i denti wall_3.0_final

21
Layered Security By Made4Biz Inc. www.identiwall.com

Upload: ilan-meller

Post on 18-Jul-2015

69 views

Category:

Technology


0 download

TRANSCRIPT

Layered Security

By

Made4Biz Inc.

www.identiwall.com

Out-of-the-box thinking

that outpaces

cybercrime

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

• Radius based

• Authenticate users of:

– VPN & SSL-VPN

– Citrix

– Wi-Fi

• Multiple end point support

• Multiple VPNs

• VPN• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Agnostic proxy

• Risk based security

• Anti-Phishing

• User Authentication

• Device Authentication

• Transaction Verification

• Security awareness

• Breach Notification

• Compliance enforcement

• Dual signature

• Password policy

• VPN

• Web• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Virtual Appliance

• Regular installation

• Cloud architecture– IDentiWall SaaS

– Single/multi Tenant

– Realm per:

• organization

• Web server

• Web app

– Distributed administration

• VPN

• Web

• Configuration• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• User Authentication

• Adds physical security layer

• VPN

• Web

• Configuration

• Domain *• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Copied rogue site detection

• Login page personalization

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• FFIEC compliant

• Learning curve mgmt.

• Policy per Page (PPP) inclusion

– Login authentication

– Help desk wait

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Over 150 authentication methods

– Something you know

– Something you have

– Something you are

– Someplace you’ve been

– Someone who knows you

– Something you’ve done

• Password policy management

• Hybrid, Policy-based authentication

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Device fingerprint

• Device reputation

• Device geo-location

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Effective against

Man-in-the-browser

• Policy based, multi method protection

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Notification type– SMS– USSD– Email– Voice

• Notification targets– User– Security team

• Breach can trigger– Password change enforcement– Security awareness content– Breach policy

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

Risk types:

• Location, cross-location

• Content (form, session, account)

• Behavioral

• Context– DHS’s Alert sys.

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Just like on paper cheque

• Better control, better security

• Requires special implementation

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Physical-IT security convergence

• Location based security layer

• Temporal based security layer

• “internal job” prevention

• Demos

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence*• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Forensic based investigations (FBI)

• Semantic web based

• Analytics inference engine

• Session recording & playback

• Multi-source time line

• 12 minutes demo

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation*• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

• Radius– Server & Client– Authentication, accounting, authorization

• LDAP– Server & Client

• SMTP– Server & client

• HTTP/HTTPS– Server & client

• VOIP– IDentiCall– IDentiVoice

• Face 2 face– Browser based HD video conversation– Agnostic, Policy per page (PPP)– IDentiVoice, IDentiFace authentications– Demo

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients• Polite Implementation

• High Availability

• First day ROI

back

• Deployment pace mgmt.

• Automated DBA

• OmniChief watchdog

• Learning curve mgmt.

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation• High Availability

• First day ROI

back

• High throughput

• Workload balancing

• Cassandra

• Hot data replication

• Omnichief watchdog

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability• First day ROI

back

• Virtual appliance installation(~15 min.)

• Configuration wizard(~60 min.)

• Best-practices wizard (~60-120 min.)

• Environment integration wizard(~45 min.)

• Polite implementation (~15 min.)

$999

• VPN

• Web

• Configuration

• Domain

• Anti-Phishing

• Security Awareness

• User Authentication

• Device Authentication

• Transaction Verification

• Breach Notification

• Risk-based Policy

• Dual Signature

• Security convergence

• Digital investigation

• Servers & clients

• Polite Implementation

• High Availability

• First day ROI

back

Resources

• RBC demo

• Mandateway demo

• Dynamic! Security demo

• FBI demo

• Face-2-Face demo Thank you!

www.IDentiWall.com