20 likes | 138 Views
Seminar key points : take the control. Identity management Who has access to which corporate resource. What role to preserve different security levels within the company It must be powerful but easy to use. Credential management
E N D
Seminar key points : take the control • Identity management • Who has access to which corporate resource. • What role to preserve different security levels within the company • It must be powerful but easy to use. • Credential management • User Securely Authenticated on any communication or personal corporate tool (office desktop, laptop , smartphone, remote access). • Smart card, token, Smartphone OTP application. • Foundation for all applications • Ready for the cloud – The new challenge to secure data!
The Pillars of Security in the new I.T. World Small Enterprise SECURITY FIREWALL to protect Identity and Credentials vs. risks and threats of the interconnected digital world I.P. Protection D.L.P. Document Dematerialization Office Macro or script protection Remote Access & VPN/SSL Digital Signature, Workflow Secure Logon & Pre-Boot Authent. S.S.O. & Application secure access Medium Enterprise Microsoft Identity Lifecycle Manager 2010 Complete suite of identity manage- ment over etherogeneous systems Gemalto Protiva Strong Auth. Solution OTP or PKI .NET based strong authentication smart card & tokens Large Enterprise Identity Management Manage new identities and roles in the company safely and in a flexible way Credential Management Storage of personal credential on Secure Tokens or Smart Cards to preserve the identity safe from attacks Banks and Financial Institutions Government and Public Institutions SECURITY