deepnet security general preso v1.1
TRANSCRIPT
Unified Authentication for the Borderless Enterprise
Nicholas Buchanan | Sr. Director of Technology for the AmericasBarry Nester | VP Sales for the Americas
The Enterprise is Transforming• No one “owns” their application
ecosystem• BYOD
• Users bring their own devices (BYOD) to work
• Applications • No longer limited to your data centers, they are in
the cloud, at the “edge”, and on premise
• Users are often not “your” users • Independent Contractors• Partners and Partner Employees• Clients and Customers
Identities are Proliferating
• Organizations maintain multiple user identities with no central point of control
• For example:• An identity in Active Directory or a database• An identity maintained in an SSL certificate • A different identity for each cloud application• Privileged user identities on servers and
internal business applications
Organizations are Struggling
• To remain in compliance• Regulatory compliance is difficult to implement when key controls
require configuring 100’s of applications and controls are updated • No central audit trial• Impossible to truly implement and follow an enterprise security
policy
• To secure sensitive identities• Data breaches are commonplace• Attackers focus on stealing legitimate identities• Sony, Target, The Federal Government, and Blue Cross have been
hacked and many hundred thousands of identities have been stolen
• To remain productive• Users regard any security measure affecting their productivity as
painful • Nobody likes relying on a helpdesk to manage their identity
DualShieldUnified Authentication Platform for the Borderless Enterprise
• Low friction, two and three factor authentication• Step up or always on authentication for high risk logins or sensitive applications• End to end SSO experience from desktop, to VPN, to web
• Policy based, adaptive authentication, & compliance auditing• Enforce policies across all of your applications and allow departments to manage
their own policies
• One platform, one identity, multi-vector protection and a seamless user experience• Local Desktop | Windows, Mac and Linux (SSH)
• Cloud Applications | Office 365, Salesforce, IBM SmartCloud, IBM Bluemix
• Enterprise Applications | Peoplesoft, Oracle eBusiness Suite, IBM Content Manager, Sharepoint, Seibel, SAP
• Remote Desktop | Citrix XenApp, VmWare, 2X, Windows RDP
• VPN | Cisco, Citrix, Juniper, PaltoAlto, and Netmotion
• Microsoft Outlook
DualShieldUnified Authentication Process
Map User Data
Intercept Login
Apply Policy
Authenticate
Radius
Desktop Login
Web Form
SAML
Active DirectoryOracle RDBMS
DB2NetIQ eDirectory
OpenLDAP
Tivoli DirectoryDomino DirectoryMS SQL
SSO SessionCitrix XenDesktopActive Sync
RDP
Login Policy
Group Member
Provisioning
Session PolicyPassword PolicyRisk Policy
OTP
SMS
RSA SecurID
USB Flash Pass
Push to Accept
Yubikey
GridIDVoice Recognition
1
2
3
4
Assert Identity5
Authentication Methods
On-Demand Password SMS, Email, Voice On-Screen Grid Card
Push to Accept iOS Andriod
Biometrics Keystroke Dynamics Facial Recognition Voice Recognition
One-Time Password Hardware or Software Token Yubikey Grid Card
Device DNA Hardware Fingerprint
USB Hardware ID
Smart and Proximity Cards CAC/PIV PKI Smart Card HID Proximity Card
329163
DenyAllow
Unmatched CompatibilityVPN Cisco Anyconnect Juniper Pulse Netmotion XE + Radio IP Citrix
Cloud Applications Office 365 Google Apps Salesforce.com Taleo
Enterprise Applications Peoplesoft + JD Edwards
Oracle eBusiness Suite Sharepoint SAP
Web Platforms IIS + Apache HTTP Server
Oracle Weblogic IBM WebSphere Tomcat + Jboss AS
Desktop Login Windows Mac OSX Linux (SSH)
RDP Citrix XenDeskop, XenApp
VmWare Horizon Remote Desktop
Dedicated to Customer Success
Dedicated to Customer Success
Questions
“Deepnet's customers are well-spread across vertical industries; they also are spread over SMBs and enterprises... Reference customers were extremely satisfied with Deepnet's customer support...”
“DualShield is a complete solution for strong user authentication that is extremely user-friendly, cost-effective and easy to integrate into a customer's existing IT infrastructure. For the price point, functionality provided and security management capabilities of this product, it is a great option for a multifactor authentication solution on one's network.”
“9.5/10”