secureauth cyber security in enterprise
TRANSCRIPT
SecureAuthTM IdPADAPTIVE ACCESS CONTROLDetermine Identities with Confidence
2Copyright SecureAuth Corporation 2015
Agenda+ The “Identity” problem
+ How SecureAuth IdP can help solve
+ How SecureAuth IdP is different
+ SecureAuth customers
3Copyright SecureAuth Corporation 2015
EMPLOYEES
BUSINESSPARTNERS
CUSTOMERS
CLOUD
ON-PREMCommercial &Homegrown
+ Billions spent annually on Endpoint and Network security
+ 66% of Executives still not confident they’re protected1
+ Breaches continue – Anthem, US National Guard, T-Mobile, Scottrade, CVS, Walgreens, IRS, FBI
+ If you have valid credentials…you get in! Users are the vulnerability & most popular access point
+ SecureAuth protects & detects at the user identity levelENDPOINT
SECURITYNETWORKSECURITY
Typical Security InfrastructureRoutinely Circumvented
1 - A 2015 Survey – Cybersecurity in the Boardroom (Link)
4Copyright SecureAuth Corporation 2015
“2015 Data Breach Investigations Report” by Verizon
http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation-report-2015_en_xg.pdf
5Copyright SecureAuth Corporation 2015
EMPLOYEES
BUSINESSPARTNERS
CUSTOMERS
CLOUD
ON-PREMCommercial &Homegrown
NETWORKSECURITY
How can we improve security while improving usability and reducing costs?
Need for Stronger Identity SecurityIdentity is the New Security Perimeter
IDENTITYSECURITY
ENDPOINTSECURITY
6Copyright SecureAuth Corporation 2015
How Can SecureAuth Help?
Improve Security Improve Usability Reduce Costs
• Adjust security based on dynamic risk analysis
• Tailor login process to different types of groups (i.e. administrators vs sales)
• Use behavioral biometrics to continually monitor & get smarter about auth.
• Only require MFA when risk factors are present
• Secure single sign-on convenience
• Self service - users manage their own accounts
• Multiple authentication methods to match use case
(can require more than 2 factors to proceed)
• Rapid deployment using standard connectors
• Augment & complement existing security investments• Uses existing directories• No tokens/devices to buy
• Saving via self-service (reduce 30-60% of your calls)
7Copyright SecureAuth Corporation 2015
SecureAuth IdP How Are We Different?
Pre-AuthenticationRisk Analysis
Multi-Factor Authentication
(20+ Methods)
Adaptive Authentication
Workflows
Continuous Authentication
(Behavioral Biometrics)
Single Sign-On User Self-Service
Any Application
Any Device
Any Identity Store
Any Identity Type
Password Reset
Account Unlock
Self-Enrollment
Self-Provisioning
Authentication Security
Any VPN
8Copyright SecureAuth Corporation 2015
Any…Any…Any…Choice & Flexibility
Any ID TypeAny Device Any ID Store Any ApplicationAny VPN
User Logon IDSA web SSO token
3rd Party Web tokenSAML
NYLM/KerberosX509 Cert
CACPIV
SmartcardForm Post
FacebookLinkedIn
Windows Live
LDAPAD_LDS
ODBCWeb Services
Lightweight Virtual Directory
WS-TrustWS-Fed
MobileWeb Token
Form-based
Tablets &Smartphones
Desktops &Laptops
9Copyright SecureAuth Corporation 2015
Portal ExamplesMake it YOUR Portal
From colorful to simple branded , it’s your portal!
10Copyright SecureAuth Corporation 2015
Millions of Users Trust SecureAuthBANKING & SECURITIES
HEALTHCARE GOVERNMENT
HIGH TECH TRAVEL EDUCATION COMMUNICATIONS MEDIA & SERVICES
RETAIL
12Copyright SecureAuth Corporation 2015
What Are Customers Saying?“We’re able to eliminate smartcards and, over a year and half period, we were able to eliminate soft FOB and hard FOB usage… We’ve reduced the number of passwords, made it easier for our users to log into applications and our network, and improved security.” – Chris Joerg, Director, Global Information Security – Unisys
“SecureAuth gives me the ability to ensure that remote access into my network is being done by authenticated individuals in a secure way and with the least amount of resistance.” – Martin Littman, CTO & CISO – Kelsey-Seybold Clinic
“The flexibility of SecureAuth allowed us to go not only go with our main Citrix web apps based application but with all other types of different applications from VPN all the way to cloud-based SaaS apps. It was best of breed in every category.” – Matt Johnson, Manager, Server Engineering – Houston Methodist Hospital
Visit www.secureauth.com
The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.
14Copyright SecureAuth Corporation 2015
Device Recognition
IP Reputation
Directory Lookup
Geo-Location
Geo-Velocity
Behavioral Biometrics
Risk LayersDynamic Adaptive Authentication
+ Layered Risk Analysis = Stronger Security
+ No User Experience Impact
+ Only present MFA when needed
+ No other vendor has as many “layers”
15Copyright SecureAuth Corporation 2015
+ Unique to each individual on each device
+ 99%* Accuracy (improves over time)
+ Only acts when threat detected – MFA to proceed
+ First vendor to offer… Available March 2016
TYPE
TOUCH
MOUSE
Behavioral BiometricsContinuous Authentication
16Copyright SecureAuth Corporation 2015
Self Help ToolsReduce Administration
+ Password Resets, Account Unlock, Self-Enroll & Provision
+ Time Savings
+ Labor Savings
+ User Autonomy
17Copyright SecureAuth Corporation 2015
Consume any identity from various
sources
Map identity to existing data stores for authentication
information
Utilize one or more of 20+ methods to
confirm user identity
Transparently assert identity to on-
premises, cloud, mobile and VPN resources (SSO)
Centralize and inspect access control activity
SecureAuth: The Secure Path to Strong Access Control
18Copyright SecureAuth Corporation 2015
Any Access Device
AnyIdentity
Store
Any Identity Type
Any On-Premises App(Commercial, Legacy,
Homegrown)
Pre-Authentication Risk Analysis
Adaptive Authentication Workflows
Multi-Factor Authentication
Continuous Authentication (Behavioral Biometrics)
Authentication Security
AnyVPN
AnySIEM
AnythingSDK
Any Cloud App(SaaS)
PasswordReset
AccountUnlock
Enrollment Provisioning
Self-Service
Single Sign-On
19Copyright SecureAuth Corporation 2015
• Founded in 2006• Privately held company• HQ in Irvine, California• 10 technology patents and
counting• Technology partners:
Cisco, Juniper, F5, Citrix, Microsoft, Amazon and Google
SecureAuth Corporation
Visit www.secureauth.com
The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.