2. 2
Welcome to the Webinar
Presented by TeleSign and SecureAuth Corporation
Michael Costigan, TeleSign
Director of Business Development
Bryan Semprie, SecureAuth Corporation
Sr. Sales Engineer - Channels
Garret Grajek, SecureAuth Corporation
Co-Founder and CTO/COO
• All attendee audio lines are muted
• Questions will be answered at the end of the session
• Submit brief questions on the Q&A panel
• Send longer questions or off-line topics via email to
webinar@secureauth.com
3. TeleSign the Enterprise
Security Breaches and Ramifications
Telesign Solutions
SecureAuth IdP and TeleSign
2-Factor to Resources
Password Reset
Demo
Integration/Deployment
Q&A
WEBINAR AGENDA
5. 5
April 2013 Major Daily Deal Site Hacked
• 50 Million users affected
• Many subscribers did not return
• Had plans for profitability in 2013
• Instead, reported 81 M loss
• CEO and founder steps down 8 months later
Customer
Benefits
• Safe PII
• Secure Self
Service
Password Reset
• Customer
Experience
Source: Washington Post
6. 6
How Apple and Amazon
Security Flaws Led to
My Epic Hacking.
Mat Honan
“If I had used two-factor
authentication for
Gmail, everything would have
stopped here.”
~ Mat Honan
Same Passwords Used Across Multiple
Accounts
Mail Social Media e-Commerce Online Banking
Complex Password
Requirements
Passwords cannot contain last
name, username, email
address, common words or names.
* * * * * * * *_
The problem with passwords.
8. 8
Website determines if device is trusted. Changes in these factors can
trigger re-verification.
21 43 5
New Device New Browser Time Since Last
Verification
New
Location
ACCOUNT PROTECTION
9. 9
User logs into account with their credentials. If login is from trusted
device, verification is not triggered.
21 43 5
ACCOUNT PROTECTION
10. 10
If triggered, a verification code is sent to the phone number or mobile app.
21 43 5
SMS Voice
ACCOUNT PROTECTION
11. 11
User enters verification code into website to login or accepts push challenge.
21 43 5
ACCOUNT PROTECTION
15. 15
Secure Resource Control
SecureAuth Integration with TeleSign
1. 2-Factor to Resources
Web, Cloud, Network, Mobile Apps
Multiple Directories, AD Forest
2. Password Reset
No Coding
No Web Modules
No Customization
16. 16
1. Integrated Into All Enterprise Resources
Objectives
Provide 2-Factor Security
To all resources
Web, Cloud, Network and Mobile
Admins:
Provide drop-down integration (for 2F workflow)
No application integration
Users:
Provide easy browser based walk-through
Mobile and Desktop
17. (1)
(2)
(4)
SecureAuth IdP Integrates TeleSign 2-Factor
Auth into all Enterprise Resources
2-Factor for All
Resources
1. Web
2. VPNs
3. Cloud
4. Mobile
(3)
18. 18
Retain Credentials in the Enterprise
Control Access by Secureauth IdP
Conduct “Risk-based” Authentication
2-Factor Outside – SSO Indside
Language Adjusted to Browser/Device
Strong 2-Factor Up front
SSO on subsequent auths
TeleSign and Secureauth:
Integrated Into All Enterprise Resources
19. 19
2. Password Reset
Objectives
Provide 2-Factor Password reset
To all datastores:
AD, Multiple Ads, LDAP, SQL, ODBC
Admins:
Provide drop-down - 2F workflow
No application integration (pre-built page)
Users:
Provide easy browser based walk-through
Mobile and Desktop
20. 20
2. Password Reset
SecureAuth connects
to native data store
No Synching of PII/PHI
(No Snapchat 3.5M
hack)
Full browser-based
workflow
Matches Enterprise
Password Polices
22. Benefits
Extreme Ease of Use for Users
All devices (Mobile, Desktop)
All locales (US, International)
22
The SecureAuth/TeleSign Integration Enables:
Enterprise Control
Utilize Existing Entities
AD, LDAP, SQL, etc.
No Synching or User Migration
2-Factor Authentication
To Enterprise Controlled Resources
Web, Network, Cloud and Mobile
23. 23
Who Title E-mail Phone
Mike
Costigan
Director of Business
Development
mcostigan@telesign.com
+1.310.742.8207
Bryan
Semprie
Sr. Channels
Engineer
bsemprie@secureauth.com +1.860.383.5907
Garret
Grajek
CTO/COO ggrajek@secureauth.com +1.949.777.6970
SecureAuth
Sales
Sales sales@secureauth.com +1.949.777.6959
Contacts and Q&A
http://www.telesign.com
http://www.SecureAuth.com
Thank you!
Sales Excellence Talk Track: Personal Introductions
CrownPeak is easy to use. The system was built for the non technical user to easily add and change content using simple word based eidtor.Content can also be easily shared between other applications like SharePoint or repurposed for mobile devices. You can also collect content from mashables or social media and use it on your site.Application Integration is one of the biggest challenge to build and maintain. CrownPeak offers the most interoperable system in the market today. Our open API can be used to connect we any given system and once live the integration becomes a part of the application and is maintained by CrownPeak for the life of the contract.
Sales Excellence Talk Track: Over the past 8 years we’ve seen the problems with passwords. For example, users out of convenience leverage the same passwords across multiple applications. Also, many accounts are linked and therefore provide hackers with an easy way to compromise accounts. You may have even heard about the epic hacking of WIRED Magazine’s very own Mat Honan. After everything that happened to Mat, he believes if he had used 2FA, everything would have been prevented.
CrownPeak is easy to use. The system was built for the non technical user to easily add and change content using simple word based eidtor.Content can also be easily shared between other applications like SharePoint or repurposed for mobile devices. You can also collect content from mashables or social media and use it on your site.Application Integration is one of the biggest challenge to build and maintain. CrownPeak offers the most interoperable system in the market today. Our open API can be used to connect we any given system and once live the integration becomes a part of the application and is maintained by CrownPeak for the life of the contract.
CrownPeak is easy to use. The system was built for the non technical user to easily add and change content using simple word based eidtor.Content can also be easily shared between other applications like SharePoint or repurposed for mobile devices. You can also collect content from mashables or social media and use it on your site.Application Integration is one of the biggest challenge to build and maintain. CrownPeak offers the most interoperable system in the market today. Our open API can be used to connect we any given system and once live the integration becomes a part of the application and is maintained by CrownPeak for the life of the contract.