White Paper
BESTPRACTICES FOR
MULTI-FACTOR AUTHENTICATION
HOWTO STRENGTHEN SECURITY, MINIMIZE
COSTS AND SIMPLIFYTHE USER EXPERIENCE
Introduction
Securemobileaccesstoenterprisesystemsandinformationcreatesacompetitiveadvantage.
Productivityriseswhenemployeescanworkfromanywhere,onanydevice.Employeesand
partnersaremoreresponsivewhentheycanaccessyoursystemsfromoutsidethebuilding
insteadofwaitinguntiltheycangettoyouroffices.Jobsatisfactiontendstoimprovewhen
employersintroducebring-your-own-device(BYOD)polices.
Today’sdisappearingnetworkboundariesmagnifytheimportanceofuserauthentication,
especiallyinregulatedindustriessuchasfinancialservices,healthcare,pharmaceuticals,andlife
sciences.Weakauthenticationpracticescanleadtolossofintellectualproperty,branddamage,
publicrelationsdebacles,revenuelossfromsystemoutages,andfinesforcomplianceviolations.
The Problem with P@55word5
Theusername/passwordcombinationalonefailstoprotectenterpriseassets.Ina2016study
ofmorethan64,000securityincidents,weakorstolenpasswordstoppedthelistofcauses.1
Frequentnewsheadlinesaboutdatabreachesunderscorethefactthatpasswordsareeasy
toguess,easytocrack,andeasytoextractfromemployeesviaphishingschemes.
Thesoberingtruthisthatyou’revulnerableevenifyouimplementthestrongestdatabase
protectionsandenforcerequirementsforcomplexpasswords.Why?Despiterecommendations
tothecontrary,manyemployeesusethesamepasswordformultiplesites.Therefore,abreach
toanotherorganization’spassworddatabasecanexposepasswordsthatyouremployees
usetoaccessyoursystems.Cybercriminalsexploitedthisfacttostealcustomercreditcard
informationfromamajorU.S.retaileraftersnaggingaccesscredentialsfromoneofthe
retailer’scontractors.2
Similarly,hackerswereabletotemporarilytakeovertwosocialmedia
accountsofFacebookfounderMarkZuckerbergafterbreachingathirdsocialmediasite’s
passworddatabase.3
Eighty-two percent of all
web attacks target user
credentials. Many succeed:
63% of confirmed data
breaches involve weak,
default, or stolen passwords.
Financial gain or espionage
motivated 89% of breaches.
VerizonDataBreachInvestigations
Report(DBIR),2016
1
Verizon,2016DataBreachInvestigationsReport
2
http://www.computerworld.com/article/2487425/cybercrime-hacking/target-breach-happened-
because-of-a-basic-network-segmentation-error.html
3
http://www.nytimes.com/2016/06/07/technology/if-mark-zuckerberg-can-be-a-hacking-victim-
so-can-you.html
1
synchronoss.com
Multi-factor Authentication Bolsters Security
Multi-factor authenticationisexponentiallymoresecurethanpasswordsalone.Before
accessingenterprisesystems,employeesandpartnersmustenteratleasttwocredentials:
somethingtheyknow(passwordoranswertoaquestion), somethingtheyhave(one-time
codefrom mobile app ortextmessage),orabiometric(typicallyafingerprint,voiceprint,or
retinascan).
Untilnow,strongersecuritycameattheexpenseofbudgetsandtheuserexperience.Multi-
factorauthenticationmeantpayingupforhardwaretokensorsmartcards.Todayyoucanadopt
multi-factorauthenticationaffordablyandwithoutcompromisingtheuserexperience.Follow
thefiverecommendationsbelow.
1. FOCUS ON THE USER EXPERIENCE
Giveusersachoiceofhowtoreceivetheirone-timepasscode—forexample,mobileapp,
email,SMStextmessage,orautomatedcalltoaphonenumberonrecord.Aconvenientuser
experienceencouragesadoption,whichacceleratesproductivitygainsfrommobilityandBYOD.
Tousebiometricsasasecondorthirdfactor,considermobileapps.Biometricsappsarealready
availableforscanningfingerprints,voices,faces,earprints,gestures,andretinas.Hands-free
authenticationbasedonproximityrequiresevenlesseffortfromusers.Theworkstationverifies
theuser’scredentialbyconnectingautomaticallytotheuser’smobiledevice.Topreventa
criminalcarryingastolendevicefromgainingaccess,besuretosupplementproximity-based
authenticationwithapassword.
2. TAKE ADVANTAGE OF CLOUD ECONOMICS
AND SCALABILITY
Thecloudmodelshiftscapitalexpenseforserversandsoftwaretoapredictableoperational
expense.Youpayasyougo.Savingsinclude:
• Noon-premisesinfrastructure(servers,storage,andnetworkresources).
• Nomaintenancefeesandhardwareandsoftwareupgrades.Youalwayshaveaccesstothe
latestfeatures.
• Noadditionalcapitalexpendituresasyouaddusers.
• Avoidanceofproductivitylosswhenon-premisessystemsgodown.Cloudservice
providerscantakeadvantageofeconomiesofscaletoimplementhigh-availability
architectures.
OutsourcingtoacloudproviderwithexpertiseinauthenticationalsofreesuptimeforyourIT
teamtofocusonthecorebusiness.
Gartner projects that
the number of identity
and access management
purchases involving
authentication as a service
will double from 20% in
2016 to 40% in 2020.
MagicQuadrantforIdentityand
AccessManagementasaService,
June6,2016
2
synchronoss.com
NISTLevel 1 NISTLevel 2 NISTLevel 3
Usernameandpassword
Secondfactor,suchasone-timecode
Usernameandpassword
Secondfactor
Fullsocialsecuritynumberanddateof
birth,checkedagainstpublicdatabases
Responsetoacalloremailtothe
phonenumberoremailaddress
onrecord
Usernameandpassword
Secondfactor
Fullsocialsecuritynumber,dateof
birth,andfinancialdata,checked
againstpublicdatabases
Responsetoacalloremailtothe
phonenumberoremailaddress
onrecord
OneormoreKnowledgeBased
Assessmentquestions,suchas
monthlymortgagepaymentor
makeandmodelofcarin2012
3. BEFORE ISSUING CREDENTIALS, VERIFY
THAT USERS ARE WHO THEY SAYTHEY ARE
Beforehiringemployeesyouverifytheiridentitybyreviewingofficialdocumentssuchasdriver’s
license,socialsecuritycard,orpassport.It’smorechallengingtoverifyoffsitepartners’and
contractors’identitybeforeissuingcredentials.HowcanyouverifythatJohnSmithisreally
theJohnSmithwhoworksforyouraccountingfirm—notsomeoneelsemasqueradingasJohn
Smith,orevenabot?Verifyingtheidentitiesofthirdpartiesisimportantinallenterprises,
andmandatedforcertaintypesofusers.Examplesincludehealthcareproviderswhouse
e-prescribingsoftwareandfinancialservicescustomerswhoconducthigh-valuetransactions.
TheU.S.NationalInstituteofScienceandTechnology(NIST)definesthreelevelsofidentity
proofing(levelsofassurance)thatdonotrequireanin-personvisit(Table1).Lookforacloud
providerthatoffersNISTLevel3identityproofingandisapprovedbyFederalIdentity,
Credential,andAccessManagement(FICAM).
Table 1 — Sample User Experience ForThree Levels of Identity Proofing
3
synchronoss.com
4. CHOOSE A CLOUD SERVICE THAT MEETS
YOUR INDUSTRY’S SECURITY GUIDELINES
Table2listscommonsecurityrequirementsforregulatedindustries.Tomeetthese
requirements,cloudprovidersinvestindatacenters,technology,andprocessesthatcomply
withgovernmentstandardssuchasNISTandFederalInformationProcessingStandards(FIPS)
intheU.S.,andEUGeneralDataProtectionRegulationintheEU.
Table 2 — Data Security Requirements by Industry
INDUSTRY SAMPLE REQUIREMENTS
Financial Services U.S.PaymentCardIndustry(PCI)
U.S.Gramm-Leach-BlileyAct(GLBA)
U.S.SecuritiesandExchangeCommission(SEC)
U.S.FinancialIndustryRegulatoryAuthority(FINRA)
U.S.FederalFinancialInstitutionsExaminationCouncil(FFIEC)
U.K.tScheme
EuropeanBankingAuthority(EBA)
EuropeanSecuritiesandMarketsAuthority(ESMA)
EuropeanInsuranceandOccupationalPensionsAuthority(EIOPA)
BaselCommitteeonBankingSupervision(BCBS)
Healthcare U.S.HealthInformationPortabilityandAccountabilityAct(HIPAA)
U.S.HealthInformationTechnologyforEconomicandClinicalHealth(HITECH)
FederalIdentity,CredentialandAccessManagement(FICAM)
Life sciences U.S.FoodandDrugAdministration(FDA)
EuropeanMedicinesAgency(EMA)
GoodAutomatedManufacturingPractice5(GAMP5)
All enterprises Corporatesecuritypolicies
Sarbanes-OxleyAct(SOX)
4
synchronoss.com
5. DON’T FORGET PEOPLE AND PROCESS
Eventhemostsophisticatedauthenticationtechnologycannotpreventbreachesresultingfrom
usersleavingtheirpasswordsinplainvieworreusingtheirworkpasswordforotherservices.
Requireemployeestoattendmandatorycybersecurityawarenesstrainingthatcovers:
• Regulatorycompliance.
• Creatingstrongpasswordsandkeepingthemsecure.
• Recognizingphishingattacks.Somecompanieskeepemployees’skillssharpby
periodicallysendingoutafakephishingemail.Employeeswhoclickthelinkaretaken
toawebpageexplainingthatthelinkcouldhavebeenmalicious.
• Understandingthevalueofmulti-factorauthenticationandusingyour
organization’ssolution.
ImplementsecureITpracticesinconjunctionwithemployeetraining.Besuretosegmentthe
networktolimitriskifacybercriminaldoesgainaccessusingstolencredentials.Inaddition,
monitorthenetworkfordatatransfersoutsidetheorganizationtoidentifyandmitigate
vulnerabilities.
Synchronoss Universal Identity,
Authentication in the Cloud
SynchronossUniversalIdentity(ID)isacloud-basedservicethatreducestheriskoftargeted
attacks,credentialtheft,andidentifyfraudbyprovidingapowerfullayerofauthentication
security.Whetheryouextendaccesstoemployees,partners,vendors,orcustomers,
Synchronossreliablyverifiesuseridentitiesandensuresthatonlytherightpeoplegain
accesstoyournetwork.Theresult:yourcompanyandyouruserscanconductbusinesssafely,
confidently,andsecurely.
SIMPLE GROWTH, LOW PER-USER COSTS
Asacloudservice,SynchronossUniversalIDrequiresnoon-premiseshardwareorsoftware.
There’snoupfrontcapitaloutlay,andyoualwayshaveaccesstothelatestfeaturesandsecurity
enhancements.Helpdeskcostsarenominalbecauseuserscanresettheirownpasswords.The
pay-as-you-gomodelmakesiteasyandaffordabletoaddnewemployeesandotherusersas
yourbusinessexpands.
In the 2016Verizon study,
92% of all phishing attacks
aimed for passwords.
The most effective phishing
websites succeed 45% of
the time in enticing visitors
to enter information.4
VerizonDBIR,2016
4
http://services.google.com/fh/files/blogs/google_hijacking_study_2014.pdf
5
synchronoss.com
FAST ONBOARDING OF NEW USERS
NewuserscanbeginusingSynchronossUniversalIDwithinminutestosecurelysignin.
Theyvisit a self-serviceportaltosignup,downloadingasimpleapplication.Thecloudservice
verifies their credentialstotheneededNISTlevel.Ifyouhavealreadyverifiedtheidentity
ofsome or all of your users,youcanaddthemtothecloudservicewithoutrepeatingthe
identityproofingprocess.
WIDE CHOICE OF AUTHENTICATION OPTIONS
Synchronossoffersmoremulti-factorauthenticationoptionsthananyothervendor.Asyour
secondfactor,choosefromasoftwaretoken,aone-touchmobileapp,QRcodescanning,email,
SMSmessage,IVRcall,andotheroptions.
SIMPLIFIED COMPLIANCE
Industry-specific securityregulationsevolvecontinually.Synchronossexpertsmanagethe
complexities, eliminatingtheneedtopurchaseregulation-specificsoftwareandhiretalent
todeploy and maintainit.We’vedesignedourdatacenters,technology,andprocessesto
meetthe most stringentgovernmentstandardsandindustryregulations.TheU.S.Federal
Government and the U.K.GovernmentselectedSynchronossUniversalIDforstrong
authentication based onourscalableplatformandportfolioofsecuritystandards.
TheSynchronossUniversalIDserviceis:
• FICAMLevel3certified,thefirstcloudservicetoreceivethiscertification
• FederalInformationSecurityManagementAct(FISMA)approved
• FederalBridgeCertificationAuthority(FBCA)certified
• NIST800-63-2and800-53compliant
• FIPS199and140-2compliant
• HIPAAcompliant
• U.S.AccessBoardSection508compliant
• EUGeneralDataProtectionRegulationcompliant
©Synchronoss,Inc.AllRightsReserved 1-0616 6
synchronoss.com
About Synchronoss
REALIZE THE PROMISE OF ENTERPRISE MOBILITY
Uncompromised productivityandsecurity.OurSecureMobilityPlatformmeetstoday’sneeds
andcan help make tomorrow’spossibilitiesareality.Itisdesignedtoenhanceandcomplement
existing mobility investments,soyougetabetterROI—andcanfinallyrealizethetruepower
ofmobility.
Synchronoss Enterprisedeliversrealmobilityforenterpriseswiththemoststringentsecurity
requirements.The SecureMobilityPlatformenableshighlyregulatedbusinesstobuildtoward
modernmobilityinawaythatcomplementsexistinginvestments.
SynchronossEnterprise,inajointventurewithGoldmanSachsandVerizon, isextending
deeper into the enterprisetobridgethegapandsolvetheinherentcomplexityassociatedwith
mobilityandidentity.
Since2000, we’ve providedcloudsolutionsandsoftware-basedactivationtocommunication
service providers acrosstheglobe.CompaniessuchasAT&T,VerizonWireless,Comcast,Time
Warner Cable, Apple, andMicrosofthaveusedourscalabletechnologysolutionstoallowtheir
customers to connect, synchronize,andactivateconnecteddevicesandservicesthatpower
theconnectedworld.
Weknowmobility.Weknowsecurity.Wecanhelpyourorganizationdosecurebusiness,everywhere.
Learn More
To find out how you can reduce risk, strengthen security, and confidently extend network
access to employees, partners and customers, visit www.synchronoss.com/identity.
synchronoss.com
©Synchronoss,Inc.AllRightsReserved 1-0716 7

More Related Content

DOCX
Jon Cohn Exton PA - Healthcare - Enterprise Architecture
DOCX
Jon Cohn Exton PA - Next Gen Enterprise Information Technology
DOCX
Jon Cohn Exton PA - ERP Predictions
DOCX
Jon Cohn Exton PA - Rationalizing Application Portfolios
PDF
The 2009 Global Outsourcing
PDF
Is your data safe Infographic by Symantec
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
Jon Cohn Exton PA - Healthcare - Enterprise Architecture
Jon Cohn Exton PA - Next Gen Enterprise Information Technology
Jon Cohn Exton PA - ERP Predictions
Jon Cohn Exton PA - Rationalizing Application Portfolios
The 2009 Global Outsourcing
Is your data safe Infographic by Symantec
Taking Control of the Digital and Mobile User Authentication Challenge
 
Eliminate Password Fatigue with Smart Authentication Solutions.pdf

Similar to WP Best Practices For Multi-Factor Authentication (20)

PDF
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
PPTX
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
PDF
5 Reasons Why Your Business Should Consider Strong Authentication!
PDF
Why Passwords are not strong enough
 
PDF
3 steps security
PDF
Securing corporate assets_with_2_fa
PPT
Dr. Alan Shark
PDF
Strong Authentication: Securing Identities and Enabling Business
PDF
A Better Method of Authentication
ODP
PDF
2 Factor Authentication for Wordpress
PPT
You Can't Spell Enterprise Security without MFA
PDF
Multi Factor Authetification - ZendCon 2017
PDF
IRJET- Password Management Kit for Secure Authentication
PPTX
attack vectors by chimwemwe.pptx
PPTX
Best Practices for Password Rotation and Tools to Streamline the Process
PDF
What is two factor or multi-factor authentication
PDF
Security 101: Multi-Factor Authentication for IBM i
PDF
Passwords don't work multifactor controls do!
PDF
5 Ways to Stay #CyberSecure
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
5 Reasons Why Your Business Should Consider Strong Authentication!
Why Passwords are not strong enough
 
3 steps security
Securing corporate assets_with_2_fa
Dr. Alan Shark
Strong Authentication: Securing Identities and Enabling Business
A Better Method of Authentication
2 Factor Authentication for Wordpress
You Can't Spell Enterprise Security without MFA
Multi Factor Authetification - ZendCon 2017
IRJET- Password Management Kit for Secure Authentication
attack vectors by chimwemwe.pptx
Best Practices for Password Rotation and Tools to Streamline the Process
What is two factor or multi-factor authentication
Security 101: Multi-Factor Authentication for IBM i
Passwords don't work multifactor controls do!
5 Ways to Stay #CyberSecure
Ad

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Configure Apache Mutual Authentication
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
STKI Israel Market Study 2025 version august
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Modernising the Digital Integration Hub
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Enhancing emotion recognition model for a student engagement use case through...
Configure Apache Mutual Authentication
Final SEM Unit 1 for mit wpu at pune .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
Flame analysis and combustion estimation using large language and vision assi...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
STKI Israel Market Study 2025 version august
Abstractive summarization using multilingual text-to-text transfer transforme...
Hindi spoken digit analysis for native and non-native speakers
A proposed approach for plagiarism detection in Myanmar Unicode text
Convolutional neural network based encoder-decoder for efficient real-time ob...
A comparative study of natural language inference in Swahili using monolingua...
A review of recent deep learning applications in wood surface defect identifi...
Modernising the Digital Integration Hub
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Ad

WP Best Practices For Multi-Factor Authentication

  • 1. White Paper BESTPRACTICES FOR MULTI-FACTOR AUTHENTICATION HOWTO STRENGTHEN SECURITY, MINIMIZE COSTS AND SIMPLIFYTHE USER EXPERIENCE
  • 2. Introduction Securemobileaccesstoenterprisesystemsandinformationcreatesacompetitiveadvantage. Productivityriseswhenemployeescanworkfromanywhere,onanydevice.Employeesand partnersaremoreresponsivewhentheycanaccessyoursystemsfromoutsidethebuilding insteadofwaitinguntiltheycangettoyouroffices.Jobsatisfactiontendstoimprovewhen employersintroducebring-your-own-device(BYOD)polices. Today’sdisappearingnetworkboundariesmagnifytheimportanceofuserauthentication, especiallyinregulatedindustriessuchasfinancialservices,healthcare,pharmaceuticals,andlife sciences.Weakauthenticationpracticescanleadtolossofintellectualproperty,branddamage, publicrelationsdebacles,revenuelossfromsystemoutages,andfinesforcomplianceviolations. The Problem with P@55word5 Theusername/passwordcombinationalonefailstoprotectenterpriseassets.Ina2016study ofmorethan64,000securityincidents,weakorstolenpasswordstoppedthelistofcauses.1 Frequentnewsheadlinesaboutdatabreachesunderscorethefactthatpasswordsareeasy toguess,easytocrack,andeasytoextractfromemployeesviaphishingschemes. Thesoberingtruthisthatyou’revulnerableevenifyouimplementthestrongestdatabase protectionsandenforcerequirementsforcomplexpasswords.Why?Despiterecommendations tothecontrary,manyemployeesusethesamepasswordformultiplesites.Therefore,abreach toanotherorganization’spassworddatabasecanexposepasswordsthatyouremployees usetoaccessyoursystems.Cybercriminalsexploitedthisfacttostealcustomercreditcard informationfromamajorU.S.retaileraftersnaggingaccesscredentialsfromoneofthe retailer’scontractors.2 Similarly,hackerswereabletotemporarilytakeovertwosocialmedia accountsofFacebookfounderMarkZuckerbergafterbreachingathirdsocialmediasite’s passworddatabase.3 Eighty-two percent of all web attacks target user credentials. Many succeed: 63% of confirmed data breaches involve weak, default, or stolen passwords. Financial gain or espionage motivated 89% of breaches. VerizonDataBreachInvestigations Report(DBIR),2016 1 Verizon,2016DataBreachInvestigationsReport 2 http://www.computerworld.com/article/2487425/cybercrime-hacking/target-breach-happened- because-of-a-basic-network-segmentation-error.html 3 http://www.nytimes.com/2016/06/07/technology/if-mark-zuckerberg-can-be-a-hacking-victim- so-can-you.html 1 synchronoss.com
  • 3. Multi-factor Authentication Bolsters Security Multi-factor authenticationisexponentiallymoresecurethanpasswordsalone.Before accessingenterprisesystems,employeesandpartnersmustenteratleasttwocredentials: somethingtheyknow(passwordoranswertoaquestion), somethingtheyhave(one-time codefrom mobile app ortextmessage),orabiometric(typicallyafingerprint,voiceprint,or retinascan). Untilnow,strongersecuritycameattheexpenseofbudgetsandtheuserexperience.Multi- factorauthenticationmeantpayingupforhardwaretokensorsmartcards.Todayyoucanadopt multi-factorauthenticationaffordablyandwithoutcompromisingtheuserexperience.Follow thefiverecommendationsbelow. 1. FOCUS ON THE USER EXPERIENCE Giveusersachoiceofhowtoreceivetheirone-timepasscode—forexample,mobileapp, email,SMStextmessage,orautomatedcalltoaphonenumberonrecord.Aconvenientuser experienceencouragesadoption,whichacceleratesproductivitygainsfrommobilityandBYOD. Tousebiometricsasasecondorthirdfactor,considermobileapps.Biometricsappsarealready availableforscanningfingerprints,voices,faces,earprints,gestures,andretinas.Hands-free authenticationbasedonproximityrequiresevenlesseffortfromusers.Theworkstationverifies theuser’scredentialbyconnectingautomaticallytotheuser’smobiledevice.Topreventa criminalcarryingastolendevicefromgainingaccess,besuretosupplementproximity-based authenticationwithapassword. 2. TAKE ADVANTAGE OF CLOUD ECONOMICS AND SCALABILITY Thecloudmodelshiftscapitalexpenseforserversandsoftwaretoapredictableoperational expense.Youpayasyougo.Savingsinclude: • Noon-premisesinfrastructure(servers,storage,andnetworkresources). • Nomaintenancefeesandhardwareandsoftwareupgrades.Youalwayshaveaccesstothe latestfeatures. • Noadditionalcapitalexpendituresasyouaddusers. • Avoidanceofproductivitylosswhenon-premisessystemsgodown.Cloudservice providerscantakeadvantageofeconomiesofscaletoimplementhigh-availability architectures. OutsourcingtoacloudproviderwithexpertiseinauthenticationalsofreesuptimeforyourIT teamtofocusonthecorebusiness. Gartner projects that the number of identity and access management purchases involving authentication as a service will double from 20% in 2016 to 40% in 2020. MagicQuadrantforIdentityand AccessManagementasaService, June6,2016 2 synchronoss.com
  • 4. NISTLevel 1 NISTLevel 2 NISTLevel 3 Usernameandpassword Secondfactor,suchasone-timecode Usernameandpassword Secondfactor Fullsocialsecuritynumberanddateof birth,checkedagainstpublicdatabases Responsetoacalloremailtothe phonenumberoremailaddress onrecord Usernameandpassword Secondfactor Fullsocialsecuritynumber,dateof birth,andfinancialdata,checked againstpublicdatabases Responsetoacalloremailtothe phonenumberoremailaddress onrecord OneormoreKnowledgeBased Assessmentquestions,suchas monthlymortgagepaymentor makeandmodelofcarin2012 3. BEFORE ISSUING CREDENTIALS, VERIFY THAT USERS ARE WHO THEY SAYTHEY ARE Beforehiringemployeesyouverifytheiridentitybyreviewingofficialdocumentssuchasdriver’s license,socialsecuritycard,orpassport.It’smorechallengingtoverifyoffsitepartners’and contractors’identitybeforeissuingcredentials.HowcanyouverifythatJohnSmithisreally theJohnSmithwhoworksforyouraccountingfirm—notsomeoneelsemasqueradingasJohn Smith,orevenabot?Verifyingtheidentitiesofthirdpartiesisimportantinallenterprises, andmandatedforcertaintypesofusers.Examplesincludehealthcareproviderswhouse e-prescribingsoftwareandfinancialservicescustomerswhoconducthigh-valuetransactions. TheU.S.NationalInstituteofScienceandTechnology(NIST)definesthreelevelsofidentity proofing(levelsofassurance)thatdonotrequireanin-personvisit(Table1).Lookforacloud providerthatoffersNISTLevel3identityproofingandisapprovedbyFederalIdentity, Credential,andAccessManagement(FICAM). Table 1 — Sample User Experience ForThree Levels of Identity Proofing 3 synchronoss.com
  • 5. 4. CHOOSE A CLOUD SERVICE THAT MEETS YOUR INDUSTRY’S SECURITY GUIDELINES Table2listscommonsecurityrequirementsforregulatedindustries.Tomeetthese requirements,cloudprovidersinvestindatacenters,technology,andprocessesthatcomply withgovernmentstandardssuchasNISTandFederalInformationProcessingStandards(FIPS) intheU.S.,andEUGeneralDataProtectionRegulationintheEU. Table 2 — Data Security Requirements by Industry INDUSTRY SAMPLE REQUIREMENTS Financial Services U.S.PaymentCardIndustry(PCI) U.S.Gramm-Leach-BlileyAct(GLBA) U.S.SecuritiesandExchangeCommission(SEC) U.S.FinancialIndustryRegulatoryAuthority(FINRA) U.S.FederalFinancialInstitutionsExaminationCouncil(FFIEC) U.K.tScheme EuropeanBankingAuthority(EBA) EuropeanSecuritiesandMarketsAuthority(ESMA) EuropeanInsuranceandOccupationalPensionsAuthority(EIOPA) BaselCommitteeonBankingSupervision(BCBS) Healthcare U.S.HealthInformationPortabilityandAccountabilityAct(HIPAA) U.S.HealthInformationTechnologyforEconomicandClinicalHealth(HITECH) FederalIdentity,CredentialandAccessManagement(FICAM) Life sciences U.S.FoodandDrugAdministration(FDA) EuropeanMedicinesAgency(EMA) GoodAutomatedManufacturingPractice5(GAMP5) All enterprises Corporatesecuritypolicies Sarbanes-OxleyAct(SOX) 4 synchronoss.com
  • 6. 5. DON’T FORGET PEOPLE AND PROCESS Eventhemostsophisticatedauthenticationtechnologycannotpreventbreachesresultingfrom usersleavingtheirpasswordsinplainvieworreusingtheirworkpasswordforotherservices. Requireemployeestoattendmandatorycybersecurityawarenesstrainingthatcovers: • Regulatorycompliance. • Creatingstrongpasswordsandkeepingthemsecure. • Recognizingphishingattacks.Somecompanieskeepemployees’skillssharpby periodicallysendingoutafakephishingemail.Employeeswhoclickthelinkaretaken toawebpageexplainingthatthelinkcouldhavebeenmalicious. • Understandingthevalueofmulti-factorauthenticationandusingyour organization’ssolution. ImplementsecureITpracticesinconjunctionwithemployeetraining.Besuretosegmentthe networktolimitriskifacybercriminaldoesgainaccessusingstolencredentials.Inaddition, monitorthenetworkfordatatransfersoutsidetheorganizationtoidentifyandmitigate vulnerabilities. Synchronoss Universal Identity, Authentication in the Cloud SynchronossUniversalIdentity(ID)isacloud-basedservicethatreducestheriskoftargeted attacks,credentialtheft,andidentifyfraudbyprovidingapowerfullayerofauthentication security.Whetheryouextendaccesstoemployees,partners,vendors,orcustomers, Synchronossreliablyverifiesuseridentitiesandensuresthatonlytherightpeoplegain accesstoyournetwork.Theresult:yourcompanyandyouruserscanconductbusinesssafely, confidently,andsecurely. SIMPLE GROWTH, LOW PER-USER COSTS Asacloudservice,SynchronossUniversalIDrequiresnoon-premiseshardwareorsoftware. There’snoupfrontcapitaloutlay,andyoualwayshaveaccesstothelatestfeaturesandsecurity enhancements.Helpdeskcostsarenominalbecauseuserscanresettheirownpasswords.The pay-as-you-gomodelmakesiteasyandaffordabletoaddnewemployeesandotherusersas yourbusinessexpands. In the 2016Verizon study, 92% of all phishing attacks aimed for passwords. The most effective phishing websites succeed 45% of the time in enticing visitors to enter information.4 VerizonDBIR,2016 4 http://services.google.com/fh/files/blogs/google_hijacking_study_2014.pdf 5 synchronoss.com
  • 7. FAST ONBOARDING OF NEW USERS NewuserscanbeginusingSynchronossUniversalIDwithinminutestosecurelysignin. Theyvisit a self-serviceportaltosignup,downloadingasimpleapplication.Thecloudservice verifies their credentialstotheneededNISTlevel.Ifyouhavealreadyverifiedtheidentity ofsome or all of your users,youcanaddthemtothecloudservicewithoutrepeatingthe identityproofingprocess. WIDE CHOICE OF AUTHENTICATION OPTIONS Synchronossoffersmoremulti-factorauthenticationoptionsthananyothervendor.Asyour secondfactor,choosefromasoftwaretoken,aone-touchmobileapp,QRcodescanning,email, SMSmessage,IVRcall,andotheroptions. SIMPLIFIED COMPLIANCE Industry-specific securityregulationsevolvecontinually.Synchronossexpertsmanagethe complexities, eliminatingtheneedtopurchaseregulation-specificsoftwareandhiretalent todeploy and maintainit.We’vedesignedourdatacenters,technology,andprocessesto meetthe most stringentgovernmentstandardsandindustryregulations.TheU.S.Federal Government and the U.K.GovernmentselectedSynchronossUniversalIDforstrong authentication based onourscalableplatformandportfolioofsecuritystandards. TheSynchronossUniversalIDserviceis: • FICAMLevel3certified,thefirstcloudservicetoreceivethiscertification • FederalInformationSecurityManagementAct(FISMA)approved • FederalBridgeCertificationAuthority(FBCA)certified • NIST800-63-2and800-53compliant • FIPS199and140-2compliant • HIPAAcompliant • U.S.AccessBoardSection508compliant • EUGeneralDataProtectionRegulationcompliant ©Synchronoss,Inc.AllRightsReserved 1-0616 6 synchronoss.com
  • 8. About Synchronoss REALIZE THE PROMISE OF ENTERPRISE MOBILITY Uncompromised productivityandsecurity.OurSecureMobilityPlatformmeetstoday’sneeds andcan help make tomorrow’spossibilitiesareality.Itisdesignedtoenhanceandcomplement existing mobility investments,soyougetabetterROI—andcanfinallyrealizethetruepower ofmobility. Synchronoss Enterprisedeliversrealmobilityforenterpriseswiththemoststringentsecurity requirements.The SecureMobilityPlatformenableshighlyregulatedbusinesstobuildtoward modernmobilityinawaythatcomplementsexistinginvestments. SynchronossEnterprise,inajointventurewithGoldmanSachsandVerizon, isextending deeper into the enterprisetobridgethegapandsolvetheinherentcomplexityassociatedwith mobilityandidentity. Since2000, we’ve providedcloudsolutionsandsoftware-basedactivationtocommunication service providers acrosstheglobe.CompaniessuchasAT&T,VerizonWireless,Comcast,Time Warner Cable, Apple, andMicrosofthaveusedourscalabletechnologysolutionstoallowtheir customers to connect, synchronize,andactivateconnecteddevicesandservicesthatpower theconnectedworld. Weknowmobility.Weknowsecurity.Wecanhelpyourorganizationdosecurebusiness,everywhere. Learn More To find out how you can reduce risk, strengthen security, and confidently extend network access to employees, partners and customers, visit www.synchronoss.com/identity. synchronoss.com ©Synchronoss,Inc.AllRightsReserved 1-0716 7