22

Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of
Page 2: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Smart Identity Protection That Works for You and Your Users 2

Smart Identity Protection That Works for You and Your Users

Petri Ala-Annala

Senior Principal, CISSP-ISSAP, CISA, CISM

Page 3: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Agenda

Smart Identity Protection That Works for You and Your Users 3

Calibrating Identity Protection Principles1

The Reality of Doing Business2

Validation & ID Protection Service Overview3

Demos: eBay, SSL VPN, Symantec O3 portal4

Page 4: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Smart Identity Protection That Works for You and Your Users 4

Calibrating Identity Protection Principles

Page 5: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

CIA Security Principals Have not Changed

Smart Identity Protection That Works for You and Your Users 5

ConfidentiallyIntegrity

AvailabilityUsability

Page 6: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Bus Emergency Exit

Smart Identity Protection That Works for You and Your Users 6

Page 7: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Last Night, at My Hotel Room -Oh yes, I know I am a Security Geek

Smart Identity Protection That Works for You and Your Users 7

Page 8: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Authentication Process Who Trusts Who?

Smart Identity Protection That Works for You and Your Users 8

Websites,Intranet shares,

applications

Access Controlwho cando what?

Authorizationwhat canyou do?

Authentication

how can you prove that?

Identificationwho you are?

User, Device

Page 9: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Smart Identity Protection That Works for You and Your Users 9

The Reality of Doing Business

People are Always on

Page 10: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

New Technologies,New Behaviors

10Smart Identity Protection That Works for You and Your Users

Page 11: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Networks

Wi-Fi WiMAX

3G VPN

CorporateKiosk

People Are the New Perimeter

Smart Identity Protection That Works for You and Your Users

Laptop

PDA

iPad

Desktop

Laptop

Phone

iPad

iPad

PDA

PDA

Laptop

Laptop

Desktop

Desktop

Smartcards

ConsumerGovernment

Partners

Employee

11

Page 12: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Smart Identity Protection That Works for You and Your Users 12

Validation & ID Protection Service (VIP)

Overview

Page 13: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Authentication as a Service

Enterprise

Consumer Portal,

Business Partner

Extranet

Corporate Network

Symantec Hosted

Real Time

Authentication

User with VIP

Credential

OTP

Intelligent Authentication

Out of Band

Smart Identity Protection That Works for You and Your Users

Page 14: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Easy to Use Management Portal

14Smart Identity Protection That Works for You and Your Users

Page 15: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Strategic Strong Authentication Approach

Symantec Validation and Identity Protection (VIP)

Standalone OTP Credentials

Har

dw

are

Toke

n

Mo

bile

, Des

kto

p

Soft

war

e

Emb

edd

ed

Out-of-BandSM

S

Vo

ice

Cal

l

Emai

l

Strong Device IDs

Clie

nt-

bas

ed

Dev

ice

ID

Clie

ntl

ess

Dev

ice

ID

Risk-Based

Inte

llige

nt

Au

then

tica

tio

n

Provides Flexible Options

Smart Identity Protection That Works for You and Your Users

Page 16: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Strong Security and a Better User Experience

Broad Credentials (OTP)

• Hardware, software, out-of-band

• Mobile: 900+ popular handsets with Free end-user download

• VIP credential embedded in hardware –Intel IPT

Risk-based Authentication

• Device ID and user behavior

• Challenge risky logins

• Transaction monitoring

Enterprise integration

• Popular enterprise applications, such as VPNs, SSO

• Custom app integration via API

Smart Identity Protection That Works for You and Your Users

Page 17: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Symantec VIP Enterprise Deployment Architecture

Smart Identity Protection That Works for You and Your Users 17

Page 18: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

VIP Supports Many 3rd Party Integrations

• Array Networks

• Barracuda

• Check Point

• Citrix Systems

• Cisco

• IBM

• Juniper

• Microsoft

• and more at…

http://www.symantec.com/verisign/vip-authentication-service/agents-options-add-ons

Smart Identity Protection That Works for You and Your Users

Page 19: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Smart Identity Protection That Works for You and Your Users 19

Demos: eBay, SSL VPN, Symantec O3 portal

Low-cost and easy-to-use cloud-based strong authentication

Page 20: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Symantec Authentication Security and Reliability

Experience

15 years Validating Websites,

User, and Devices, with over

400,000 clients world wide

Secure Bandwidth

3 Billion Secure Validations

a Day with 100 % uptime for

over the last 5 years in a Saas

Model

24Smart Identity Protection That Works for You and Your Users

Page 22: Smart - storage.googleapis.com€¦ · 01/01/2017  · Smart Identity Protection That Works for You and Your Users 3 1 Calibrating Identity Protection Principles 2 The Reality of

Thank you!

Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Smart Identity Protection That Works for You and Your Users 26

Petri Ala-Annala

[email protected]