secureauth cyber security in enterprise

20
SecureAuth TM IdP ADAPTIVE ACCESS CONTROL Determine Identities with Confidence

Upload: paul-sweeney

Post on 14-Apr-2017

368 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: SecureAuth Cyber Security in Enterprise

SecureAuthTM IdPADAPTIVE ACCESS CONTROLDetermine Identities with Confidence

Page 2: SecureAuth Cyber Security in Enterprise

2Copyright SecureAuth Corporation 2015

Agenda+ The “Identity” problem

+ How SecureAuth IdP can help solve

+ How SecureAuth IdP is different

+ SecureAuth customers

Page 3: SecureAuth Cyber Security in Enterprise

3Copyright SecureAuth Corporation 2015

EMPLOYEES

BUSINESSPARTNERS

CUSTOMERS

CLOUD

ON-PREMCommercial &Homegrown

+ Billions spent annually on Endpoint and Network security

+ 66% of Executives still not confident they’re protected1

+ Breaches continue – Anthem, US National Guard, T-Mobile, Scottrade, CVS, Walgreens, IRS, FBI

+ If you have valid credentials…you get in! Users are the vulnerability & most popular access point

+ SecureAuth protects & detects at the user identity levelENDPOINT

SECURITYNETWORKSECURITY

Typical Security InfrastructureRoutinely Circumvented

1 - A 2015 Survey – Cybersecurity in the Boardroom (Link)

Page 4: SecureAuth Cyber Security in Enterprise

4Copyright SecureAuth Corporation 2015

“2015 Data Breach Investigations Report” by Verizon

http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation-report-2015_en_xg.pdf

Page 5: SecureAuth Cyber Security in Enterprise

5Copyright SecureAuth Corporation 2015

EMPLOYEES

BUSINESSPARTNERS

CUSTOMERS

CLOUD

ON-PREMCommercial &Homegrown

NETWORKSECURITY

How can we improve security while improving usability and reducing costs?

Need for Stronger Identity SecurityIdentity is the New Security Perimeter

IDENTITYSECURITY

ENDPOINTSECURITY

Page 6: SecureAuth Cyber Security in Enterprise

6Copyright SecureAuth Corporation 2015

How Can SecureAuth Help?

Improve Security Improve Usability Reduce Costs

• Adjust security based on dynamic risk analysis

• Tailor login process to different types of groups (i.e. administrators vs sales)

• Use behavioral biometrics to continually monitor & get smarter about auth.

• Only require MFA when risk factors are present

• Secure single sign-on convenience

• Self service - users manage their own accounts

• Multiple authentication methods to match use case

(can require more than 2 factors to proceed)

• Rapid deployment using standard connectors

• Augment & complement existing security investments• Uses existing directories• No tokens/devices to buy

• Saving via self-service (reduce 30-60% of your calls)

Page 7: SecureAuth Cyber Security in Enterprise

7Copyright SecureAuth Corporation 2015

SecureAuth IdP How Are We Different?

Pre-AuthenticationRisk Analysis

Multi-Factor Authentication

(20+ Methods)

Adaptive Authentication

Workflows

Continuous Authentication

(Behavioral Biometrics)

Single Sign-On User Self-Service

Any Application

Any Device

Any Identity Store

Any Identity Type

Password Reset

Account Unlock

Self-Enrollment

Self-Provisioning

Authentication Security

Any VPN

Page 8: SecureAuth Cyber Security in Enterprise

8Copyright SecureAuth Corporation 2015

Any…Any…Any…Choice & Flexibility

Any ID TypeAny Device Any ID Store Any ApplicationAny VPN

User Logon IDSA web SSO token

3rd Party Web tokenSAML

NYLM/KerberosX509 Cert

CACPIV

SmartcardForm Post

Google

FacebookLinkedIn

Windows Live

LDAPAD_LDS

ODBCWeb Services

Lightweight Virtual Directory

WS-TrustWS-Fed

MobileWeb Token

Form-based

Tablets &Smartphones

Desktops &Laptops

Page 9: SecureAuth Cyber Security in Enterprise

9Copyright SecureAuth Corporation 2015

Portal ExamplesMake it YOUR Portal

From colorful to simple branded , it’s your portal!

Page 10: SecureAuth Cyber Security in Enterprise

10Copyright SecureAuth Corporation 2015

Millions of Users Trust SecureAuthBANKING & SECURITIES

HEALTHCARE GOVERNMENT

HIGH TECH TRAVEL EDUCATION COMMUNICATIONS MEDIA & SERVICES

RETAIL

Page 11: SecureAuth Cyber Security in Enterprise
Page 12: SecureAuth Cyber Security in Enterprise

12Copyright SecureAuth Corporation 2015

What Are Customers Saying?“We’re able to eliminate smartcards and, over a year and half period, we were able to eliminate soft FOB and hard FOB usage… We’ve reduced the number of passwords, made it easier for our users to log into applications and our network, and improved security.” – Chris Joerg, Director, Global Information Security – Unisys

“SecureAuth gives me the ability to ensure that remote access into my network is being done by authenticated individuals in a secure way and with the least amount of resistance.” – Martin Littman, CTO & CISO – Kelsey-Seybold Clinic

“The flexibility of SecureAuth allowed us to go not only go with our main Citrix web apps based application but with all other types of different applications from VPN all the way to cloud-based SaaS apps. It was best of breed in every category.” – Matt Johnson, Manager, Server Engineering – Houston Methodist Hospital

Page 13: SecureAuth Cyber Security in Enterprise

Visit www.secureauth.com

The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.

Page 14: SecureAuth Cyber Security in Enterprise

14Copyright SecureAuth Corporation 2015

Device Recognition

IP Reputation

Directory Lookup

Geo-Location

Geo-Velocity

Behavioral Biometrics

Risk LayersDynamic Adaptive Authentication

+ Layered Risk Analysis = Stronger Security

+ No User Experience Impact

+ Only present MFA when needed

+ No other vendor has as many “layers”

Page 15: SecureAuth Cyber Security in Enterprise

15Copyright SecureAuth Corporation 2015

+ Unique to each individual on each device

+ 99%* Accuracy (improves over time)

+ Only acts when threat detected – MFA to proceed

+ First vendor to offer… Available March 2016

TYPE

TOUCH

MOUSE

Behavioral BiometricsContinuous Authentication

Page 16: SecureAuth Cyber Security in Enterprise

16Copyright SecureAuth Corporation 2015

Self Help ToolsReduce Administration

+ Password Resets, Account Unlock, Self-Enroll & Provision

+ Time Savings

+ Labor Savings

+ User Autonomy

Page 17: SecureAuth Cyber Security in Enterprise

17Copyright SecureAuth Corporation 2015

Consume any identity from various

sources

Map identity to existing data stores for authentication

information

Utilize one or more of 20+ methods to

confirm user identity

Transparently assert identity to on-

premises, cloud, mobile and VPN resources (SSO)

Centralize and inspect access control activity

SecureAuth: The Secure Path to Strong Access Control

Page 18: SecureAuth Cyber Security in Enterprise

18Copyright SecureAuth Corporation 2015

Any Access Device

AnyIdentity

Store

Any Identity Type

Any On-Premises App(Commercial, Legacy,

Homegrown)

Pre-Authentication Risk Analysis

Adaptive Authentication Workflows

Multi-Factor Authentication

Continuous Authentication (Behavioral Biometrics)

Authentication Security

AnyVPN

AnySIEM

AnythingSDK

Any Cloud App(SaaS)

PasswordReset

AccountUnlock

Enrollment Provisioning

Self-Service

Single Sign-On

Page 19: SecureAuth Cyber Security in Enterprise

19Copyright SecureAuth Corporation 2015

• Founded in 2006• Privately held company• HQ in Irvine, California• 10 technology patents and

counting• Technology partners:

Cisco, Juniper, F5, Citrix, Microsoft, Amazon and Google

SecureAuth Corporation

Page 20: SecureAuth Cyber Security in Enterprise

Visit www.secureauth.com

The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.