did you know: trends in rsa securid® two-factor authentication · authentication factor the sdk...

25
1 © Copyright 2011 EMC Corporation. All rights reserved. Did You Know: Trends in RSA SecurID® Two-Factor Authentication Jeff Carpenter, Sr. Product Specialist RSA, The Security Division of EMC

Upload: dodang

Post on 13-Jun-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

1 © Copyright 2011 EMC Corporation. All rights reserved.

Did You Know: Trends in RSA SecurID® Two-Factor Authentication

Jeff Carpenter, Sr. Product Specialist RSA, The Security Division of EMC

Page 2: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

2 © Copyright 2011 EMC Corporation. All rights reserved.

Today: The Evolution of Two-Factor Authentication

• RSA SecurID is Mobile

• RSA SecurID is Enabled by Partnerships

• RSA SecurID is Moving to Contextual and Risk-Based

Page 3: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

3 © Copyright 2011 EMC Corporation. All rights reserved.

RSA SecurID Time-Synchronous Authentication

• Time-based OTP has precise clock that changes password every 60 seconds

• Very hard to phish as OTP becomes invalid in one minute • More secure than an event-based OTP where password does not

expire until another one is entered into the system • Trojan attacks must be in real-time to be able to compromise system

OTP: 159759

Time: 8:35

OTP: 159759

Time: 8:35

Same OTP

Same Time

Authentication Manager

Page 4: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

4 © Copyright 2011 EMC Corporation. All rights reserved.

RSA SecurID is Mobile

Page 5: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

5 © Copyright 2011 EMC Corporation. All rights reserved.

Forrester, August 2011

“…the market will dramatically change course and the emphasis will shift towards building mobile app stores and managing the growing pool of apps and data on a burgeoning array of Smartphones and Tablets.”

Page 6: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

6 © Copyright 2011 EMC Corporation. All rights reserved.

Mobile Application Use Cases Business (or non business) process driven MS Office

a general purpose app For enterprise or consumer use

Cloud Applications

Personal Use Applications

Internal Mobile Applications

Page 7: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

7 © Copyright 2011 EMC Corporation. All rights reserved.

Mobile Apps Redefine Remote Access From Well Defined Remote Access Gateways to App Centric

Well Defined Remote Access Policy

VDI VPN OWA Custom

Custom Custom

SaaS

SaaS

Business Applications

Infrequent, highly secure access Frequent, less controlled mobile access

Page 8: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

8 © Copyright 2011 EMC Corporation. All rights reserved.

Enterprise Mobile Security Challenges Major Security Problems

1. Application Security beyond the standard support of email and calendar

2. Service-driven authentication aligning with continuous remote access

3. Heterogeneous device support

1. Application-focused

2. Independent of traditional remote access

3. Aligned with native device usage across a variety of device types

RSA plans to solve these problems in a manner that is:

Page 9: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

9 © Copyright 2011 EMC Corporation. All rights reserved.

Enterprise Mobile Usability Challenges Balancing user convenience and security for the organization • Provisioning strong

authentication methods such as software tokens to users

• Ongoing support of users with mobile devices

• Requirement to support VPN,

VDI, mobile apps to keep users productive

Page 10: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

10 © Copyright 2011 EMC Corporation. All rights reserved.

Mobile Authentication Strategy Vision

Provide application focused authentication for enterprise

use cases across a variety of device types with

enhanced usability

•Support options of Invisible Authentication

•Additional step up authentication when required

•Easy provisioning of authentication options

Page 11: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

11 © Copyright 2011 EMC Corporation. All rights reserved.

Vision Realized: A Different Approach to Enterprise Authentication

Local

App

RSA SDK

Mobile Device

Consumer Cloud

SecurID

Enterprise Cloud

Trust

Authority

for the

Cloud

Appropriate authentication based on context and risk analytics – SecurID can be leveraged as an additional authentication factor

The SDK may also be leveraged to have direct hooks into CTA for enterprise access from the same device

Internal Mobile Applications

Invisible Authentication

Page 12: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

12 © Copyright 2011 EMC Corporation. All rights reserved.

Mobile Authentication Strategy Two Areas of Focus

• Provide software token apps for the leading Smartphone platforms • Automate provisioning of SW tokens, seamlessly and securely • Securely store the token on the device

SecurID Mobile: Mobile devices as SecurID authenticators

• Ease of integration using RSA SecurID and Adaptive Authentication Mobile SDKs • Strong auth built into the leading remote access applications • Strong auth built into the leading mobile app development frameworks

Mobile Authentication: Market leading strong authentication for mobile apps

Page 13: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

13 © Copyright 2011 EMC Corporation. All rights reserved.

Mobile Authentication Roadmap Highlights

SecurID Mobile: Mobile devices as SecurID Authenticators

• Support for additional devices (Android WiFi Only Devices, Windows Phone) • Seamless and Secure Provisioning of Software Tokens

Mobile Authentication: Market leading strong authentication for mobile apps

• Integrated Software Development Kit (SDK) for mobile apps • SecurID OTP Module - Import software tokens, generate OTP, user visible or invisible OTP • Adaptive Authentication Module - Retrieve device identifiers and location information for risk based

authentication by AA • Transaction Signing

• Enhanced Mobile Risk based Authentication in Adaptive Authentication • Powered by the RSA Risk Engine • Added location awareness and improved device identification for mobile

Page 14: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

14 © Copyright 2011 EMC Corporation. All rights reserved.

SecurID Mobile: iOS, BlackBerry, Android, Symbian, Windows Mobile, Java ME

Page 15: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

15 © Copyright 2011 EMC Corporation. All rights reserved.

RSA SecurID is Enabled by Partnerships

Page 16: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

16 © Copyright 2011 EMC Corporation. All rights reserved.

Extending the RSA Secured Program Integration with the Broadest Range of Enterprise and Cloud-Based Apps

• More than 400 RSA Secured products with native RSA SecurID support

• A growing number of certified solutions for risk-based authentication

• Built into the leading mobile apps (Citrix, VMware, etc.)

• Federation into Cloud-based apps – VMWare Horizon

– Office 365/Azure (ADFS)

– Ping Federate

Visit www.rsa.com/rsasecured/ for a complete list of partner solutions

Page 17: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

17 © Copyright 2011 EMC Corporation. All rights reserved.

Secured by RSA Certified Mobile Partners • Appcelerator

– Embed RSA auth into Titanium mobile application platform

• Citrix – Embed RSA auth into Citrix Receiver and CloudGateway

• FeedHenry – Expose RSA auth from their mobile application PaaS

• Good Technology – Integrate RSA auth into Good Dynamics developer framework

• Juniper Networks – Embed RSA auth into Junos Pulse VPN

• VMware – Embed RSA auth into VMware View

• ZScaler – Integrate RSA auth with ZScaler Secure Web Gateway

Page 18: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

18 © Copyright 2011 EMC Corporation. All rights reserved.

RSA and Citrix

• Jointly announced in October 2011 – Citrix Receiver (free app) – Embedded RSA SecurID software

token

• Authenticates end-users to virtual desktops and virtual applications from iOS and Android devices

• Use case: enterprise users accessing highly sensitive applications

Page 19: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

19 © Copyright 2011 EMC Corporation. All rights reserved.

RSA SecurID is Moving to Contextual and Risk-Based

Page 20: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

20 © Copyright 2011 EMC Corporation. All rights reserved.

The Future: Intelligent Controls Framework

Case Mgmt.

Layered Authentication

Chal

leng

e

Out

-of-b

and

Know

ledg

e

Oth

ers

Activity Details

Policy Mgr. Risk Engine

Behavior Device

Location NetWitness

Threats

Page 21: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

21 © Copyright 2011 EMC Corporation. All rights reserved.

RSA Authentication Manager 8.0 Coming Early 2013

Feature Groups

Virtual Appliance

Troubleshooting & Support

Usability & User Enablement

Core System Enhancements

Enterprise RBA

VIRTUALIZATION

LOWERING THE COST OF ADMINISTRATION

Themes

RISK-BASED AUTHENTICATION

Page 22: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

22 © Copyright 2011 EMC Corporation. All rights reserved.

Risk-Based Authentication How it works

Web Browser

RSA Risk Engine

Device Profile

User Behavior Profile

PASS

FAIL

Protected Resources

PASS

RISKY

Identity Challenge

?

On-Demand Tokencode

Challenge Questions Access Denied

SSL VPN

OWA

SharePoint

Web Portals

Authentication Policy

Assurance Level

Activity Details

Page 23: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

23 © Copyright 2011 EMC Corporation. All rights reserved.

SecurID Mobile Seamless and Secure Provisioning of Software Tokens: Roadmap

• Planned enhancements to improve provisioning • Deployment of CT-KIP in the web-tier • Streamlined administrator flow to provision software tokens

Authentication Manager 8.0

• Integration with leading Mobile Device Management (MDM) systems • Securely provision sw token when user/device is activated by the

enterprise

Integration with MDM systems

Page 24: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

24 © Copyright 2011 EMC Corporation. All rights reserved.

Why RSA SecurID? • RSA has more than 25 years in security industry • Represents over 60% worldwide One Time Password Market • Over 40 million authenticators are protecting resources worldwide

Experience

• Built on AES algorithm • Time synchronous is more secure than event-based

Strength of Security

• Authentication Manager includes redundancy, failover, and other mission critical features

• Tokens are run through a battery of tests to ensure highest quality

Quality & Dependability

• Wide range of authenticators meet current and future needs Breadth of Offerings

• Out-of-the-box integration with over 400 applications Application

Support

• Experienced Professional Services organization to help with special requirements • Technical support available 24 x 7 through RSA Secure Care Online, RSA’s state-of-

the-art e-support system

World Class Service & Support

Page 25: Did You Know: Trends in RSA SecurID® Two-Factor Authentication · authentication factor The SDK may also be leveraged to have ... Did You Know: Trends in RSA SecurID® Two-Factor

25 © Copyright 2011 EMC Corporation. All rights reserved.

THANK YOU