230 likes | 324 Views
Leveraging the platform: consolidating your authentication processes. Logical Networks Under Attack. Source: www.datalossdb.org. Physical Security Matters. The Enterprise today. Physical. Partners. Customers. Logical. Employees. Remote Employees. Suppliers. Resource Protection.
E N D
Leveraging the platform: consolidating your authentication processes
Logical Networks Under Attack Source: www.datalossdb.org
The Enterprise today Physical Partners Customers Logical Employees Remote Employees Suppliers
Resource Protection Physical • Physical Property • Laptops, servers, equipment • Employees Logical • Intellectual Property • Competitive Advantage • Customer information • Employee data
Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Compliance Requirements HIPAAHealth Information Privacy and Security PIPEDA Personal Information Protection and Electronic Documents Act UK Data Protection Act
TJX Companies, Inc. • Department store chain • Breach reported - 1.17.2007 • 94,000,000 records stolen • Settlement & other costs: $13,500,000+ Date of disclosure Source: www.datalossdb.org
Heartland Payment Systems • Financial Payments company • Breach reported - 1.20.2009 • 130,000,000 records stolen • Settlement & other costs: $68,000,000+ Date of disclosure Source: www.datalossdb.org
Balancing needs with effective implementation Considerations Drivers Physical and Logical Security Costs IP Protection Effectiveness Regulatory Pressures User Experience 9
Logical Access Websites & Remote Access • Complexity & cost of systems increasing • Unmanaged devices • Applications • Different user requirements • Fraud threats • Regulatory Compliance Windows Logon Encryption & Digital Signatures
Issues with Username / Password • Frustration with number of passwords • Password reuse • Frequent Password changes • Subject to social engineering attacks “Forgotten passwords cost the typical IT department $200 per user per year” “…Between 20% to 50% of all help desk calls are for password resets”
Legacy Physical Access (PACs) • Closed loop legacy systems • Easy to clone cards • No integration with Logical Access data Panel decides who can enter door radio Physical Access Reader Control Panel Logical Access data
Multiple Identities and Credentials per User Logical Access • Physical Access 14
Versatile Authentication Platform Recommendation: Enterprises that want one infrastructure for all types of users: Look for a versatile authentication solution that supports and manages multiple authentication methods, provides dynamic policy setting capabilities and can handle different authentication methods for the same user under different scenarios. Ant Allan, Ray Wagner
Gartner Recommendation Versatile / Adaptive Multiple Authenticators Use Cases Versatile Authentication Platform
Versatile Authentication Platform • Single open platform, centralized policy management • User self administration • Deploy based on Risk, Usability, Cost Versatile Authentication Platform
One Credential, multiple functions Physical • Simultaneous - legacy & new (PKI) systems. • Easy Transition • Secure Logical One Card • No password changes • Portable across devices • Multiple applications • Secure
Broad based Coverage Physical Logical Employees Remote Employees
Broad based Coverage Physical Partners Customers Versatile Authentication Platform Logical Employees Remote Employees Suppliers
Entrust: Global Presence, Identity Focus 350 employees worldwide, focused on secure identities 24x7 best-in-class technical support We have a unique global position across financial institutions, enterprises and governments Privately held, profitable