i denti wall_3.0_final
TRANSCRIPT
Out-of-the-box thinking
that outpaces
cybercrime
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
• Radius based
• Authenticate users of:
– VPN & SSL-VPN
– Citrix
– Wi-Fi
• Multiple end point support
• Multiple VPNs
• VPN• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Agnostic proxy
• Risk based security
• Anti-Phishing
• User Authentication
• Device Authentication
• Transaction Verification
• Security awareness
• Breach Notification
• Compliance enforcement
• Dual signature
• Password policy
• VPN
• Web• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Virtual Appliance
• Regular installation
• Cloud architecture– IDentiWall SaaS
– Single/multi Tenant
– Realm per:
• organization
• Web server
• Web app
– Distributed administration
• VPN
• Web
• Configuration• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• User Authentication
• Adds physical security layer
• VPN
• Web
• Configuration
• Domain *• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Copied rogue site detection
• Login page personalization
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• FFIEC compliant
• Learning curve mgmt.
• Policy per Page (PPP) inclusion
– Login authentication
– Help desk wait
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Over 150 authentication methods
– Something you know
– Something you have
– Something you are
– Someplace you’ve been
– Someone who knows you
– Something you’ve done
• Password policy management
• Hybrid, Policy-based authentication
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Device fingerprint
• Device reputation
• Device geo-location
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Effective against
Man-in-the-browser
• Policy based, multi method protection
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Notification type– SMS– USSD– Email– Voice
• Notification targets– User– Security team
• Breach can trigger– Password change enforcement– Security awareness content– Breach policy
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
Risk types:
• Location, cross-location
• Content (form, session, account)
• Behavioral
• Context– DHS’s Alert sys.
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Just like on paper cheque
• Better control, better security
• Requires special implementation
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Physical-IT security convergence
• Location based security layer
• Temporal based security layer
• “internal job” prevention
• Demos
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence*• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Forensic based investigations (FBI)
• Semantic web based
• Analytics inference engine
• Session recording & playback
• Multi-source time line
• 12 minutes demo
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation*• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
• Radius– Server & Client– Authentication, accounting, authorization
• LDAP– Server & Client
• SMTP– Server & client
• HTTP/HTTPS– Server & client
• VOIP– IDentiCall– IDentiVoice
• Face 2 face– Browser based HD video conversation– Agnostic, Policy per page (PPP)– IDentiVoice, IDentiFace authentications– Demo
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients• Polite Implementation
• High Availability
• First day ROI
back
• Deployment pace mgmt.
• Automated DBA
• OmniChief watchdog
• Learning curve mgmt.
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation• High Availability
• First day ROI
back
• High throughput
• Workload balancing
• Cassandra
• Hot data replication
• Omnichief watchdog
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability• First day ROI
back
• Virtual appliance installation(~15 min.)
• Configuration wizard(~60 min.)
• Best-practices wizard (~60-120 min.)
• Environment integration wizard(~45 min.)
• Polite implementation (~15 min.)
$999
• VPN
• Web
• Configuration
• Domain
• Anti-Phishing
• Security Awareness
• User Authentication
• Device Authentication
• Transaction Verification
• Breach Notification
• Risk-based Policy
• Dual Signature
• Security convergence
• Digital investigation
• Servers & clients
• Polite Implementation
• High Availability
• First day ROI
back
Resources
• RBC demo
• Mandateway demo
• Dynamic! Security demo
• FBI demo
• Face-2-Face demo Thank you!
www.IDentiWall.com