SlideShare a Scribd company logo
Two-Factor Authentication Solution for VPN




Two-Factor Authentication Solution for VPN

   Problem with existing VPN authentication
   For a successful business, organizations must provide their employees with secure
   remote access. The preferred way for companies to allow secure remote access is via a
   Virtual Private Network (VPN) over existing Internet connections.

   Although, VPN technology ensure the privacy of data transmission over public domain by
   creating an encrypted “tunnel” through the public network, but do not strongly protect
   unauthorized access to the organization’s assets. This happens because simple username
   and password is used to protect the access to most VPNs. So, information that is secure
   while in transit may just be ending up in the wrong hands at its final destination.




Solution
ArrayShield innovative two factor authentication system - IDAS provides a simple and secure
remote access to Organization’s network infrastructure using VPN technology. By using its
innovative pattern based authentication it provides One-Time-Secret-Code for every login
transaction.


In IDAS every user is shown with a matrix on the VPN login screen which is populated with
random characters for every transaction. User has to choose a pattern which is a sequence of
cells in the matrix and should register the same with the system prior accessing the VPN. A
translucent card is provided to each user which has a similar structured matrix with transparent
and opaque cells and some random characters imprinted on the opaque cells. Each card is
unique in terms of the position of the opaque cells and the characters imprinted on them.

At the time of accessing the resource through VPN the user is shown with the randomly
populated matrix as a challenge. The user overlaps the translucent card on the shown matrix
and will key in the characters present in the chosen pattern in the same order as a response.
These characters form the One-Time-Secret-Code for the user for that transaction. The
ArrayShield server verifies the user credentials by comparing user’s registered pattern and the
pattern values entered by the user. Access is given to the user if the user credentials are valid.




                              ArrayShield | info@arrayshield.com                        Page 1
Two-Factor Authentication Solution for VPN




The ArrayShield IDAS VPN solution is designed to integrate with your existing infrastructure to
minimize downtime and to reduce huge deployment costs that other solutions have. IDAS
works with all the top VPN providers, including Juniper, Fortigate, Check Point, Sonicwall,
OpenVPN, Cyberoam and WatchGaurd. The convenient web management console gives
administrators an added tool that makes managing accounts easier.

Integration Flow
The following diagram shows how an VPN server can be integrated with ArrayShield IDAS two
factor authentication to secure access through VPN.




             Figure: Integration flow diagram for the VPN authentication with ArrayShield IDAS




                               ArrayShield | info@arrayshield.com                                Page 2
Two-Factor Authentication Solution for VPN




Features

Innovative Technology

ArrayShield IDAS is patent pending (globally) and has won several awards/recognitions in
various forums for its innovative concept.

High Level of Security

ArrayShield IDAS product leverages advanced Encryption methodologies (like Industry Standard
AES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographic
techniques) and follows Industry Standard Guidelines and Best Practices.

Ease of Use

ArrayShield is based on user-intuitive patterns which are easy to remember than complex
passwords than can be easily compromised.

Easy to Integrate

ArrayShield IDAS product will seamlessly integrate with existing enterprise environments with
improved user experience. No expertise is required for integration.

Interoperable System

ArrayShield IDAS can also be configured as add-on module with various products of leading
technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.

Easy to Deploy

ArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure API
based system.

Easily Customizable

ArrayShield IDAS can be easily customized to the unique needs of every organization. Once
deployed, organizations can also configure the security strength and mechanism to the amount
of risk involved in the user’s role and usability requirements.

Highly Scalable

ArrayShield IDAS can be easily scaled with huge user population without affecting the
performance and usability.



                             ArrayShield | info@arrayshield.com                      Page 3
Two-Factor Authentication Solution for VPN




Benefits

Low Total Cost of Ownership

ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.
Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having
costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’s
Product provides lowest Total Cost of Ownership. No costly server hardware needed.

Mobility of the user

As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any
dependencies. Hence user will be able to access the application any-time, any-where.

Provides peace of mind

Protects Organizations and customers from Online Identity and data theft, hence provide peace
of mind.

Provides Compliance with regulations

Regulatory agencies agree that passwords are a weak link and are requiring companies to
implement stronger authentication. ArrayShield IDAS is a rapid, cost-effective way to comply
with Industry Guidelines, Security Standards and other Industry regulations.



Conclusion
By using ArrayShield IDAS Two-Factor authentication solution, organizations can enable the
secure remote access to their networks through VPN technology. The solution will make
organizations of all sizes and complexities extend the reach of extranets to remote employees’
in-line with organization’s business strategy.




                              ArrayShield | info@arrayshield.com                        Page 4

More Related Content

PDF
Cisco Trustsec & Security Group Tagging
PPSX
ISE_Pub
PPTX
How SASE can help you move securely from the PSN with VMware and Breeze Networks
PDF
Cisco Study: State of Web Security
PDF
Demystifying TrustSec, Identity, NAC and ISE
PDF
Cloud summit demystifying cloud security
PDF
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
PPSX
The security of SAAS and private cloud
Cisco Trustsec & Security Group Tagging
ISE_Pub
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Cisco Study: State of Web Security
Demystifying TrustSec, Identity, NAC and ISE
Cloud summit demystifying cloud security
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
The security of SAAS and private cloud

What's hot (20)

PPTX
Intel SaaS Security Playbook
PPTX
Mobile App Security: Enterprise Checklist
PDF
Paul hobbs @ Verzon Digital Media Services
PPTX
From Cisco ACS to ISE
PDF
Secure Your Cloud Environment with Azure Active Directory (AD)
PDF
The Context Aware Network A Holistic Approach to BYOD
PPT
Up 2011-ken huang
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PDF
eMAS Multifactor Authentication
PDF
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
PDF
Enterprise Edge Security with Cisco ISE
PPTX
Monetizing the Enterprise: Borderless Networks
PDF
Workshop: Threat Intelligence - Part 1
PDF
Case_Study__Juniper_Expedient_2015
PPTX
Federated Identity Architectures Integrating With The Cloud
PPT
Securing Servers in Public and Hybrid Clouds
PPTX
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
PDF
10695 sidtfa sb_0210
PDF
Implementing zero trust architecture in azure hybrid cloud
Intel SaaS Security Playbook
Mobile App Security: Enterprise Checklist
Paul hobbs @ Verzon Digital Media Services
From Cisco ACS to ISE
Secure Your Cloud Environment with Azure Active Directory (AD)
The Context Aware Network A Holistic Approach to BYOD
Up 2011-ken huang
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
eMAS Multifactor Authentication
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Enterprise Edge Security with Cisco ISE
Monetizing the Enterprise: Borderless Networks
Workshop: Threat Intelligence - Part 1
Case_Study__Juniper_Expedient_2015
Federated Identity Architectures Integrating With The Cloud
Securing Servers in Public and Hybrid Clouds
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
10695 sidtfa sb_0210
Implementing zero trust architecture in azure hybrid cloud
Ad

Viewers also liked (7)

PDF
PCQuest reviews ArrayShield Product
PDF
Two Factor Authentication for Salesforce
PDF
What is Two Factor Authentication
PDF
Problems with biometric authentication
PDF
Two Factor Authentication for Google Apps
PDF
Compilation of phishing and keylogger attacks
PPTX
Métodos de tratamiento para aguas contaminadas.
PCQuest reviews ArrayShield Product
Two Factor Authentication for Salesforce
What is Two Factor Authentication
Problems with biometric authentication
Two Factor Authentication for Google Apps
Compilation of phishing and keylogger attacks
Métodos de tratamiento para aguas contaminadas.
Ad

Similar to Two Factor Authentication for VPN (20)

PPT
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
PPT
ISS SA le presenta los escenarios para IdentityGuard de Entrust
PDF
Sms passcode
PPTX
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
PPTX
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
PDF
Nt2580 Final Project Essay Examples
PPTX
Endpoint Security Solutions
PDF
Product brochure-print-spread
PPTX
Watchguard short introduction
PPT
Information Security Management. Security solutions copy
PDF
Enterprise Mobile Security for PeopleSoft
PDF
Arx brochure - Intellect Design
PDF
Cyber security-briefing-presentation
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PPTX
Endpoint Protection
PDF
Authorization and attributes glossary
PDF
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
PDF
It's 2012 and My Network Got Hacked - Omar Santos
PDF
Ds nsa series_4500
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
Sms passcode
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
Nt2580 Final Project Essay Examples
Endpoint Security Solutions
Product brochure-print-spread
Watchguard short introduction
Information Security Management. Security solutions copy
Enterprise Mobile Security for PeopleSoft
Arx brochure - Intellect Design
Cyber security-briefing-presentation
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Multi Factor Authentication Whitepaper Arx - Intellect Design
Endpoint Protection
Authorization and attributes glossary
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
It's 2012 and My Network Got Hacked - Omar Santos
Ds nsa series_4500

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
A Presentation on Artificial Intelligence
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
SOPHOS-XG Firewall Administrator PPT.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Programs and apps: productivity, graphics, security and other tools
A Presentation on Artificial Intelligence
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...

Two Factor Authentication for VPN

  • 1. Two-Factor Authentication Solution for VPN Two-Factor Authentication Solution for VPN Problem with existing VPN authentication For a successful business, organizations must provide their employees with secure remote access. The preferred way for companies to allow secure remote access is via a Virtual Private Network (VPN) over existing Internet connections. Although, VPN technology ensure the privacy of data transmission over public domain by creating an encrypted “tunnel” through the public network, but do not strongly protect unauthorized access to the organization’s assets. This happens because simple username and password is used to protect the access to most VPNs. So, information that is secure while in transit may just be ending up in the wrong hands at its final destination. Solution ArrayShield innovative two factor authentication system - IDAS provides a simple and secure remote access to Organization’s network infrastructure using VPN technology. By using its innovative pattern based authentication it provides One-Time-Secret-Code for every login transaction. In IDAS every user is shown with a matrix on the VPN login screen which is populated with random characters for every transaction. User has to choose a pattern which is a sequence of cells in the matrix and should register the same with the system prior accessing the VPN. A translucent card is provided to each user which has a similar structured matrix with transparent and opaque cells and some random characters imprinted on the opaque cells. Each card is unique in terms of the position of the opaque cells and the characters imprinted on them. At the time of accessing the resource through VPN the user is shown with the randomly populated matrix as a challenge. The user overlaps the translucent card on the shown matrix and will key in the characters present in the chosen pattern in the same order as a response. These characters form the One-Time-Secret-Code for the user for that transaction. The ArrayShield server verifies the user credentials by comparing user’s registered pattern and the pattern values entered by the user. Access is given to the user if the user credentials are valid. ArrayShield | info@arrayshield.com Page 1
  • 2. Two-Factor Authentication Solution for VPN The ArrayShield IDAS VPN solution is designed to integrate with your existing infrastructure to minimize downtime and to reduce huge deployment costs that other solutions have. IDAS works with all the top VPN providers, including Juniper, Fortigate, Check Point, Sonicwall, OpenVPN, Cyberoam and WatchGaurd. The convenient web management console gives administrators an added tool that makes managing accounts easier. Integration Flow The following diagram shows how an VPN server can be integrated with ArrayShield IDAS two factor authentication to secure access through VPN. Figure: Integration flow diagram for the VPN authentication with ArrayShield IDAS ArrayShield | info@arrayshield.com Page 2
  • 3. Two-Factor Authentication Solution for VPN Features Innovative Technology ArrayShield IDAS is patent pending (globally) and has won several awards/recognitions in various forums for its innovative concept. High Level of Security ArrayShield IDAS product leverages advanced Encryption methodologies (like Industry Standard AES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographic techniques) and follows Industry Standard Guidelines and Best Practices. Ease of Use ArrayShield is based on user-intuitive patterns which are easy to remember than complex passwords than can be easily compromised. Easy to Integrate ArrayShield IDAS product will seamlessly integrate with existing enterprise environments with improved user experience. No expertise is required for integration. Interoperable System ArrayShield IDAS can also be configured as add-on module with various products of leading technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc. Easy to Deploy ArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure API based system. Easily Customizable ArrayShield IDAS can be easily customized to the unique needs of every organization. Once deployed, organizations can also configure the security strength and mechanism to the amount of risk involved in the user’s role and usability requirements. Highly Scalable ArrayShield IDAS can be easily scaled with huge user population without affecting the performance and usability. ArrayShield | info@arrayshield.com Page 3
  • 4. Two-Factor Authentication Solution for VPN Benefits Low Total Cost of Ownership ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives. Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’s Product provides lowest Total Cost of Ownership. No costly server hardware needed. Mobility of the user As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any dependencies. Hence user will be able to access the application any-time, any-where. Provides peace of mind Protects Organizations and customers from Online Identity and data theft, hence provide peace of mind. Provides Compliance with regulations Regulatory agencies agree that passwords are a weak link and are requiring companies to implement stronger authentication. ArrayShield IDAS is a rapid, cost-effective way to comply with Industry Guidelines, Security Standards and other Industry regulations. Conclusion By using ArrayShield IDAS Two-Factor authentication solution, organizations can enable the secure remote access to their networks through VPN technology. The solution will make organizations of all sizes and complexities extend the reach of extranets to remote employees’ in-line with organization’s business strategy. ArrayShield | info@arrayshield.com Page 4