SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Mind the Gap
Reinier van der Drift | 24th February, 2016
adding strong authentication to the enterprise
• Users & passwords
• Authentication landscape
• Challegences for today’s enterprise
• Solving the authentication puzzle
• Let’s meet Sam
• Discussions and questions
Agenda
Users & passwords
• What is authentication?
Identity verification
• What is the authentication method most used?
Passwords
• What is the main cause of cybercrime?
Password abuse
Some questions about authentication
Jeremy Grant, Senior Executive
Advisor, Identity management, NIST
(National Institute of Standards and
Technology, US)
• Memory not equipped to memorize more than 8 characters
• Too many password(changes)
• Compliance is a burden for the user (password reset every 1-3 months)
• Internal users tend to trust each other and share passwords easily
• User wants it easy, gets it difficult
The user problem
Disruption & consolidation
Authentication landscape
6
The Nexus of Forces is the convergence and mutual reinforcement of social, mobility, cloud
and information patterns that drive new business scenarios.
• Rapidly changing enterprise IT-environment through virtualization of server and
workstation platforms
• Bringing IT to the cloud and offer disruptive PAAS, IAAS, SAAS services.
• Revolutionary penetration of mobile devices, like smartphones, tablets (BYOD)
• Immense popularity of social media, like Facebook, Twitter, Google, LinkedIN, ..
User authentication is a vital
component of this emerging
Nexus of Forces economy
The Nexus of Forces
Growing and Converging Markets in the Nexus of Forces
Identity Access Mgt Market
grows from $9.6B to $18.3B by 2019
with CAGR of 14,6% (Includes
eSSO/wSSO, provisioning etc)
The Total IT
Security market
$155B in 2019
Governance, Risk &
Compliance Market
$30B total market
Software $2-$6B
CAGR of 9.4 % to 2018
Global Multi-factor
Authentication Market
$10.8B by 2020 with CAGR of
19,7%
1. MF Authentication
3. Governance
Risk & Compliance 2. Security Incident &
Event Management
$4.54B in 2019 at CAGR
of 12.0%
4. Identity
Access Management
• Broader acceptance of MFA (multi factor authentication):
• User passwords replaced/enhanced by OTP/SMS authentication.
• FIDO initiative has broad industry support
• Mobile, smart and IoT-devices are more vulnerable than traditional
devices.
• The bad guys are getting smarter.
• Security practices struggle to keep pace with rapid adoption cloud
computing.
• Authentication methods continue to diversify:
• push messaging to the mobile,
• embedded biometric sensors,
• Bluetooth Smart-based authentication,
• contactless and NFC-based methods
• FIDO-tokens provide MFA with end-to-end security
• Enterprises and consumers have unprecedented choice of secure
authentication solutions.
Major MFA trends
It’s becoming a puzzle
Challenges for today’s enterprise
10
Authentication Basics
Authentication: simple and strong
Simple authentication: 1 factor
Strong authentication: 2 or > factors
Examples:
- User Name and Password
• Cards + PIN (Banks)
• PKI-card + PIN (Government)
• Token + Password (RSA)
• Cards + Biometrics (Match on Card)
There is no such thing as a ‘one-fits-all’ (strong) authentication
solution
Business Drivers
 Improve compliance
 Increase Information security
 Increase user convenience
 Lower IT costs (Help Desk Calls) and Centralise Tooling
 No rip and replace (re-use existing hardware)
Authentication today (point solutions)
Example of Methods
Hardware tokens (Radius, USB)
Smartphones (OOB, OATH)
Phones (voice, sms)
Access cards (RFID, mifare, NFC)
Smart/PKI-cards
Biometrics
2/3 factor (combinations)
Social login
Federated authentication
Passwords/PIN-codes/Q&A
FIDO and more
Example of activities
• Remote access
• Access to workstations/user
devices,
• Access to networks/to servers
• Access to Applications:
– generic applications,
– Single Sign-on,
– business applications
• Access to Cloud/web:
– web sites
– web applications
• Business Authentication
– execution of transactions
– signing of transactions
– business data (storage)
• and more
It’s just another jigsaw
Solving the authentication puzzle
14
Micro Focus
Advanced
Authentication
Framework
Futureproof Authentication frameworkAuthentication Puzzle solved
Futureproof Authentication frameworkAdvanced Authentication USP’s
• Password replacement
• Escape from vendor lock in
• Low cost 2-factor authentication on smartphone
• Mix and match multiple authentication methods
• Integrated authentication solution for remote, on premise and web access
• Re-use available access cards for strong authentication
• Integration with IAM, SSO and SIEM
• Re-authenticate users in business processes (execution, signing)
• Linked accounts
Proximity and Smart Cards
Smartcards
Smartcards differ from proximity cards by using chips rather than antennas.
These chips vary in storage size and processing power but all contain
secure information (usually certificates). When a smart card is powered by
inserting into the reader, the certificate is verified (often with a PIN) for sign-
in, digital signature or other. Smartcards have the advantage of a secured
container but require a high maintenance, high priced card management
system.
Cards are widely used in hospitals, government offices and businesses.
They are often used for “physical” access to restricted and sensitive areas.
The same cards can likely be used for “logical” network access.
Proximity Cards
These work by requiring a tap of the card on a card reader. The reader
activates a small antenna inside the card and reads the transmitted code.
This code is sent to the authentication system for verification (often with an
accompanying PIN). The greatest advantage of proximity cards is ease-of-
use. The biggest disadvantage is that they are not secured and will
transmit their clear text code to any device.
Biometrics
How it works
Regardless of the manor fingerprints are captured they result in a pattern that is
analyzed to identify unique characteristics at coordinates. These coordinates are
recorded and processed through an algorithm to derive a value. The value is
then used for comparison in future login attempts.
Advantages and Disadvantages
on the first try, no matter who you are or what the weather is doing.
more inclusive and more reliable than other fingerprint sensors, which are
vulnerable to a variety of conditions including the presence of topical
contaminants, moisture, and bright ambient light. Simply stated, our sensors
work where other technologies fail.
Fingerprint readers are generally a secure and convenient reliable
authentication solution that will exceed your expectations. They securely
authenticate a user and can be integrated to enable your step-up and
transaction level access management.
Soft and Hard Tokens
Hardware Tokens
Hard tokens registered
with the Radius server
generate a number for
entry to login form and
verification. Hard tokens
are expensive, hard to
manage and distribute and
these solutions can have a
lot of components, but
they are very popular
(especially in finance).
Software Tokens
Soft tokens are generated
by software at the end
point with a registered
seed. This is less secure
than hardware tokens
because the seed can be
reused. Soft tokens are
popular because they
provide the functionality
with no devices to buy,
ship, replace or renew.
Hardware and software tokens are widely used in addition to or in place of a
password. They provide a key authentication code generated at fixed
intervals using a built-in clock and a unique random key (or "seed"). Hard
tokens come in many formats (with number pads, biometrics, etc,) and soft
token generators can run on any platform.
Network
Radius
Network
Flash / Thumb Drive Support
Flash Drive Authentication
This method allows a user to enroll and use a commercially available flash
drive (plus a PIN code) for use as in authenticating much like a smart card
might work. (The flash drive acts as both the reader and card in this
comparison.) An encrypted file (FlashPinBspLogon.dat) is placed on the
flash drive during the enrollment process, . When used for authentication the
PIN unencrypts the file and the validity is checked. This is one of the easiest
universal authentication method options available. With today’s mobile users
there are many advantage to using an inexpensive easy to replace device.
The major disadvantage is that flash drives can be easily misplaced and
may not be available when needed.
Flash/thumb drives are convenient, cheap and readily available. They can
be used to securely authenticate a user, as a backup to a primary
authentication method that might not be available for any number of reasons
and they can be integrated to enable step-up and transaction level access
management.
Let’s meet Sam
22
High Tech Manufacturing
• Customer challenge
• Needed stronger authentication across wide
range of users
• Diverse authentication requirements
• increase security – inconsistent policies
• FIDO Compliant Tokens in Windows Infra
• Micro Focus solution
• Leveraged past investments, enabled future
options
• Simplified deployment
• One framework for integration and policy
management
• Solution across Windows and Mac clients
• Customer challenge
• Improve secure access to reduce risk
• Reduce attack surface through virtual clients
• Needed one solution for all authentication types
• Micro Focus solution
• Leveraged existing finger print readers on laptops
• 2 factor authentication for Citrix access
• Solution expanded across the business
International Manufacturing
• Customer challenge
• Comply to patient privacy regulations
• Inefficient and repeated authentication cost
clinician productivity
• Micro Focus solution
• Leveraged existing card readers
• Integrated with remote access system
• Provided tap ‘n go (pin only required once)
Healthcare
ANYone?
Discussion & questions
28

Weitere ähnliche Inhalte

Was ist angesagt?

Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managers
InfraMatix Inc.
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
Syntax Inc.
 

Was ist angesagt? (20)

Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
SHIP Brochure
SHIP BrochureSHIP Brochure
SHIP Brochure
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managers
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 

Andere mochten auch

Barrow_Quarterly_1997_Physical_Aspects_of_Stx_Radiosurgery
Barrow_Quarterly_1997_Physical_Aspects_of_Stx_RadiosurgeryBarrow_Quarterly_1997_Physical_Aspects_of_Stx_Radiosurgery
Barrow_Quarterly_1997_Physical_Aspects_of_Stx_Radiosurgery
Jeffrey A. Fiedler
 
장기렌트카 곤명골프비교
장기렌트카 곤명골프비교장기렌트카 곤명골프비교
장기렌트카 곤명골프비교
jdhfrter
 
강원도팬션 국제항공권할인
강원도팬션 국제항공권할인강원도팬션 국제항공권할인
강원도팬션 국제항공권할인
foskfs
 
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-BayanHukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
Muhammad Nashiruddin
 
추석여행 호텔벤허
추석여행 호텔벤허추석여행 호텔벤허
추석여행 호텔벤허
dehryes
 
Presentasi musrenbangkab dishutbun 5 apr2012
Presentasi musrenbangkab dishutbun   5 apr2012Presentasi musrenbangkab dishutbun   5 apr2012
Presentasi musrenbangkab dishutbun 5 apr2012
Ariston Pamungkas
 

Andere mochten auch (20)

Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Qui
QuiQui
Qui
 
Ekspose di lingkup ditjen phka, jakarta 2008
Ekspose di lingkup ditjen phka, jakarta 2008Ekspose di lingkup ditjen phka, jakarta 2008
Ekspose di lingkup ditjen phka, jakarta 2008
 
Test
TestTest
Test
 
Barrow_Quarterly_1997_Physical_Aspects_of_Stx_Radiosurgery
Barrow_Quarterly_1997_Physical_Aspects_of_Stx_RadiosurgeryBarrow_Quarterly_1997_Physical_Aspects_of_Stx_Radiosurgery
Barrow_Quarterly_1997_Physical_Aspects_of_Stx_Radiosurgery
 
장기렌트카 곤명골프비교
장기렌트카 곤명골프비교장기렌트카 곤명골프비교
장기렌트카 곤명골프비교
 
강원도팬션 국제항공권할인
강원도팬션 국제항공권할인강원도팬션 국제항공권할인
강원도팬션 국제항공권할인
 
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-BayanHukum Keluarga dalam Tafsir Adhwa' al-Bayan
Hukum Keluarga dalam Tafsir Adhwa' al-Bayan
 
Charpy
CharpyCharpy
Charpy
 
추석여행 호텔벤허
추석여행 호텔벤허추석여행 호텔벤허
추석여행 호텔벤허
 
Presentasi musrenbangkab dishutbun 5 apr2012
Presentasi musrenbangkab dishutbun   5 apr2012Presentasi musrenbangkab dishutbun   5 apr2012
Presentasi musrenbangkab dishutbun 5 apr2012
 
La Adolescencia
La AdolescenciaLa Adolescencia
La Adolescencia
 

Ähnlich wie #MFSummit2016 Secure: Mind the gap strengthening the information security model

2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 

Ähnlich wie #MFSummit2016 Secure: Mind the gap strengthening the information security model (20)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 

Mehr von Micro Focus

Mehr von Micro Focus (20)

North America Strategic Modernization Exec Forum
North America Strategic Modernization Exec Forum North America Strategic Modernization Exec Forum
North America Strategic Modernization Exec Forum
 
Tech Channel COBOL ebook
Tech Channel COBOL ebookTech Channel COBOL ebook
Tech Channel COBOL ebook
 
Unlocking COBOL Business Value
Unlocking COBOL Business ValueUnlocking COBOL Business Value
Unlocking COBOL Business Value
 
Quietly confident, enduringly competent - COBOL.
Quietly confident, enduringly competent - COBOL. Quietly confident, enduringly competent - COBOL.
Quietly confident, enduringly competent - COBOL.
 
5 key capabilitie for a smart service desk solution infographic
5 key capabilitie for a smart service desk solution infographic5 key capabilitie for a smart service desk solution infographic
5 key capabilitie for a smart service desk solution infographic
 
SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus. SAP Fortify by Micro Focus.
SAP Fortify by Micro Focus.
 
Digital Transformation pillars 2020
Digital Transformation pillars 2020Digital Transformation pillars 2020
Digital Transformation pillars 2020
 
Whats new in Enterprise 5.0 Product Suite
Whats new in Enterprise 5.0 Product SuiteWhats new in Enterprise 5.0 Product Suite
Whats new in Enterprise 5.0 Product Suite
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
Why attend the application modernization & connectivity track at Micro Focus ...
Why attend the application modernization & connectivity track at Micro Focus ...Why attend the application modernization & connectivity track at Micro Focus ...
Why attend the application modernization & connectivity track at Micro Focus ...
 
Micro Focus #DevDay50 - Atlanta
Micro Focus #DevDay50 - AtlantaMicro Focus #DevDay50 - Atlanta
Micro Focus #DevDay50 - Atlanta
 
Growth of Internet Data - 2017
Growth of Internet Data - 2017Growth of Internet Data - 2017
Growth of Internet Data - 2017
 
Easily Create Scalable Automation using Selenium
Easily Create Scalable Automation using SeleniumEasily Create Scalable Automation using Selenium
Easily Create Scalable Automation using Selenium
 
The Journey to Mainframe DevOps
The Journey to Mainframe DevOpsThe Journey to Mainframe DevOps
The Journey to Mainframe DevOps
 
Micro Focus extend 10 and 10.1 with AcuToWeb
Micro Focus extend 10 and 10.1 with AcuToWebMicro Focus extend 10 and 10.1 with AcuToWeb
Micro Focus extend 10 and 10.1 with AcuToWeb
 
The COBOL Story by Wim Ebbinkhuijsen
The COBOL Story by Wim EbbinkhuijsenThe COBOL Story by Wim Ebbinkhuijsen
The COBOL Story by Wim Ebbinkhuijsen
 
DevDay Copenhagen - Micro Focus overview and introduction
DevDay Copenhagen - Micro Focus overview and introductionDevDay Copenhagen - Micro Focus overview and introduction
DevDay Copenhagen - Micro Focus overview and introduction
 
The DevOps Journey
The DevOps JourneyThe DevOps Journey
The DevOps Journey
 
ACUCOBOL - Product Strategy and Roadmap
ACUCOBOL - Product Strategy and RoadmapACUCOBOL - Product Strategy and Roadmap
ACUCOBOL - Product Strategy and Roadmap
 
#DevDay Copenhagen - Bluegarden Presentation
#DevDay Copenhagen - Bluegarden Presentation #DevDay Copenhagen - Bluegarden Presentation
#DevDay Copenhagen - Bluegarden Presentation
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

#MFSummit2016 Secure: Mind the gap strengthening the information security model

  • 1. Mind the Gap Reinier van der Drift | 24th February, 2016 adding strong authentication to the enterprise
  • 2. • Users & passwords • Authentication landscape • Challegences for today’s enterprise • Solving the authentication puzzle • Let’s meet Sam • Discussions and questions Agenda
  • 4. • What is authentication? Identity verification • What is the authentication method most used? Passwords • What is the main cause of cybercrime? Password abuse Some questions about authentication Jeremy Grant, Senior Executive Advisor, Identity management, NIST (National Institute of Standards and Technology, US)
  • 5. • Memory not equipped to memorize more than 8 characters • Too many password(changes) • Compliance is a burden for the user (password reset every 1-3 months) • Internal users tend to trust each other and share passwords easily • User wants it easy, gets it difficult The user problem
  • 7. The Nexus of Forces is the convergence and mutual reinforcement of social, mobility, cloud and information patterns that drive new business scenarios. • Rapidly changing enterprise IT-environment through virtualization of server and workstation platforms • Bringing IT to the cloud and offer disruptive PAAS, IAAS, SAAS services. • Revolutionary penetration of mobile devices, like smartphones, tablets (BYOD) • Immense popularity of social media, like Facebook, Twitter, Google, LinkedIN, .. User authentication is a vital component of this emerging Nexus of Forces economy The Nexus of Forces
  • 8. Growing and Converging Markets in the Nexus of Forces Identity Access Mgt Market grows from $9.6B to $18.3B by 2019 with CAGR of 14,6% (Includes eSSO/wSSO, provisioning etc) The Total IT Security market $155B in 2019 Governance, Risk & Compliance Market $30B total market Software $2-$6B CAGR of 9.4 % to 2018 Global Multi-factor Authentication Market $10.8B by 2020 with CAGR of 19,7% 1. MF Authentication 3. Governance Risk & Compliance 2. Security Incident & Event Management $4.54B in 2019 at CAGR of 12.0% 4. Identity Access Management
  • 9. • Broader acceptance of MFA (multi factor authentication): • User passwords replaced/enhanced by OTP/SMS authentication. • FIDO initiative has broad industry support • Mobile, smart and IoT-devices are more vulnerable than traditional devices. • The bad guys are getting smarter. • Security practices struggle to keep pace with rapid adoption cloud computing. • Authentication methods continue to diversify: • push messaging to the mobile, • embedded biometric sensors, • Bluetooth Smart-based authentication, • contactless and NFC-based methods • FIDO-tokens provide MFA with end-to-end security • Enterprises and consumers have unprecedented choice of secure authentication solutions. Major MFA trends
  • 10. It’s becoming a puzzle Challenges for today’s enterprise 10
  • 11. Authentication Basics Authentication: simple and strong Simple authentication: 1 factor Strong authentication: 2 or > factors Examples: - User Name and Password • Cards + PIN (Banks) • PKI-card + PIN (Government) • Token + Password (RSA) • Cards + Biometrics (Match on Card) There is no such thing as a ‘one-fits-all’ (strong) authentication solution
  • 12. Business Drivers  Improve compliance  Increase Information security  Increase user convenience  Lower IT costs (Help Desk Calls) and Centralise Tooling  No rip and replace (re-use existing hardware)
  • 13. Authentication today (point solutions) Example of Methods Hardware tokens (Radius, USB) Smartphones (OOB, OATH) Phones (voice, sms) Access cards (RFID, mifare, NFC) Smart/PKI-cards Biometrics 2/3 factor (combinations) Social login Federated authentication Passwords/PIN-codes/Q&A FIDO and more Example of activities • Remote access • Access to workstations/user devices, • Access to networks/to servers • Access to Applications: – generic applications, – Single Sign-on, – business applications • Access to Cloud/web: – web sites – web applications • Business Authentication – execution of transactions – signing of transactions – business data (storage) • and more
  • 14. It’s just another jigsaw Solving the authentication puzzle 14
  • 15.
  • 17. Futureproof Authentication frameworkAdvanced Authentication USP’s • Password replacement • Escape from vendor lock in • Low cost 2-factor authentication on smartphone • Mix and match multiple authentication methods • Integrated authentication solution for remote, on premise and web access • Re-use available access cards for strong authentication • Integration with IAM, SSO and SIEM • Re-authenticate users in business processes (execution, signing) • Linked accounts
  • 18. Proximity and Smart Cards Smartcards Smartcards differ from proximity cards by using chips rather than antennas. These chips vary in storage size and processing power but all contain secure information (usually certificates). When a smart card is powered by inserting into the reader, the certificate is verified (often with a PIN) for sign- in, digital signature or other. Smartcards have the advantage of a secured container but require a high maintenance, high priced card management system. Cards are widely used in hospitals, government offices and businesses. They are often used for “physical” access to restricted and sensitive areas. The same cards can likely be used for “logical” network access. Proximity Cards These work by requiring a tap of the card on a card reader. The reader activates a small antenna inside the card and reads the transmitted code. This code is sent to the authentication system for verification (often with an accompanying PIN). The greatest advantage of proximity cards is ease-of- use. The biggest disadvantage is that they are not secured and will transmit their clear text code to any device.
  • 19. Biometrics How it works Regardless of the manor fingerprints are captured they result in a pattern that is analyzed to identify unique characteristics at coordinates. These coordinates are recorded and processed through an algorithm to derive a value. The value is then used for comparison in future login attempts. Advantages and Disadvantages on the first try, no matter who you are or what the weather is doing. more inclusive and more reliable than other fingerprint sensors, which are vulnerable to a variety of conditions including the presence of topical contaminants, moisture, and bright ambient light. Simply stated, our sensors work where other technologies fail. Fingerprint readers are generally a secure and convenient reliable authentication solution that will exceed your expectations. They securely authenticate a user and can be integrated to enable your step-up and transaction level access management.
  • 20. Soft and Hard Tokens Hardware Tokens Hard tokens registered with the Radius server generate a number for entry to login form and verification. Hard tokens are expensive, hard to manage and distribute and these solutions can have a lot of components, but they are very popular (especially in finance). Software Tokens Soft tokens are generated by software at the end point with a registered seed. This is less secure than hardware tokens because the seed can be reused. Soft tokens are popular because they provide the functionality with no devices to buy, ship, replace or renew. Hardware and software tokens are widely used in addition to or in place of a password. They provide a key authentication code generated at fixed intervals using a built-in clock and a unique random key (or "seed"). Hard tokens come in many formats (with number pads, biometrics, etc,) and soft token generators can run on any platform. Network Radius Network
  • 21. Flash / Thumb Drive Support Flash Drive Authentication This method allows a user to enroll and use a commercially available flash drive (plus a PIN code) for use as in authenticating much like a smart card might work. (The flash drive acts as both the reader and card in this comparison.) An encrypted file (FlashPinBspLogon.dat) is placed on the flash drive during the enrollment process, . When used for authentication the PIN unencrypts the file and the validity is checked. This is one of the easiest universal authentication method options available. With today’s mobile users there are many advantage to using an inexpensive easy to replace device. The major disadvantage is that flash drives can be easily misplaced and may not be available when needed. Flash/thumb drives are convenient, cheap and readily available. They can be used to securely authenticate a user, as a backup to a primary authentication method that might not be available for any number of reasons and they can be integrated to enable step-up and transaction level access management.
  • 23.
  • 24. High Tech Manufacturing • Customer challenge • Needed stronger authentication across wide range of users • Diverse authentication requirements • increase security – inconsistent policies • FIDO Compliant Tokens in Windows Infra • Micro Focus solution • Leveraged past investments, enabled future options • Simplified deployment • One framework for integration and policy management • Solution across Windows and Mac clients
  • 25. • Customer challenge • Improve secure access to reduce risk • Reduce attack surface through virtual clients • Needed one solution for all authentication types • Micro Focus solution • Leveraged existing finger print readers on laptops • 2 factor authentication for Citrix access • Solution expanded across the business International Manufacturing
  • 26. • Customer challenge • Comply to patient privacy regulations • Inefficient and repeated authentication cost clinician productivity • Micro Focus solution • Leveraged existing card readers • Integrated with remote access system • Provided tap ‘n go (pin only required once) Healthcare
  • 27.