Your SlideShare is downloading. ×

Addressing Password Creep

1,093

Published on

This slide presentation provides an overview of the challenges of password creep and the solutions to solve these issues.

This slide presentation provides an overview of the challenges of password creep and the solutions to solve these issues.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,093
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Easy for you
  • Easy ComplianceThe Department of Justice created a great slide deck at the tenth annual CIB Technology Conference which breaks down the CJIS requirements
  • Easy ComplianceThe Department of Justice created a great slide deck at the tenth annual CIB Technology Conference which breaks down the CJIS requirements
  • What do you do with encryption when they forget and they are in the field?
  • Strong Security, but easier on you and your users, no loss in productivity
  • Strong Security, but easier on you and your users, no loss in productivity
  • Advantages: simpler and better value-for-moneyEasier and less expensive to manage and maintain – e.g. at least 30% TCO savings vs. combining several “point” solutionsImproved overall performance thanks to integration across applications – e.g. no incompatibility, security policies are always sync’dImproved user adoption and lower support costs – e.g. saving just one support call per user may pay back the cost of the software
  • Advantages: simpler and better value-for-moneyEasier and less expensive to manage and maintain – e.g. at least 30% TCO savings vs. combining several “point” solutionsImproved overall performance thanks to integration across applications – e.g. no incompatibility, security policies are always sync’dImproved user adoption and lower support costs – e.g. saving just one support call per user may pay back the cost of the software
  • Transcript

    • 1. Addressing Password Creep withDigitalPersona Pro
      Jim FultonVice President, DigitalPersona
    • 2. Best-in-class centrally-managed solutions
      Over 95M users worldwide use DigitalPersona technology
      Award-winning products
      SC Magazine, 5-Star Best Buy, 2008 and 2009
      Frost & Sullivan, Global Product Differentiation Innovation, 2007
      CRN, Emerging Tech Vendor, 2007
      Info Security Product Guide, Best Deployment Scenario, 2006
      Microsoft Innovations, 2004
      HP partner for Endpoint Protection software
      Delivering centrally-managed security for SMBs and Enterprises
      Global company, headquartered in Silicon Valley, USA
      Founded in 1997; operations in Americas, EMEA and Asia
      Who is DigitalPersona
    • 3. DigitalPersona – A Leader In Security
      Government
      Retail/POS
      Healthcare
      Energy
      Education
      Financial Services
      OEMs
    • 4. Where is Password Creep Coming From
      Password Mandates
      • Password policies vary widely by application
      Application Enforcement
      • Users getting prompted to manage many more passwords
      User Errors/Confusion
    • 5. Where is Password Creep Coming From
      Password Mandates
      • Password policies vary widely by application
      Application Enforcement
      • Users getting prompted to manage many more passwords
      User Errors/Confusion
      Rising Helpdesk Costs + Uncertain Compliance
    • 6. This Problem Takes Many Forms
      Access Management
      Secure logon and authentication for networks and applications
      Data Protection
      Encryption for computers and data at rest
      Secure Communications
      Digital signature and secure file sharing
    • 7. Managing Many Security Systems is Challenging
      Manage
      Manage
      Manage
      Manage
      Manage
      SecureEmail &Documents
      Full DiskEncryption
      SecureVPN
      SingleSign-On(SSO)
      Smartcards,Tokens,Biometrics
    • 8. Managing Many Security Systems is Challenging
      Manage
      Manage
      Manage
      Manage
      Manage
      Different products don’t fit together
      • Expensive, redundant
      • 9. Complex for IT & users
      SecureEmail &Documents
      Full DiskEncryption
      SecureVPN
      SingleSign-On(SSO)
      Smartcards,Tokens,Biometrics
    • 10. Central Management is the Solution
      ControlAccess
      ProtectData
      Businesses can nowcentrally managesecurity policies throughDigitalPersona Pro
      Manage
      Secure Communications
      All-in-one Endpoint ProtectionStrong|Easy to Manage|Affordable
    • 11. Solutions Powered by DigitalPersona Pro
      Data Protection
      Access Recovery
      Encrypt customer data and IP
      Recover access to locked computers
      Remote Access Security
      Single Sign-On
      Multi-factor VPN authentication
      Eliminate password burdens/costs
      Strong Authentication
      Compliance
      Know who did what, where
      Implement strong controls
      Secure Communications
      Fast access
      Digital signature and encryptionfor email and shared files
      Improve productivity for shared PCs
    • 12. Example: Addressing CJIS for Government Agencies
      CJIS requires advanced authentication
      • Passwords must be at least 8 characters
      • 13. 2-Factor Authentication
      CJIS mandates data encryption
    • 14. Example: Addressing CJIS for Government Agencies
      DigitalPersona Pro simplifies strong passwords
      Eliminate password reset burdens on helpdesk – fast ROI
      Prevent sharing of passwords, social engineering attacks
      Enables strong authentication
      Fingerprints, smart cards, face
      Windows, Web, Citrix, VPNs, legacy apps
      Enables disk and file encryption
      CJIS requires advanced authentication
      • Passwords must be at least 8 characters
      • 15. 2-Factor Authentication
      CJIS mandates data encryption
      my$trongP@ssw0rd!
    • 16. How Strong Passwords Are Made Simple
    • 17. DigitalPersona Pro Gives IT Control Over Authentication
    • 18. DigitalPersona Pro Enters Passwords for the User
      myusername
      ********
    • 19. Strong Security Becomes Simple
      And the user is logged in!
      myusername
      ********
    • 20. Example: Preventing Disasters
      What do you do when users run into problems?
      Forgotten passwords
      Lost smartcards
      Damaged hardware
      COMPANYNETBob_Smith
    • 21. DigitalPersona Pro Access Recovery
      Administrators can give users an unlock code – even when users are on the road
    • 22. DigitalPersona Pro Access Recovery
      Administrators can give users an unlock code – even when users are on the road
      COMPANYNETBob_Smith
      Prevent Lockouts
    • 23. Manageability – keep control across all PCs
      • Enforce policies and recover from problems – from one console
      Security – make strong protection easy
      • Simplify strong authentication for multiple applications
      • 24. Encrypt data without fear of data loss
      Compliance – know who does what
      • Implement controls to show “due care,” boost accountability
      • 25. Show compliance with comprehensive audit logs
      Efficiency – streamline processes, save money
      • Reduce costs/downtime from forgotten passwords or damaged PCs
      DigitalPersona Pro
    • 26. Q & A
      Manageability – keep control across all PCs
      • Enforcepolicies and recover from problems – from one console
      Security – make strong protection easy
      • Simplify strong authentication for multiple applications
      • 27. Encrypt data without fear of data loss
      Compliance – know who does what
      • Implement controls to show “due care,” boost accountability
      • 28. Show compliance with comprehensive audit logs
      Efficiency – streamline processes, save money
      • Reduce costs/downtime from forgotten passwords or damaged PCs
      www.digitalpersona.com/enterprise

    ×