SlideShare a Scribd company logo
Insert Your Name
Insert Your Title
Insert Date
Mapping the Ideal Authentication
Solution to your IT Environment
May, 2014
Jason Hart CISSP CISM
VP Cloud Solutions
Todays issues
• Data breaches are rampant
• Data is moving everywhere
• The approach to protecting data must
change
2
4 years ago…
Active
Directory
CISCO Router
User Laptop
3
Active
Directory
CISCO Router
User Laptop
Now…
Endpoints
ApplicationsIdentities
Complex Identity Management & Authentication
Environments
4
Active
Directory
CISCO Router
User Laptop
Now…
Endpoints
ApplicationsIdentities
Complex Identity Management & Authentication
Environments
5
Market Dynamics
Convergence
of Cloud IAM
and Auth
Evolving
Endpoint
Shift from
Product to
Service
Evolving Endpoint
 Shift from browser to application
centric models
 Multiple identities
 Multiple devices
 Inconsistent credential management
across mobile and PC
6
Market Dynamics
Convergence
of Cloud IAM
and Auth
Evolving
Endpoint
Shift from
Product to
Service
Shift from Product to
Service
 Not only about the security
functionality. It is about how it is
provisioned, managed, and
brought to market
 On-demand, agile,
automated, self-service
 Creating new business
models and routes to market
7
Market Dynamics
Convergence
of Cloud IAM
and Auth
Evolving
Endpoint
Shift from
Product to
Service
Convergence of Cloud IAM
and Authentication
 Complexity has caused need for
simplification.
 Markets are merging- it is inevitable
8
Strong Authentication On the Rise
9
In two years, 25% anticipate that 90-100%
of the workforce will be using multi-factor
authentication.
Source: Multi-Factor Authentication: Current Usage and Trends,
SafeNet Survey, April 2014
Driven by Security Concerns
10
Verizon 2013 Data Breach Investigations Report
But ……….
11
Ease of Use
Need to Protect
Multiple
Applications
Source: Multi-Factor Authentication: Current Usage and Trends,
SafeNet Survey, April 2014
SafeNet Authentication Service
 Fully automated strong Authentication-as-a-Service from the
cloud:
• Automated provisioning, reporting, self service
• Automated security policy engine and templates
• Total flexibility to customize everything: tokens, processes, policies
 Simple service delivery and reduced overheads:
• Up and running in minutes
• No infrastructure or maintenance costs
• No up front investment
 Protects all resources: SaaS, apps, networks
 Protects everyone with multiple token options: Software, SMS,
Hardware and Grid tokens
12
Main “as-a-Service” Benefits
 Fully Automated. Strong authentication made easy through a
fully automated management system.
 Use Cases. Broad use case coverage areas for vast
authentication needs
 Low Total Cost of Operation. Substantially reduces costs
compared to traditional strong authentication environments.
 Peace of Mind. Availability, protection, overall peace of mind in a
trusted cloud environment.
 Quick Cloud Migration. Reduced deployment time and
increased flexibility.
13
Cost Reduction. Simplicity. Flexibility.
14
Online
Storage
Application
Hosting
Disaster
Recovery
SAML
Tokens & Users
Administrator
Agent
RADIUS
API
Private Networks
Corporate
Network
Corporate
Network
Corporate
Network
Corporate
Network
LDAP / Active
Directory
LDAP / Active
Directory
LDAP / Active
Directory
LDAP / Active
Directory
Cloud
Services
Cloud
Applications
SAML
SAML
Protect Everything and Everyone, Anywhere
OTP Authenticators
OOB (SMS)
Authenticators
Software Authenticators
GrIDsure
Authentication
15
 SafeNet Authentication Service
authenticators:
• Don’t expire
• Seed keys can be owned by the
subscriber
• Can be easily re-assigned to new
users
• Easy deployment saves cost and
time
• A token can be included in the
service charge
Protect Everyone
16
Extend Identities to the Cloud
User authenticates
using enterprise
identity
Cloud ApplicationsSaaS Apps
Salesforce.com
Goggle Apps
Support Multiple Identities & Tokens
17
Multiple tokens per user
and or
Multiple user names per Token
18
Cost Reduction. Simplicity. Flexibility
Cost Related Advantages
 Up to 60% savings in Total Cost of Operation
 99.999% service availability
 Effective budget utilization & flexibility with OPEX pricing
 Up to 90% reduction in administrative overhead costs
Easy Migration
 Continue to use your existing tokens
• Protect your investment
• Eliminate user disruption
• Replace on expiry
 Import existing tokens into SafeNet Authentication Service (uses
your existing infrastructure to authenticate)
• Get a single view of all users and authentication activity
• Use comprehensive reporting across all tokens
 Automate the deployment of replacement tokens prior to expiry
of your existing tokens
• Zero effort and zero-touch migration for all users without
administrator intervention
• Secure and easy self-enrollment
19
Strong Authentication Made Easy
20
Automation
Reporting
Security
Customization and Branding
Multiple Business Unit Entities, Groups & Containers
Operator Role and Scope
Corporate Integration APIs
Reduce
management time
21
User Synchronization
Automate
everything
Lower the costs of
strong authentication
SAML Service Registration
Alerts
Reporting
Security Policy Application
Token Provisioning
Self Enrollment
Automated Features
User Directory Sources
 Supporting any user store
• SQL, LDAP, AD ,ODBC, Lotus, Novell, anything (via
custom field mapping)
• Zero schema change
• Read only
• Non intrusive
• Full customisation
• Multiple domains
• No hardware required
• Secure
• In Addition users can be bulk imported eg via
.csv files and / or created locally
22
User Synchronization
LDAP Changes
 Automatic updates of LDAP changes
23
Users
User Changes
Directory
Server
LDAP
Agent
GroupsAccess Device
or Application
LDAP
Rules
Self Enrollment
Authentication
User Synchronization
Token Policies and Your Security
 Ability to set token Policies
• Pre-configured to best practice for optimal security
• Reconfigurable to match your policy
• Multiple options can be re-defined
• PIN length and complexity
• OTP length and complexity
• Try attempts
• Forced PIN change
• Portal shows details of EVERY individual token
 Initialization of tokens
• Software/SMS tokens initialised at point of deployment
• Hardware tokens can also be initialised
Security Policy Application
Provisioning Rules
 Rules Engines for auto-provisioning
& authorization
• Powerful and flexible auto-provisioning
• Token allocation, suspension and de-allocation and more
• Auto registration for SAML services
 Central administration of rules that are automatically applied to users
based on their group membership
• All token management can be done via group membership in LDAP
• Changes in LDAP initiate the provisioning process without any
admin intervention
 Access/authorization is controlled by the real-time application of another
rules engine and authentication is allowed or denied based on criteria
such as
• Access point
• LDAP attributes (group membership or time of day)
25
Token Provisioning
Simple Enrollment Process
26
OR
• Automated self-enrollment for all tokens
• Customizable messages
• Fully automated with auto-provisioning
• Alerts highlight incomplete enrolments
Self Enrollment
User Self-Enrollment
User Self-Enrollment
User Self-Enrollment
Pro-Active Management
 Pro-active alerts
• System, deployment and user events
• Capacity or SMS credits are running low
• Users who have not enrolled
• Provisioning
• Internal or external delivery
• SMS or email based
27
Alerts
Reports Delivery
 Reports can be scheduled
• Time-of-Day / Day-of-Week
• Cyclic repeat for regular reports
 Email based delivery or via portal access
• Email to both internal or external recipients
 Fully automated delivery
• Output in html, csv, tab, xml
• Delivery via FTP, SFTP, SCP
28
Reporting
Summary
29
Who We Are
Trusted to protect the world’s most sensitive data for
the world’s most trusted brands.
GLOBAL FOOTPRINT
+25,000
Customers in
100 countries
EMPLOYEES
+1,500
In 25 countries
UK Government
SafeNet: A Leader in the Gartner Magic
Quadrant for User Authentication 2014
31
Authentication
TECHNOLOGYMANUFACTURING & SERVICES
GOVERNMENTFINANCIAL SERVICES
UK Government
RETAIL, TRAVEL & TRANSPORT
Thank you for listening today
Questions?

More Related Content

PPSX
VMware: my jsme “software defined”
PPTX
Decrypting the security mystery with SIEM (Part 1) ​
PDF
VMworld 2013: The Software Defined Datacenter Meets End User Computing
PDF
#MFSummit2016 Operate: The race for space
PPTX
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
PDF
Your Biggest Systems Management Challenges – and How to Overcome Them
PPTX
Security that works with, not against, your SaaS business
PDF
Predicting the Future of Endpoint Management in a Mobile World
VMware: my jsme “software defined”
Decrypting the security mystery with SIEM (Part 1) ​
VMworld 2013: The Software Defined Datacenter Meets End User Computing
#MFSummit2016 Operate: The race for space
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Your Biggest Systems Management Challenges – and How to Overcome Them
Security that works with, not against, your SaaS business
Predicting the Future of Endpoint Management in a Mobile World

What's hot (20)

PDF
Ensuring Rock-Solid Unified Endpoint Management
PPTX
Non-functional Issues in Cloud Based Systems by Kees Blokland and Martin Pol
PPT
Addmi 01-why addm
PPTX
gkkCloudtechnologyassociate(cta)day 2
PPTX
Citrix xenapp training
PDF
11 19 stephan pfister_citrix day - xen_app 6.5 whats new
PPTX
AutomateandsimAutomate and Simplify Your IT Management Operations
PPTX
SSL Certificate Extension for BMC Discovery
PPTX
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
PPTX
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
PDF
Open day competenze digitali boverino v-mware intro
PPTX
Extending ADDM Discovery to Firewalls, Applications and Routers
PDF
Best Practices for Monitoring Your Cloud Environment and Applications
PPTX
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
PDF
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
PDF
Getting ready for Infrastructure Transformation with hyper-converged
PPTX
7 tips to simplify Active Directory Management ​
PPTX
Hybrid cloud monitoring - Mumbai seminar
PPTX
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Ensuring Rock-Solid Unified Endpoint Management
Non-functional Issues in Cloud Based Systems by Kees Blokland and Martin Pol
Addmi 01-why addm
gkkCloudtechnologyassociate(cta)day 2
Citrix xenapp training
11 19 stephan pfister_citrix day - xen_app 6.5 whats new
AutomateandsimAutomate and Simplify Your IT Management Operations
SSL Certificate Extension for BMC Discovery
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
Open day competenze digitali boverino v-mware intro
Extending ADDM Discovery to Firewalls, Applications and Routers
Best Practices for Monitoring Your Cloud Environment and Applications
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Getting ready for Infrastructure Transformation with hyper-converged
7 tips to simplify Active Directory Management ​
Hybrid cloud monitoring - Mumbai seminar
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Ad

Similar to Bright talk mapping the right aut solution for you 2014 final (1) (20)

PPTX
Safenet Authentication Service, SAS
PDF
0011sas security whitepaper
PPTX
AY - Adaptive Access Control
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
PDF
A Study in Borderless Over Perimeter
PPT
Path Maker Security Presentation
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PPTX
The Future of Enterprise Identity Management
PPTX
The day when 3rd party security providers disappear into cloud bright talk se...
PDF
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
PDF
Cloud expo 2016 kevin presentation
PPTX
Presentation- SecurID presentation for the Channel (1).pptx
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PPT
Achieving Data Privacy in the Enterprise
PPSX
Value Microsoft 365 E5 English
PPTX
SafeNet overview 2014
PDF
Intelligent Authentication
PPTX
Single Sign On 101
PDF
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Safenet Authentication Service, SAS
0011sas security whitepaper
AY - Adaptive Access Control
Product Vision - Stephen Newman – SecureAuth+Core Security
A Study in Borderless Over Perimeter
Path Maker Security Presentation
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
The Future of Enterprise Identity Management
The day when 3rd party security providers disappear into cloud bright talk se...
CIS 2015-API's & Identity: Enabling the Business to Become the Cloud- Carlos ...
Cloud expo 2016 kevin presentation
Presentation- SecurID presentation for the Channel (1).pptx
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
Achieving Data Privacy in the Enterprise
Value Microsoft 365 E5 English
SafeNet overview 2014
Intelligent Authentication
Single Sign On 101
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Ad

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation

Bright talk mapping the right aut solution for you 2014 final (1)

  • 1. Insert Your Name Insert Your Title Insert Date Mapping the Ideal Authentication Solution to your IT Environment May, 2014 Jason Hart CISSP CISM VP Cloud Solutions
  • 2. Todays issues • Data breaches are rampant • Data is moving everywhere • The approach to protecting data must change 2
  • 6. Market Dynamics Convergence of Cloud IAM and Auth Evolving Endpoint Shift from Product to Service Evolving Endpoint  Shift from browser to application centric models  Multiple identities  Multiple devices  Inconsistent credential management across mobile and PC 6
  • 7. Market Dynamics Convergence of Cloud IAM and Auth Evolving Endpoint Shift from Product to Service Shift from Product to Service  Not only about the security functionality. It is about how it is provisioned, managed, and brought to market  On-demand, agile, automated, self-service  Creating new business models and routes to market 7
  • 8. Market Dynamics Convergence of Cloud IAM and Auth Evolving Endpoint Shift from Product to Service Convergence of Cloud IAM and Authentication  Complexity has caused need for simplification.  Markets are merging- it is inevitable 8
  • 9. Strong Authentication On the Rise 9 In two years, 25% anticipate that 90-100% of the workforce will be using multi-factor authentication. Source: Multi-Factor Authentication: Current Usage and Trends, SafeNet Survey, April 2014
  • 10. Driven by Security Concerns 10 Verizon 2013 Data Breach Investigations Report
  • 11. But ………. 11 Ease of Use Need to Protect Multiple Applications Source: Multi-Factor Authentication: Current Usage and Trends, SafeNet Survey, April 2014
  • 12. SafeNet Authentication Service  Fully automated strong Authentication-as-a-Service from the cloud: • Automated provisioning, reporting, self service • Automated security policy engine and templates • Total flexibility to customize everything: tokens, processes, policies  Simple service delivery and reduced overheads: • Up and running in minutes • No infrastructure or maintenance costs • No up front investment  Protects all resources: SaaS, apps, networks  Protects everyone with multiple token options: Software, SMS, Hardware and Grid tokens 12
  • 13. Main “as-a-Service” Benefits  Fully Automated. Strong authentication made easy through a fully automated management system.  Use Cases. Broad use case coverage areas for vast authentication needs  Low Total Cost of Operation. Substantially reduces costs compared to traditional strong authentication environments.  Peace of Mind. Availability, protection, overall peace of mind in a trusted cloud environment.  Quick Cloud Migration. Reduced deployment time and increased flexibility. 13 Cost Reduction. Simplicity. Flexibility.
  • 14. 14 Online Storage Application Hosting Disaster Recovery SAML Tokens & Users Administrator Agent RADIUS API Private Networks Corporate Network Corporate Network Corporate Network Corporate Network LDAP / Active Directory LDAP / Active Directory LDAP / Active Directory LDAP / Active Directory Cloud Services Cloud Applications SAML SAML Protect Everything and Everyone, Anywhere
  • 15. OTP Authenticators OOB (SMS) Authenticators Software Authenticators GrIDsure Authentication 15  SafeNet Authentication Service authenticators: • Don’t expire • Seed keys can be owned by the subscriber • Can be easily re-assigned to new users • Easy deployment saves cost and time • A token can be included in the service charge Protect Everyone
  • 16. 16 Extend Identities to the Cloud User authenticates using enterprise identity Cloud ApplicationsSaaS Apps Salesforce.com Goggle Apps
  • 17. Support Multiple Identities & Tokens 17 Multiple tokens per user and or Multiple user names per Token
  • 18. 18 Cost Reduction. Simplicity. Flexibility Cost Related Advantages  Up to 60% savings in Total Cost of Operation  99.999% service availability  Effective budget utilization & flexibility with OPEX pricing  Up to 90% reduction in administrative overhead costs
  • 19. Easy Migration  Continue to use your existing tokens • Protect your investment • Eliminate user disruption • Replace on expiry  Import existing tokens into SafeNet Authentication Service (uses your existing infrastructure to authenticate) • Get a single view of all users and authentication activity • Use comprehensive reporting across all tokens  Automate the deployment of replacement tokens prior to expiry of your existing tokens • Zero effort and zero-touch migration for all users without administrator intervention • Secure and easy self-enrollment 19
  • 20. Strong Authentication Made Easy 20 Automation Reporting Security Customization and Branding Multiple Business Unit Entities, Groups & Containers Operator Role and Scope Corporate Integration APIs
  • 21. Reduce management time 21 User Synchronization Automate everything Lower the costs of strong authentication SAML Service Registration Alerts Reporting Security Policy Application Token Provisioning Self Enrollment Automated Features
  • 22. User Directory Sources  Supporting any user store • SQL, LDAP, AD ,ODBC, Lotus, Novell, anything (via custom field mapping) • Zero schema change • Read only • Non intrusive • Full customisation • Multiple domains • No hardware required • Secure • In Addition users can be bulk imported eg via .csv files and / or created locally 22 User Synchronization
  • 23. LDAP Changes  Automatic updates of LDAP changes 23 Users User Changes Directory Server LDAP Agent GroupsAccess Device or Application LDAP Rules Self Enrollment Authentication User Synchronization
  • 24. Token Policies and Your Security  Ability to set token Policies • Pre-configured to best practice for optimal security • Reconfigurable to match your policy • Multiple options can be re-defined • PIN length and complexity • OTP length and complexity • Try attempts • Forced PIN change • Portal shows details of EVERY individual token  Initialization of tokens • Software/SMS tokens initialised at point of deployment • Hardware tokens can also be initialised Security Policy Application
  • 25. Provisioning Rules  Rules Engines for auto-provisioning & authorization • Powerful and flexible auto-provisioning • Token allocation, suspension and de-allocation and more • Auto registration for SAML services  Central administration of rules that are automatically applied to users based on their group membership • All token management can be done via group membership in LDAP • Changes in LDAP initiate the provisioning process without any admin intervention  Access/authorization is controlled by the real-time application of another rules engine and authentication is allowed or denied based on criteria such as • Access point • LDAP attributes (group membership or time of day) 25 Token Provisioning
  • 26. Simple Enrollment Process 26 OR • Automated self-enrollment for all tokens • Customizable messages • Fully automated with auto-provisioning • Alerts highlight incomplete enrolments Self Enrollment User Self-Enrollment User Self-Enrollment User Self-Enrollment
  • 27. Pro-Active Management  Pro-active alerts • System, deployment and user events • Capacity or SMS credits are running low • Users who have not enrolled • Provisioning • Internal or external delivery • SMS or email based 27 Alerts
  • 28. Reports Delivery  Reports can be scheduled • Time-of-Day / Day-of-Week • Cyclic repeat for regular reports  Email based delivery or via portal access • Email to both internal or external recipients  Fully automated delivery • Output in html, csv, tab, xml • Delivery via FTP, SFTP, SCP 28 Reporting
  • 30. Who We Are Trusted to protect the world’s most sensitive data for the world’s most trusted brands. GLOBAL FOOTPRINT +25,000 Customers in 100 countries EMPLOYEES +1,500 In 25 countries UK Government
  • 31. SafeNet: A Leader in the Gartner Magic Quadrant for User Authentication 2014 31
  • 32. Authentication TECHNOLOGYMANUFACTURING & SERVICES GOVERNMENTFINANCIAL SERVICES UK Government RETAIL, TRAVEL & TRANSPORT
  • 33. Thank you for listening today Questions?