SlideShare a Scribd company logo
SecureAuthTM
IdP
ADAPTIVE ACCESS CONTROL
Determine Identities with Confidence
2Copyright SecureAuth Corporation 2015
Agenda
+ The “Identity” problem
+ How SecureAuth IdP can help solve
+ How SecureAuth IdP is different
+ SecureAuth customers
3Copyright SecureAuth Corporation 2015
EMPLOYEES
BUSINESS
PARTNERS
CUSTOMERS
CLOUD
ON-PREM
Commercial &
Homegrown
+ Billions spent annually on
Endpoint and Network security
+ 66% of Executives still not
confident they’re protected1
+ Breaches continue –
Anthem, US National Guard, T-Mobile,
Scottrade, CVS, Walgreens, IRS, FBI
+ If you have valid
credentials…you get in!
Users are the vulnerability & most
popular access point
+ SecureAuth protects & detects
at the user identity levelENDPOINT
SECURITY
NETWORK
SECURITY
Typical Security Infrastructure
Routinely Circumvented
1 - A 2015 Survey – Cybersecurity in the Boardroom (Link)
4Copyright SecureAuth Corporation 2015
“2015 Data Breach Investigations Report” by Verizon
http://www.verizonenterprise.com/resources/reports/
rp_data-breach-investigation-report-2015_en_xg.pdf
5Copyright SecureAuth Corporation 2015
EMPLOYEES
BUSINESS
PARTNERS
CUSTOMERS
CLOUD
ON-PREM
Commercial &
Homegrown
NETWORK
SECURITY
How can we
improve security
while
improving usability
and
reducing costs?
Need for Stronger Identity Security
Identity is the New Security Perimeter
IDENTITY
SECURITY
ENDPOINT
SECURITY
6Copyright SecureAuth Corporation 2015
How Can SecureAuth Help?
Improve Security Improve Usability Reduce Costs
• Adjust security based on
dynamic risk analysis
• Tailor login process to
different types of groups
(i.e. administrators vs sales)
• Use behavioral biometrics
to continually monitor &
get smarter about auth.
• Only require MFA when
risk factors are present
• Secure single sign-on
convenience
• Self service - users manage
their own accounts
• Multiple authentication
methods to match use case
(can require more than 2 factors to proceed)
• Rapid deployment using
standard connectors
• Augment & complement
existing security
investments
• Uses existing directories
• No tokens/devices to buy
• Saving via self-service
(reduce 30-60% of your calls)
7Copyright SecureAuth Corporation 2015
SecureAuth IdP
How Are We Different?
Pre-Authentication
Risk Analysis
Multi-Factor
Authentication
(20+ Methods)
Adaptive
Authentication
Workflows
Continuous
Authentication
(Behavioral Biometrics)
Single Sign-On User Self-Service
Any Application
Any Device
Any Identity Store
Any Identity Type
Password Reset
Account Unlock
Self-Enrollment
Self-Provisioning
Authentication Security
Any VPN
8Copyright SecureAuth Corporation 2015
Millions of Users Trust SecureAuth
BANKING &
SECURITIES
HEALTHCARE GOVERNMENT HIGH TECH TRAVEL EDUCATION COMMUNICATIONS
MEDIA & SERVICES
RETAIL
AY - Adaptive Access Control
10Copyright SecureAuth Corporation 2015
What Are Customers Saying?
“We’re able to eliminate smartcards and, over a year and half period, we were able to
eliminate soft FOB and hard FOB usage… We’ve reduced the number of passwords, made
it easier for our users to log into applications and our network, and improved security.”
– Chris Joerg, Director, Global Information Security – Unisys
“SecureAuth gives me the ability to ensure that remote access into my network is
being done by authenticated individuals in a secure way and with the least amount of
resistance.”
– Martin Littman, CTO & CISO – Kelsey-Seybold Clinic
“The flexibility of SecureAuth allowed us to go not only go with our main Citrix web apps
based application but with all other types of different applications from VPN all the way
to cloud-based SaaS apps. It was best of breed in every category.”
– Matt Johnson, Manager, Server Engineering – Houston Methodist Hospital
Visit www.secureauth.com
The intellectual content within this document is the property of SecureAuth
and must not be shared without prior consent.
12Copyright SecureAuth Corporation 2015
Device Recognition
IP Reputation
Directory Lookup
Geo-Location
Geo-Velocity
Behavioral Biometrics
Risk Layers
Dynamic Adaptive Authentication
+ Layered Risk Analysis =
Stronger Security
+ No User Experience
Impact
+ Only present MFA when
needed
+ No other vendor has as
many “layers”
13Copyright SecureAuth Corporation 2015
+ Unique to each individual
on each device
+ 99%* Accuracy (improves over
time)
+ Only acts when threat
detected – MFA to proceed
+ First vendor to offer…
Available March 2016
TYPE
TOUCH
MOUSE
Behavioral Biometrics
Continuous Authentication
14Copyright SecureAuth Corporation 2015
Any…Any…Any…
Choice & Flexibility
Any ID TypeAny Device Any ID Store Any ApplicationAny VPN
User Logon ID
SA web SSO token
3rd Party Web token
SAML
NYLM/Kerberos
X509 Cert
CAC
PIV
Smartcard
Form Post
Google
Facebook
LinkedIn
Windows Live
LDAP
AD_LDS
ODBC
Web Services
Lightweight Virtual Directory
WS-Trust
WS-Fed
Mobile
Web Token
Form-based
Tablets &
Smartphones
Desktops &
Laptops
15Copyright SecureAuth Corporation 2015
Self Help Tools
Reduce Administration
+ Password Resets, Account
Unlock, Self-Enroll &
Provision
+ Time Savings
+ Labor Savings
+ User Autonomy
16Copyright SecureAuth Corporation 2015
Consume any identity
from various sources
Map identity to existing data
stores for authentication
information
Utilize one or more of
20+ methods to confirm
user identity
Transparently assert
identity to on-premises,
cloud, mobile and VPN
resources (SSO)
Centralize and inspect access
control activity
SecureAuth:
The Secure
Path to Strong
Access Control
17Copyright SecureAuth Corporation 2015
Any Access Device
Any
Identity
Store
Any Identity Type
Any On-Premises App
(Commercial, Legacy,
Homegrown)
Pre-Authentication Risk Analysis
Adaptive Authentication Workflows
Multi-Factor Authentication
Continuous Authentication
(Behavioral Biometrics)
Authentication Security
Any
VPN
Any
SIEM
Anything
SDK
Any Cloud App
(SaaS)
Password
Reset
Account
Unlock
Enrollment Provisioning
Self-Service
Single Sign-On
18Copyright SecureAuth Corporation 2015
Portal Examples
Make it YOUR Portal
From colorful to simple branded , it’s your portal!
19Copyright SecureAuth Corporation 2015
• Founded in 2006
• Privately held company
• HQ in Irvine, California
• 10 technology patents and
counting
• Technology partners:
Cisco, Juniper, F5, Citrix,
Microsoft, Amazon and
Google
SecureAuth Corporation
Visit www.secureauth.com
The intellectual content within this document is the property of SecureAuth
and must not be shared without prior consent.

More Related Content

PPTX
The Road to Intelligent Authentication Journeys
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
PDF
Mobile Banking Security Risks and Consequences iovation2015
PDF
Applying Innovative Tools for GDPR Success
PDF
Identity Live Sydney: Intelligent Authentication
PDF
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
PDF
Managing & Securing the Online and Mobile banking - Chew Chee Seng
PDF
Go Beyond PSD2 Compliance with Digital Identity
The Road to Intelligent Authentication Journeys
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
Mobile Banking Security Risks and Consequences iovation2015
Applying Innovative Tools for GDPR Success
Identity Live Sydney: Intelligent Authentication
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Go Beyond PSD2 Compliance with Digital Identity

What's hot (20)

PDF
Identity Live Singapore: Just Ask 'Em
PDF
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
PDF
Distil Networks Protecting the Telephony Industry
PDF
FIDO Authentication for Multifactor Payments
PPTX
2017 Predictions: Identity and Security
PDF
The future of Identity Access Management | Sysfore
PPTX
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
PDF
Top 7 Mobile Banking Security Tips
PPTX
The state of uma 2014 11-03
PDF
Identity Live in Austin Keynote
PPTX
2015 Identity Summit - CTO Innovation Center
PDF
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
PPTX
2015 Identity Summit - Stepping Up to New Data Protection Challenges
PDF
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
PDF
Spellpoint - Securing Access for Microservices
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PDF
Aditro - IAM as part of Cloud Business strategy
PPTX
Identity Access Management 101
Identity Live Singapore: Just Ask 'Em
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
Distil Networks Protecting the Telephony Industry
FIDO Authentication for Multifactor Payments
2017 Predictions: Identity and Security
The future of Identity Access Management | Sysfore
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
Top 7 Mobile Banking Security Tips
The state of uma 2014 11-03
Identity Live in Austin Keynote
2015 Identity Summit - CTO Innovation Center
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
2015 Identity Summit - Stepping Up to New Data Protection Challenges
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Spellpoint - Securing Access for Microservices
Extending the Power of Consent with User-Managed Access & OpenUMA
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Intelligent Authentication (Identity Live Berlin 2018)
Aditro - IAM as part of Cloud Business strategy
Identity Access Management 101
Ad

Viewers also liked (20)

PDF
A adaptive compensation processing method of aeronautical aluminum alloy thin...
DOCX
New microsoft office word document
PPS
Basic components, memory
PDF
Adaptive Control Systems Paper Presentation
PPTX
cAdaptive control
PPTX
Cncprogramming
PPTX
Computer basics
PPTX
Linear motion guideways
PPT
Adaptive control System
PPTX
DNC SYSTEMS
PPTX
Adaptive cruise control
PDF
Cnc hardware
PPTX
CNC AND ITS COMPONENTS
PDF
Cncpresentation CNC lathe machine
PDF
Cnc, dnc & adaptive control
PPTX
NC, CNC & DNC Machine
PPT
Cnc Programming Basics
PPTX
DOC
Introduction to cnc machines (1)
A adaptive compensation processing method of aeronautical aluminum alloy thin...
New microsoft office word document
Basic components, memory
Adaptive Control Systems Paper Presentation
cAdaptive control
Cncprogramming
Computer basics
Linear motion guideways
Adaptive control System
DNC SYSTEMS
Adaptive cruise control
Cnc hardware
CNC AND ITS COMPONENTS
Cncpresentation CNC lathe machine
Cnc, dnc & adaptive control
NC, CNC & DNC Machine
Cnc Programming Basics
Introduction to cnc machines (1)
Ad

Similar to AY - Adaptive Access Control (20)

PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PPTX
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
PPTX
Why Two-Factor Isn't Enough
PPTX
What's New in IdP 9.0 Behavioral Biometrics and more…
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
The Why - Keith Graham, CTO – SecureAuth+Core Security
PDF
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPTX
SecureAuth Solution Enhancements in 2017
PPTX
A CISO's Guide to Cyber Liability Insurance
PDF
Strong authentication implementation guide
 
PDF
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
PDF
Intelligent Authentication
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
PDF
Bright talk mapping the right aut solution for you 2014 final (1)
PPTX
How to Stop Cyber Attacks Using Adaptive Authentication
PPT
Strong Authentication - Open Source
Webinar: Goodbye RSA. Hello Modern Authentication.
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Why Two-Factor Isn't Enough
What's New in IdP 9.0 Behavioral Biometrics and more…
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
#MFSummit2016 Secure: Mind the gap strengthening the information security model
SecureAuth Solution Enhancements in 2017
A CISO's Guide to Cyber Liability Insurance
Strong authentication implementation guide
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
Intelligent Authentication
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
Product Vision - Stephen Newman – SecureAuth+Core Security
Bright talk mapping the right aut solution for you 2014 final (1)
How to Stop Cyber Attacks Using Adaptive Authentication
Strong Authentication - Open Source

AY - Adaptive Access Control

  • 2. 2Copyright SecureAuth Corporation 2015 Agenda + The “Identity” problem + How SecureAuth IdP can help solve + How SecureAuth IdP is different + SecureAuth customers
  • 3. 3Copyright SecureAuth Corporation 2015 EMPLOYEES BUSINESS PARTNERS CUSTOMERS CLOUD ON-PREM Commercial & Homegrown + Billions spent annually on Endpoint and Network security + 66% of Executives still not confident they’re protected1 + Breaches continue – Anthem, US National Guard, T-Mobile, Scottrade, CVS, Walgreens, IRS, FBI + If you have valid credentials…you get in! Users are the vulnerability & most popular access point + SecureAuth protects & detects at the user identity levelENDPOINT SECURITY NETWORK SECURITY Typical Security Infrastructure Routinely Circumvented 1 - A 2015 Survey – Cybersecurity in the Boardroom (Link)
  • 4. 4Copyright SecureAuth Corporation 2015 “2015 Data Breach Investigations Report” by Verizon http://www.verizonenterprise.com/resources/reports/ rp_data-breach-investigation-report-2015_en_xg.pdf
  • 5. 5Copyright SecureAuth Corporation 2015 EMPLOYEES BUSINESS PARTNERS CUSTOMERS CLOUD ON-PREM Commercial & Homegrown NETWORK SECURITY How can we improve security while improving usability and reducing costs? Need for Stronger Identity Security Identity is the New Security Perimeter IDENTITY SECURITY ENDPOINT SECURITY
  • 6. 6Copyright SecureAuth Corporation 2015 How Can SecureAuth Help? Improve Security Improve Usability Reduce Costs • Adjust security based on dynamic risk analysis • Tailor login process to different types of groups (i.e. administrators vs sales) • Use behavioral biometrics to continually monitor & get smarter about auth. • Only require MFA when risk factors are present • Secure single sign-on convenience • Self service - users manage their own accounts • Multiple authentication methods to match use case (can require more than 2 factors to proceed) • Rapid deployment using standard connectors • Augment & complement existing security investments • Uses existing directories • No tokens/devices to buy • Saving via self-service (reduce 30-60% of your calls)
  • 7. 7Copyright SecureAuth Corporation 2015 SecureAuth IdP How Are We Different? Pre-Authentication Risk Analysis Multi-Factor Authentication (20+ Methods) Adaptive Authentication Workflows Continuous Authentication (Behavioral Biometrics) Single Sign-On User Self-Service Any Application Any Device Any Identity Store Any Identity Type Password Reset Account Unlock Self-Enrollment Self-Provisioning Authentication Security Any VPN
  • 8. 8Copyright SecureAuth Corporation 2015 Millions of Users Trust SecureAuth BANKING & SECURITIES HEALTHCARE GOVERNMENT HIGH TECH TRAVEL EDUCATION COMMUNICATIONS MEDIA & SERVICES RETAIL
  • 10. 10Copyright SecureAuth Corporation 2015 What Are Customers Saying? “We’re able to eliminate smartcards and, over a year and half period, we were able to eliminate soft FOB and hard FOB usage… We’ve reduced the number of passwords, made it easier for our users to log into applications and our network, and improved security.” – Chris Joerg, Director, Global Information Security – Unisys “SecureAuth gives me the ability to ensure that remote access into my network is being done by authenticated individuals in a secure way and with the least amount of resistance.” – Martin Littman, CTO & CISO – Kelsey-Seybold Clinic “The flexibility of SecureAuth allowed us to go not only go with our main Citrix web apps based application but with all other types of different applications from VPN all the way to cloud-based SaaS apps. It was best of breed in every category.” – Matt Johnson, Manager, Server Engineering – Houston Methodist Hospital
  • 11. Visit www.secureauth.com The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.
  • 12. 12Copyright SecureAuth Corporation 2015 Device Recognition IP Reputation Directory Lookup Geo-Location Geo-Velocity Behavioral Biometrics Risk Layers Dynamic Adaptive Authentication + Layered Risk Analysis = Stronger Security + No User Experience Impact + Only present MFA when needed + No other vendor has as many “layers”
  • 13. 13Copyright SecureAuth Corporation 2015 + Unique to each individual on each device + 99%* Accuracy (improves over time) + Only acts when threat detected – MFA to proceed + First vendor to offer… Available March 2016 TYPE TOUCH MOUSE Behavioral Biometrics Continuous Authentication
  • 14. 14Copyright SecureAuth Corporation 2015 Any…Any…Any… Choice & Flexibility Any ID TypeAny Device Any ID Store Any ApplicationAny VPN User Logon ID SA web SSO token 3rd Party Web token SAML NYLM/Kerberos X509 Cert CAC PIV Smartcard Form Post Google Facebook LinkedIn Windows Live LDAP AD_LDS ODBC Web Services Lightweight Virtual Directory WS-Trust WS-Fed Mobile Web Token Form-based Tablets & Smartphones Desktops & Laptops
  • 15. 15Copyright SecureAuth Corporation 2015 Self Help Tools Reduce Administration + Password Resets, Account Unlock, Self-Enroll & Provision + Time Savings + Labor Savings + User Autonomy
  • 16. 16Copyright SecureAuth Corporation 2015 Consume any identity from various sources Map identity to existing data stores for authentication information Utilize one or more of 20+ methods to confirm user identity Transparently assert identity to on-premises, cloud, mobile and VPN resources (SSO) Centralize and inspect access control activity SecureAuth: The Secure Path to Strong Access Control
  • 17. 17Copyright SecureAuth Corporation 2015 Any Access Device Any Identity Store Any Identity Type Any On-Premises App (Commercial, Legacy, Homegrown) Pre-Authentication Risk Analysis Adaptive Authentication Workflows Multi-Factor Authentication Continuous Authentication (Behavioral Biometrics) Authentication Security Any VPN Any SIEM Anything SDK Any Cloud App (SaaS) Password Reset Account Unlock Enrollment Provisioning Self-Service Single Sign-On
  • 18. 18Copyright SecureAuth Corporation 2015 Portal Examples Make it YOUR Portal From colorful to simple branded , it’s your portal!
  • 19. 19Copyright SecureAuth Corporation 2015 • Founded in 2006 • Privately held company • HQ in Irvine, California • 10 technology patents and counting • Technology partners: Cisco, Juniper, F5, Citrix, Microsoft, Amazon and Google SecureAuth Corporation
  • 20. Visit www.secureauth.com The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.

Editor's Notes

  • #4: Proliferation of acces devices (Tablets, Smartphones, and work/home PCs) coupled with the cloud-based application boom = more access points than ever before…..all creating more security vulnerabilities than ever before! 2 out 3 breaches/attacks involved attackers using stolen credentials – 2014 Verizon Data Breach Investigations Report - http://www.darkreading.com/stolen-passwords-used-in-most-data-breaches/d/d-id/1204615 Many breaches involve stealing valid user credentials, which makes the attacked org even more vulnerable, hence why the need for Identify Security
  • #5: This slide is only for reference….I want YOU to know where I got my data and arm you with that info in case a prospect asks
  • #8: Single Sign-On section: Any Device – We support iOS, Android, Windows phone and blackberry….as well as MAC, Windows, Java and even the Apple Watch – we support more devices than any other competitor Any Identity Type – We support web token, SAML, kerberos, x509 certificate, CAC, PIV, smartcards and more – we support more identity types than any other vendor Any VPN – We support Cisco, Citrix, F5, Juniper, SonicWall and more – more VPNs than any other vendor Any Identity Store – AD, LDAP, AD-LDS, Azure AD, MS-SQL, MySQL, ODBC, Oracle db and more – more than any other vendor Any Application – SAML, OpenID, OpenID connect, WS-Fed, WS-Trust, OAuth and more – More than any other vendor
  • #9: Slide has been updated to include 2014 & 2015 customer wins
  • #11: Click video thumbnails to launch each of the three videos (Must be in “Slide show mode” and have internet access)
  • #13: Bullet proof vest – has layers upon layers to strengthen
  • #15: Easily deploy – pop into existing security infrastructure Leverage existing investments Centralized & Consistent
  • #16: You can access both Password reset calc and SSO calc in the Google Drive folder link below: https://drive.google.com/folderview?id=0B_tW7Mw7r9tPQkRDakNTMlJnVDA&usp=sharing
  • #17: SecureAuth IdP provides frictionless user access control for on premise, mobile, cloud, web, and VPN resources that is so flexible and secure, it meets today’s access control needs and tomorrow’s So how does SecureAuth IdP work. Its based on the premise of 6 As’ First IdP accepts the incoming identity from really just about any source Then it authorizes that identity by comparing it to your existing data store or stores to ensure its valid Next is the authentication of the identity leveraging well over 20 methods for two-factor authentication During the first three steps, adaptive authentication analysis is taking place inspecting the selected identity attributes. Before an identity is accepted, the IP address is analyzed using white & black lists and live threat intelligence from Norse. During authentication, the user’s identity and group memberships are inspected and validated against the data store. And at authentication, device fingerprints are examined as well as geo-location and geo-velocity to further validate the identity. If the analysis identifies a risk that exceeds the defined allowable threshold, action is taken place to step-up, redirect or simply halt the authentication and taking action if necessary Next we assert the confirmed identity to whatever resources are identified whether on premise, via mobile device, in the cloud, on the web or via VPN Finally comes audit and the ability to track and retain user access events and inspect them using the SIEM tool of your choice.
  • #19: We provide you the ability to customize a portal, could be for employees, business partners, or customers. As you can see from the examples, you can get very creative (Norwegian Cruise Lines) or simple (Starbucks). It’s YOUR portal and can be branded anyway you want!
  • #20: First a little about our company. We were founded in 2006 in Irvine California. We have offices throughout the United States and our European HQ is located in London. We are a privately held company with over 80 employees. We currently have 10 patents for the technology we’ve built into our solutions. As an organization we believe in building solutions using industry standards to ensure we work well in any environment and with your existing infrastructure. As a result, we have many technology partners. Here is a list of just a few - Cisco, Juniper, Citrix, Microsoft, Amazon and Google. At the end of the day, our focus is to ensure we are delivering value, unbelievable value to you, our customer. We do this by delivering solutions that link your legacy infrastructures with emerging technologies to enable you to meet your needs for secure access control.