smart cards & devices forum 2013 - protecting enterprise sensitive information in today’s...

19
I “Protecting Enterprise sensitive information in today’s mobile world.” Identity & Access EMEA Jérôme Soufflot – Smart Cards & Devices Forum Prague - May 2013

Upload: oksystem

Post on 17-Jan-2015

327 views

Category:

Technology


6 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

I “Protecting Enterprise sensitive information in today’s mobile world.”

Identity & Access EMEA Jérôme Soufflot – Smart Cards & Devices Forum Prague - May 2013

Page 2: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Introducing Gemalto 2

Our company at a glance

OUR COMPANY

Revenue 2012 €2.2 billion+

Employees 10,000+

Countries with a site in operation

43

OUR INNOVATION

Invested in R&D 2012 €177 million

Patents and patent applications

4,300

OUR CUSTOMERS

Countries where we have customers

190

Financial institutions 3000+

Dual listing on NYSE Euronext Amsterdam & Paris French CAC 40 index member

GTO.PA Use Gemalto products and services

2 billion Mobile operators 450+

eGovernment programs 80

Machines connect using Gemalto technology

50 million

Page 3: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Our mission

Introducing Gemalto 4

“Gemalto develops secure software that runs on trusted devices which we design and personalize. We manage these devices, the confidential data they contain and the services they make possible, throughout their life cycle”.

Page 4: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Understand the risks Security breaches more and more frequent

5

Data Stolen Service Unavailability

Network Intrusion

Passwords Exposed

Presenter
Presentation Notes
Too much trust on passwords Over-reliance on password authentication is a common problem that enables cyber criminals to penetrate networks Hackers can then expand to privileged accounts such as creating their own system management accounts. Deloitte predicts that in 2013 more than 90 percent of user-generated passwords, even strong, will be vulnerable to hacking
Page 5: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Understand the risks Too much trust on passwords

6

Over-reliance on password authentication is a common problem that enables cyber criminals to penetrate networks

Hackers can then expand to privileged accounts such as creating their own system management accounts.

Deloitte predicts that in 2013 more than 90 percent of user-generated passwords, even strong, will be vulnerable to hacking

Page 6: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

7

What is the weakest link in entreprise security? http://communication.gemalto.com/weakestlink/

Presenter
Presentation Notes
Gemalto worked in UK with research company Vanson Bounre:400 interviews were conducted looking into the behaviours, actions and attitudes of employees and managers towards IT security in the enterprise.
Page 7: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

What is the weakest link in entreprise security?

8

Page 8: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

9

What is the weakest link in entreprise security?

Page 9: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Market Drivers: Static Passwords Are Not Enough

10

Compliance with regulations and standards: Sarbanes-Oxley Act, Health Insurance Portability and Accountability, European Data Protection Directive, NIST Electronic Authentication Guideline for e-Prescription, e-health, CJIS, SICAM US Markets

Secure authentication of remote access user in order to reduce Identity theft and phishing attacks

High TCO for complex password policies are expensive for organizations

“Each time an end-user calls the help desk, it costs th organization $25-$50.”

Forrester

“30 percent of all calls to the help desk are for password resets”

Gartner Group

“The average end-user calls the help desk four times per year for passwords resets”

Gartner Group

“Businesses spend $200 per year/ person on password management”

Forrester

Page 10: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Solution Target Market and Rationale

12

• Enabler for migration to Multiple Factor Authentication – Seamless enforcement of high security policies based on PKI – End-to-end solution – Cost effectively deploy MFA

• Global solution for Logical Access

– Physical Access interoperability includes Mifare,HID.. • Designed for Security Sensitive organizations

“Armored Office secures access for Exec & employees that deal with a company’s most sensitive information”

Armored office answers the challenge of security breaches and weak passwords

Page 11: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Armored Office : Value Proposition

IdA Products

• One Key to Your Kingdom No trade-off between security and

usability

• High Assurance Protection Microsoft-centric endpoints, network

access, and content privacy/integrity

• Windows “Plug and Play” Ease of deployment, broad integration

with IT ecosystem

• End-to-end Solution Covers issuance, deployment and

maintenance

Presenter
Presentation Notes
Be able to answer high assurance question – strong identity provides auditability of user access for non repudiation
Page 12: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Armored Office Use Cases

Secure Identity Logon

Secure Remote Access

Data Protection: Whole Disk, File or Folders encryption

Email Encryption / Digital signature

Applications

Scenarios

On-Line / Off-Line Modes

Lost / Stolen / Forgotten Credential

Page 13: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Example of implementations /solutions

MOBILE SECURITY

15

Page 14: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Windows 8 Professional

16

Dell Latitude 10 Enhanced Security With Smart Card Reader Or any other USB smart card reader

IDBridge K50 Waterproof USB key With any Gemalto minidriver card

Page 15: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Gemalto Mobile SDK on Android

17

3rd party client Application (like Secure Email, Secure Browser…)

Gemalto IDGo 800 SDK

USB (on the go)

NFC Other Secure

Elements

Page 16: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Mobile Security NFC One Time Password

18

IDPrime MD based card with OTP-OATH applet

Application provided or SDK

Corporate eMail

Company network

Page 17: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

Others platforms

19

Ipad

Couple of Gemalto Partners (Secmaker, Ergonomics , CPS…) already provide solutions & apps for Ipad based on our ID Prime.Net

Page 18: Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive information in today’s mobile world

In summary Protiva ExecProtect Suite/Armored Office

Armored Focus: Execs and Privileged Access Users (PAU) Access to highly sensitive information Targeted messaging to execs for access to executive IT budgets

Vision and Value The ExecProtect suite is designed to :

Protect data on all endpoints Secure access from any device Enable Secure & Authenticated exchange of information