ay - adaptive access control

20
SecureAuth TM IdP ADAPTIVE ACCESS CONTROL Determine Identities with Confidence

Upload: adrian-young

Post on 16-Apr-2017

194 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: AY - Adaptive Access Control

SecureAuthTM IdPADAPTIVE ACCESS CONTROLDetermine Identities with Confidence

Page 2: AY - Adaptive Access Control

2Copyright SecureAuth Corporation 2015

Agenda+ The “Identity” problem

+ How SecureAuth IdP can help solve

+ How SecureAuth IdP is different

+ SecureAuth customers

Page 3: AY - Adaptive Access Control

3Copyright SecureAuth Corporation 2015

EMPLOYEES

BUSINESSPARTNERS

CUSTOMERS

CLOUD

ON-PREMCommercial &Homegrown

+ Billions spent annually on Endpoint and Network security

+ 66% of Executives still not confident they’re protected1

+ Breaches continue – Anthem, US National Guard, T-Mobile, Scottrade, CVS, Walgreens, IRS, FBI

+ If you have valid credentials…you get in! Users are the vulnerability & most popular access point

+ SecureAuth protects & detects at the user identity levelENDPOINT

SECURITYNETWORKSECURITY

Typical Security InfrastructureRoutinely Circumvented

1 - A 2015 Survey – Cybersecurity in the Boardroom (Link)

Page 4: AY - Adaptive Access Control

4Copyright SecureAuth Corporation 2015

“2015 Data Breach Investigations Report” by Verizon

http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation-report-2015_en_xg.pdf

Page 5: AY - Adaptive Access Control

5Copyright SecureAuth Corporation 2015

EMPLOYEES

BUSINESSPARTNERS

CUSTOMERS

CLOUD

ON-PREMCommercial &Homegrown

NETWORKSECURITY

How can we improve security while improving usability and reducing costs?

Need for Stronger Identity SecurityIdentity is the New Security Perimeter

IDENTITYSECURITY

ENDPOINTSECURITY

Page 6: AY - Adaptive Access Control

6Copyright SecureAuth Corporation 2015

How Can SecureAuth Help?

Improve Security Improve Usability Reduce Costs

• Adjust security based on dynamic risk analysis

• Tailor login process to different types of groups (i.e. administrators vs sales)

• Use behavioral biometrics to continually monitor & get smarter about auth.

• Only require MFA when risk factors are present

• Secure single sign-on convenience

• Self service - users manage their own accounts

• Multiple authentication methods to match use case

(can require more than 2 factors to proceed)

• Rapid deployment using standard connectors

• Augment & complement existing security investments• Uses existing directories• No tokens/devices to buy

• Saving via self-service (reduce 30-60% of your calls)

Page 7: AY - Adaptive Access Control

7Copyright SecureAuth Corporation 2015

SecureAuth IdP How Are We Different?

Pre-AuthenticationRisk Analysis

Multi-Factor Authentication

(20+ Methods)

Adaptive Authentication

Workflows

Continuous Authentication

(Behavioral Biometrics)

Single Sign-On User Self-Service

Any Application

Any Device

Any Identity Store

Any Identity Type

Password Reset

Account Unlock

Self-Enrollment

Self-Provisioning

Authentication Security

Any VPN

Page 8: AY - Adaptive Access Control

8Copyright SecureAuth Corporation 2015

Millions of Users Trust SecureAuthBANKING & SECURITIES

HEALTHCARE GOVERNMENT

HIGH TECH TRAVEL EDUCATION COMMUNICATIONS MEDIA & SERVICES

RETAIL

Page 9: AY - Adaptive Access Control
Page 10: AY - Adaptive Access Control

10Copyright SecureAuth Corporation 2015

What Are Customers Saying?“We’re able to eliminate smartcards and, over a year and half period, we were able to eliminate soft FOB and hard FOB usage… We’ve reduced the number of passwords, made it easier for our users to log into applications and our network, and improved security.” – Chris Joerg, Director, Global Information Security – Unisys

“SecureAuth gives me the ability to ensure that remote access into my network is being done by authenticated individuals in a secure way and with the least amount of resistance.” – Martin Littman, CTO & CISO – Kelsey-Seybold Clinic

“The flexibility of SecureAuth allowed us to go not only go with our main Citrix web apps based application but with all other types of different applications from VPN all the way to cloud-based SaaS apps. It was best of breed in every category.” – Matt Johnson, Manager, Server Engineering – Houston Methodist Hospital

Page 11: AY - Adaptive Access Control

Visit www.secureauth.com

The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.

Page 12: AY - Adaptive Access Control

12Copyright SecureAuth Corporation 2015

Device Recognition

IP Reputation

Directory Lookup

Geo-Location

Geo-Velocity

Behavioral Biometrics

Risk LayersDynamic Adaptive Authentication

+ Layered Risk Analysis = Stronger Security

+ No User Experience Impact

+ Only present MFA when needed

+ No other vendor has as many “layers”

Page 13: AY - Adaptive Access Control

13Copyright SecureAuth Corporation 2015

+ Unique to each individual on each device

+ 99%* Accuracy (improves over time)

+ Only acts when threat detected – MFA to proceed

+ First vendor to offer… Available March 2016

TYPE

TOUCH

MOUSE

Behavioral BiometricsContinuous Authentication

Page 14: AY - Adaptive Access Control

14Copyright SecureAuth Corporation 2015

Any…Any…Any…Choice & Flexibility

Any ID TypeAny Device Any ID Store Any ApplicationAny VPN

User Logon IDSA web SSO token

3rd Party Web tokenSAML

NYLM/KerberosX509 Cert

CACPIV

SmartcardForm Post

Google

FacebookLinkedIn

Windows Live

LDAPAD_LDS

ODBCWeb Services

Lightweight Virtual Directory

WS-TrustWS-Fed

MobileWeb Token

Form-based

Tablets &Smartphones

Desktops &Laptops

Page 15: AY - Adaptive Access Control

15Copyright SecureAuth Corporation 2015

Self Help ToolsReduce Administration

+ Password Resets, Account Unlock, Self-Enroll & Provision

+ Time Savings

+ Labor Savings

+ User Autonomy

Page 16: AY - Adaptive Access Control

16Copyright SecureAuth Corporation 2015

Consume any identity from various

sources

Map identity to existing data stores for authentication

information

Utilize one or more of 20+ methods to

confirm user identity

Transparently assert identity to on-

premises, cloud, mobile and VPN resources (SSO)

Centralize and inspect access control activity

SecureAuth: The Secure Path to Strong Access Control

Page 17: AY - Adaptive Access Control

17Copyright SecureAuth Corporation 2015

Any Access Device

AnyIdentity

Store

Any Identity Type

Any On-Premises App(Commercial, Legacy,

Homegrown)

Pre-Authentication Risk Analysis

Adaptive Authentication Workflows

Multi-Factor Authentication

Continuous Authentication (Behavioral Biometrics)

Authentication Security

AnyVPN

AnySIEM

AnythingSDK

Any Cloud App(SaaS)

PasswordReset

AccountUnlock

Enrollment Provisioning

Self-Service

Single Sign-On

Page 18: AY - Adaptive Access Control

18Copyright SecureAuth Corporation 2015

Portal ExamplesMake it YOUR Portal

From colorful to simple branded , it’s your portal!

Page 19: AY - Adaptive Access Control

19Copyright SecureAuth Corporation 2015

• Founded in 2006• Privately held company• HQ in Irvine, California• 10 technology patents and

counting• Technology partners:

Cisco, Juniper, F5, Citrix, Microsoft, Amazon and Google

SecureAuth Corporation

Page 20: AY - Adaptive Access Control

Visit www.secureauth.com

The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.