SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Copyright © 2013 Alliant-Cay, LLC . All Rights Reserved.
Alliant Managed Services
35 Airport Road
Morristown, New Jersey 07960
P - 973.267.5236
F - 973.267.5237
www.AlliantTech.com/ams
AMS Two-Factor Authentication
Security Services
Alliant Technologies’ Managed Two-Factor Authentication (2FA) Service allows
clients to outsource the management and administration of with RSA SecurID or
SafeNet tokens. Whether you are new to two-factor authentication, or a seasoned
user of tokens, AMS has a service option that will increase your security posture
while improving platform availability and end-user satisfaction levels while
containing cost.
Managed Two-Factor Authentication Service Overview
• Simple web interface with Active Directory integration
• Fulfillment of end user token orders, domestically and internationally, with
custom electronic or physical welcome kit
• Multiple form factors to suit every user need
• 24/7 End User Service Desk for token-related user support
• Token inventory reports for IT audits or internal bill-back
• Fully managed and secure authentication servers, local or in the cloud
Working with leading Authentication providers, Alliant can now offer a
hybrid-token architecture for all your users and token types. Smartphone tokens,
RSA SecurID tokens, SafeNet tokens and even SMS message “tokens” are
co-mingled onto a single authentication platform with Active Directory integration
for state-of-the-art authentication options with minimal user impact. Users can
add software tokens, change between token form factors, or simply continue to
enjoy the peace of mind provided by their existing token authentication, all
supported by Alliant’s 24 x 7 Service Desk and automated token deployment
procedures.
Key Features
Unique Cloud-Based Architecture
All these architecture options provide an enhanced security posture while
minimizing the impact on local IT staff. Alliant’s per-month per user billing also
allows users to avoid the capital investment normally associated with 2FA solutions.
Let Alliant show you how these options can meet your operational and security
goals.
(see reverse for deployment options)
Alliant Managed Services (AMS)
provides a comprehensive suite of IT
solutions that maintain client
operations with maximum efficiency
and minimum downtime. Each of our
solutions is tailored to client
specifications, powered by
best-in-breed technologies, and is
supported by our 24x7 Service Desk of
certified Level 1 – Level 3 engineers.
AMS delivers IT as a finished product,
allowing our clients to focus on their
core business with the peace of mind
that their critical business support
functions are installed, operated, and
maintained at the highest level using
state-of-the-art tools and expertise.
Essential Managed Services
Business Continuity Services
Managed Co-location
Infrastructure as a Service
Copyright © 2013 Alliant-Cay, LLC . All Rights Reserved.
Alliant Managed Services
35 Airport Road
Morristown, New Jersey 07960
P - 973.267.5236
F - 973.267.5237
www.AlliantTech.com/ams
AMS Two-Factor Authentication
Security Services
Flexible 2FA Service deployment options:
For customers with existing RSA Authentication architecture in place, Alliant can
take over administration of existing RSA Authentication Server infrastructure. By
establishing a communication channel with client administrators, Alliant’s service
desk will handle user access problems, execute new token orders as well as manage
replacements, resets and even emergency token shut-off with SLA’s to guarantee
performance. Alliant also has automation tools available to migrate from aging
on-site hardware to a new, automated processing platform, either onsite within the
Client network or into protected redundant data centers“in the cloud.”
For Clients new to two-factor authentication, the Alliant cloud-based solution offers
flexibility in both available token form factors and token authentication platforms.
Both RSA SecurID or SafeNet solutions can be established to work within the
Alliant’s token management procedures for token administration. Alliant’s SafeNet
platform also offers integration with Active Directory for automated One-step token
provisioning and ticket initiation and management within the Service Desk. Our
Service Delivery team will set up a custom web portal for token requests, reporting,
and integration with our Service Desk ticketing system.
(see reverse for deployment options)

Weitere ähnliche Inhalte

Was ist angesagt?

Nedbank expands investment in Microsoft Dynamics CRM
Nedbank expands investment in Microsoft Dynamics CRM Nedbank expands investment in Microsoft Dynamics CRM
Nedbank expands investment in Microsoft Dynamics CRM Mint Group
 
Santam invests in Dynamics CRM to manage their Client Care Centre
Santam invests in Dynamics CRM to manage their Client  Care CentreSantam invests in Dynamics CRM to manage their Client  Care Centre
Santam invests in Dynamics CRM to manage their Client Care CentreMint Group
 
The Digital Insurer Award - Tata AIG (eMarine)
The Digital Insurer Award - Tata AIG (eMarine)The Digital Insurer Award - Tata AIG (eMarine)
The Digital Insurer Award - Tata AIG (eMarine)The Digital Insurer
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet newMichael Wang
 
The Digital Insurer Award - Tata AIG (IPDS)
The Digital Insurer Award - Tata AIG (IPDS)The Digital Insurer Award - Tata AIG (IPDS)
The Digital Insurer Award - Tata AIG (IPDS)The Digital Insurer
 
Neighbium-Apartment Management Application
Neighbium-Apartment Management ApplicationNeighbium-Apartment Management Application
Neighbium-Apartment Management ApplicationNeighbiumSupport
 
Screen INFOmatch presentation 2016
Screen INFOmatch presentation 2016Screen INFOmatch presentation 2016
Screen INFOmatch presentation 2016Ronald Damen
 
VizMan - Visitor Management System
VizMan - Visitor Management SystemVizMan - Visitor Management System
VizMan - Visitor Management SystemAshokBaria
 
Comprehensive Visitor Management System
Comprehensive Visitor Management SystemComprehensive Visitor Management System
Comprehensive Visitor Management SystemSamuel Soon
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate ManagerAnita Benett
 
CMA Brochure
CMA BrochureCMA Brochure
CMA BrochureGabe Pei
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
Alondra | Powering Digital Distribution by everis (Bancassurance)
Alondra | Powering Digital Distribution by everis (Bancassurance)Alondra | Powering Digital Distribution by everis (Bancassurance)
Alondra | Powering Digital Distribution by everis (Bancassurance)everis
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
BOSSDesk Product Paper
BOSSDesk Product PaperBOSSDesk Product Paper
BOSSDesk Product PaperJulie E. Duke
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business ApplicationsLaurie LeBlanc
 

Was ist angesagt? (20)

Nedbank expands investment in Microsoft Dynamics CRM
Nedbank expands investment in Microsoft Dynamics CRM Nedbank expands investment in Microsoft Dynamics CRM
Nedbank expands investment in Microsoft Dynamics CRM
 
Santam invests in Dynamics CRM to manage their Client Care Centre
Santam invests in Dynamics CRM to manage their Client  Care CentreSantam invests in Dynamics CRM to manage their Client  Care Centre
Santam invests in Dynamics CRM to manage their Client Care Centre
 
Prudent vms plus v1.0
Prudent vms plus v1.0Prudent vms plus v1.0
Prudent vms plus v1.0
 
The Digital Insurer Award - Tata AIG (eMarine)
The Digital Insurer Award - Tata AIG (eMarine)The Digital Insurer Award - Tata AIG (eMarine)
The Digital Insurer Award - Tata AIG (eMarine)
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet new
 
Screen INFOmatch
Screen INFOmatchScreen INFOmatch
Screen INFOmatch
 
The Digital Insurer Award - Tata AIG (IPDS)
The Digital Insurer Award - Tata AIG (IPDS)The Digital Insurer Award - Tata AIG (IPDS)
The Digital Insurer Award - Tata AIG (IPDS)
 
Neighbium-Apartment Management Application
Neighbium-Apartment Management ApplicationNeighbium-Apartment Management Application
Neighbium-Apartment Management Application
 
Screen INFOmatch presentation 2016
Screen INFOmatch presentation 2016Screen INFOmatch presentation 2016
Screen INFOmatch presentation 2016
 
VizMan - Visitor Management System
VizMan - Visitor Management SystemVizMan - Visitor Management System
VizMan - Visitor Management System
 
Comprehensive Visitor Management System
Comprehensive Visitor Management SystemComprehensive Visitor Management System
Comprehensive Visitor Management System
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate Manager
 
CA Identity Management
CA Identity ManagementCA Identity Management
CA Identity Management
 
CMA Brochure
CMA BrochureCMA Brochure
CMA Brochure
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Alondra | Powering Digital Distribution by everis (Bancassurance)
Alondra | Powering Digital Distribution by everis (Bancassurance)Alondra | Powering Digital Distribution by everis (Bancassurance)
Alondra | Powering Digital Distribution by everis (Bancassurance)
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
BOSSDesk Product Paper
BOSSDesk Product PaperBOSSDesk Product Paper
BOSSDesk Product Paper
 
Alignia for Business Applications
Alignia for Business ApplicationsAlignia for Business Applications
Alignia for Business Applications
 

Andere mochten auch

Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Zoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docxZoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docxSarah Harrison
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 

Andere mochten auch (6)

Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Hi, neighbor!
Hi, neighbor!Hi, neighbor!
Hi, neighbor!
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Zoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docxZoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docx
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 

Ähnlich wie Ams 2 fa april 2013

App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+AppViewX
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Emmerick Gortz
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xRyanPaul Mandel
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3Pieter Noorlander
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways Array Networks
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutionsyourocs
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationRapidValue
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
CommTRACK Ticketing Platform
CommTRACK Ticketing PlatformCommTRACK Ticketing Platform
CommTRACK Ticketing Platformacuser30
 

Ähnlich wie Ams 2 fa april 2013 (20)

App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
CERT_ver-1.4
CERT_ver-1.4CERT_ver-1.4
CERT_ver-1.4
 
Team9 presentation version 3(1)
Team9 presentation  version 3(1)Team9 presentation  version 3(1)
Team9 presentation version 3(1)
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4x
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
On-Site Computer Solutions
On-Site Computer SolutionsOn-Site Computer Solutions
On-Site Computer Solutions
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
CommTRACK Ticketing Platform
CommTRACK Ticketing PlatformCommTRACK Ticketing Platform
CommTRACK Ticketing Platform
 
ProviDyn at a Glance
ProviDyn at a GlanceProviDyn at a Glance
ProviDyn at a Glance
 

Mehr von Hai Nguyen

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808Hai Nguyen
 

Mehr von Hai Nguyen (20)

Sms based otp
Sms based otpSms based otp
Sms based otp
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
 

Ams 2 fa april 2013

  • 1. Copyright © 2013 Alliant-Cay, LLC . All Rights Reserved. Alliant Managed Services 35 Airport Road Morristown, New Jersey 07960 P - 973.267.5236 F - 973.267.5237 www.AlliantTech.com/ams AMS Two-Factor Authentication Security Services Alliant Technologies’ Managed Two-Factor Authentication (2FA) Service allows clients to outsource the management and administration of with RSA SecurID or SafeNet tokens. Whether you are new to two-factor authentication, or a seasoned user of tokens, AMS has a service option that will increase your security posture while improving platform availability and end-user satisfaction levels while containing cost. Managed Two-Factor Authentication Service Overview • Simple web interface with Active Directory integration • Fulfillment of end user token orders, domestically and internationally, with custom electronic or physical welcome kit • Multiple form factors to suit every user need • 24/7 End User Service Desk for token-related user support • Token inventory reports for IT audits or internal bill-back • Fully managed and secure authentication servers, local or in the cloud Working with leading Authentication providers, Alliant can now offer a hybrid-token architecture for all your users and token types. Smartphone tokens, RSA SecurID tokens, SafeNet tokens and even SMS message “tokens” are co-mingled onto a single authentication platform with Active Directory integration for state-of-the-art authentication options with minimal user impact. Users can add software tokens, change between token form factors, or simply continue to enjoy the peace of mind provided by their existing token authentication, all supported by Alliant’s 24 x 7 Service Desk and automated token deployment procedures. Key Features Unique Cloud-Based Architecture All these architecture options provide an enhanced security posture while minimizing the impact on local IT staff. Alliant’s per-month per user billing also allows users to avoid the capital investment normally associated with 2FA solutions. Let Alliant show you how these options can meet your operational and security goals. (see reverse for deployment options) Alliant Managed Services (AMS) provides a comprehensive suite of IT solutions that maintain client operations with maximum efficiency and minimum downtime. Each of our solutions is tailored to client specifications, powered by best-in-breed technologies, and is supported by our 24x7 Service Desk of certified Level 1 – Level 3 engineers. AMS delivers IT as a finished product, allowing our clients to focus on their core business with the peace of mind that their critical business support functions are installed, operated, and maintained at the highest level using state-of-the-art tools and expertise. Essential Managed Services Business Continuity Services Managed Co-location Infrastructure as a Service
  • 2. Copyright © 2013 Alliant-Cay, LLC . All Rights Reserved. Alliant Managed Services 35 Airport Road Morristown, New Jersey 07960 P - 973.267.5236 F - 973.267.5237 www.AlliantTech.com/ams AMS Two-Factor Authentication Security Services Flexible 2FA Service deployment options: For customers with existing RSA Authentication architecture in place, Alliant can take over administration of existing RSA Authentication Server infrastructure. By establishing a communication channel with client administrators, Alliant’s service desk will handle user access problems, execute new token orders as well as manage replacements, resets and even emergency token shut-off with SLA’s to guarantee performance. Alliant also has automation tools available to migrate from aging on-site hardware to a new, automated processing platform, either onsite within the Client network or into protected redundant data centers“in the cloud.” For Clients new to two-factor authentication, the Alliant cloud-based solution offers flexibility in both available token form factors and token authentication platforms. Both RSA SecurID or SafeNet solutions can be established to work within the Alliant’s token management procedures for token administration. Alliant’s SafeNet platform also offers integration with Active Directory for automated One-step token provisioning and ticket initiation and management within the Service Desk. Our Service Delivery team will set up a custom web portal for token requests, reporting, and integration with our Service Desk ticketing system. (see reverse for deployment options)