cloud, mobile and VPN resources (SSO) Centralize and inspect access control activity
  • 29. 29Protecting the Keys to the Kingdom IdP Adaptive Authentication Before authentication begins IdP examines the IP address + Compares to defined white and black lists – Inspects full or partial addresses, ranges of addresses, and country codes + Analyzes using real-time data from Norse Corporation – Assigns a risk score – Takes action based on selected risk threshold IP Inspection
  • 30. 30Protecting the Keys to the Kingdom IdP Adaptive Authentication + During authorization IdP inspects the identity – Consumes information in the data store – Compares defined group memberships to authorization restrictions – Takes action based on defined criteria Group Membership
  • 31. 31Protecting the Keys to the Kingdom IdP Adaptive Authentication At authentication IdP examines: + Digital Fingerprints – Compares client-unique informationfrom browser or device to stored profile – Action taken when variances exceed defined threshold + Geo-location/velocity – Compares last log in time and location to currentlogin attempt – Responds based on allowable travelparameters Heuristics and Velocity
  • 32. 32Protecting the Keys to the Kingdom IdP Adaptive Authentication + Pass – User is authenticated + Redirect – Use is redirected to a customizable URL + Challenge – User is routed through additional multi-factor workflow(s) + Hard Stop – Authentication is halted and a custom error message is displayed User Response Options
  • 34. 34Protecting the Keys to the Kingdom • Founded in 2006 • Privately held company • HQ in Irvine, California • 10 technology patentsand counting • Technology partners: Cisco, Juniper, F5, Citrix, Microsoft,Amazonand Google Our mission: to deliver unbelievablevalue to our customersby linking legacy and emerging technologyinvestmentsusingnew and innovativetechniquesforsecureuser accesscontrol SecureAuth Corporation
  • 35. 35Protecting the Keys to the Kingdom Why SecureAuth? + We are an innovator of identity and information security solutions that deliver secure access control in ways you never thought possible • Culture of innovation • Customer focused • Standards based – no lock in!
  • 36. 36Protecting the Keys to the Kingdom SecureAuth IdP
  • 37. Q&A
  • 38. The intellectual contentwithinthisdocumentisthe propertyof SecureAuth and must not be shared withoutprior consent.