Published on

Identity Management, IAM, Web Identities , SSO , GoSecureAuth

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • June 29, 2005
  • Stronger adoption of cloud
  • With the advent of SaaS apps like salesforce, successfactors and google apps, are complicating that challenge for enterprises. And of course, in 2011, just about all of us have one of these a mobile device. And we all harbor the expectation that from this device, we should be able to access everything we can from the office or from my laptop. The real challenge is that not all applications are the same, they don ’t all reside in the same place and they don’t all have the same level of access or security. How to then manage an ever-expanding, diverse environment?
  • USE SecureAuth!! It is the world ’s only Identity Enforcement Platform. SecureAuth shifts the focus to the identities and the data you own. It is the only product in the market that can take the identities you already own and enforce them in whatever way you choose, whether you need those identities to have strong 2-factor authentication to one application, or SSO to a different application. The platform grants you the different levels of configurations you need to deliver SSO, Access managerment, User management and strong authentication
  • SecureAuth is an appliance-based solution
  • We believe that if you ’ve logged in once, why should you log in again. I don’t want to have to remember 6 passwords, I just want one. But the idea is to do it securely. Only product to give you 2-factor SSO as well as internal SSO so that when I come into the office in the morning, I turn on my computer, sign-on and I have access to all my apps.
  • Because we integrate with your enterprise directory, we ’re going to give you tools to easily manage those identities. Provision and de-provision users in a simple way using SecureaUth, and off-load much of the management to your end-users. Most popular is the self-service password reset.
  • Gosecureauth2011

    1. 1. SecureAuth IEP May 2011 Greg Hanchin, Trusted Security Advisor – GTRI.com
    2. 2. <ul><li>SecureAuth Company Overview </li></ul><ul><li>About SecureAuth IEP </li></ul><ul><li>Demo of Authentication and SSO </li></ul><ul><li>Questions </li></ul>Agenda
    3. 3. Company Overview <ul><li>Company </li></ul><ul><ul><li>Privately held software company focused on providing identity enforcement solutions </li></ul></ul><ul><li>Continued Sales Momentum </li></ul><ul><ul><li>Accelerating revenue – 300%growth </li></ul></ul><ul><ul><li>Q4 2010 the best quarter in company history </li></ul></ul><ul><ul><li>Competitive wins against RSA, Ping Identity , and more </li></ul></ul><ul><li>Customer Expansion </li></ul><ul><ul><li>Doubled the number of new customers from prior year </li></ul></ul><ul><ul><li>Marquee accounts in North America, EMEA, Asia Pacific and Latin America </li></ul></ul><ul><li>Accelerated Channel and Technology partners Growth </li></ul><ul><ul><li>Partner network that includes technology and channel partners around the world </li></ul></ul>
    4. 4. <ul><li>SecureAuth Management </li></ul><ul><li>Craig Lund, CEO & Co-founder </li></ul><ul><ul><li>WW Security Management, IBM </li></ul></ul><ul><ul><li>VP Sales, Netegrity </li></ul></ul><ul><ul><li>Sales and sales management positions at Dassault Systems, Intelligent Environments, Prime Computer and Digital Equipment Corporation </li></ul></ul><ul><li>Garret Grajek, CTO & Co-founder </li></ul><ul><ul><li>Leadership positions in consumer and network security at IBM and Cisco </li></ul></ul><ul><ul><li>Western region lead field engineer for RSA Security </li></ul></ul><ul><ul><li>Pioneer in internet access control technology at Netegrity </li></ul></ul><ul><li>Thomas Stewart, CFO/VP Business Development </li></ul><ul><ul><li>Senior positions in finance and marketing at Intel </li></ul></ul><ul><ul><li>Product manager, FutureLink, a pioneer in the development of the application service provider ASP) concept </li></ul></ul>Company Overview <ul><li>Board of Directors </li></ul><ul><li>Allen Miner </li></ul><ul><ul><li>Founder, Chairman and CEO of SunBridge Partners </li></ul></ul><ul><li>Craig Lund, Chairman and CEO </li></ul><ul><li>Garret Grajek, CTO </li></ul><ul><li>Thomas Stewart, CFO </li></ul><ul><li>Advisory Board </li></ul><ul><li>Erik Zimmer </li></ul><ul><ul><li>Director, Head of Portfolio Company Services , Lake Capital </li></ul></ul><ul><li>Jeff Williams </li></ul><ul><ul><li>Vice President of Sales & Business Development, FireEye, Inc. </li></ul></ul><ul><ul><li>R. Bruce Stewart </li></ul></ul><ul><ul><li>Founder, & Executive Chairman of Arrowhead Research , Founder Acacia Research </li></ul></ul><ul><ul><li>Matt Kestian </li></ul></ul><ul><ul><li>Technical Director Microsoft Technology Team and Technology Center, Microsoft </li></ul></ul><ul><ul><li>Jeff Dickerson </li></ul></ul><ul><ul><li>Chief Executive Officer, Sonian, Inc. </li></ul></ul><ul><ul><li>Edward Jackowiak </li></ul></ul><ul><ul><li>Vice President, WW Security Sales for Oracle </li></ul></ul>Management Team
    5. 5. Business & Technology Drivers
    6. 6. What is SecureAuth IEP? <ul><li>SecureAuth IEP is a paradigm shift in identity enforcement </li></ul><ul><li>Secures and simplifies access to all cloud, on-premise applications, VPN resources, and mobile devices </li></ul><ul><li>Integrates authentication, SSO, and IdM services </li></ul>
    7. 7. <ul><li>Central IT or SecureAuth IEP </li></ul><ul><li>Hosted WebServices: </li></ul><ul><li>Certificate Authority </li></ul><ul><li>Telephony OTP </li></ul><ul><li>Text SMS Messaging </li></ul>SecureAuth IEP: Technical Architecture
    8. 8. SecureAuth IEP All-in-one Identity Enforcement Platform <ul><li>Comprehensive Coverage </li></ul><ul><li>Cloud Applications </li></ul><ul><li>On-premise Applications </li></ul><ul><li>VPN Resources </li></ul><ul><li>Mobile Platforms </li></ul><ul><li>SecureAuth IEP Services </li></ul><ul><li>Authentication Services </li></ul><ul><li>SSO Services </li></ul><ul><li>IdM Services </li></ul>
    9. 9. <ul><ul><ul><li>In House Applications </li></ul></ul></ul><ul><ul><ul><li>Network Resources </li></ul></ul></ul><ul><ul><ul><li>Outsourced Applications </li></ul></ul></ul>IT Challenges
    10. 10. SecureAuth IEP Authentication Services <ul><li>Comprehensive  Authentication Services Increase Security for On-premise and Cloud Applications </li></ul><ul><ul><li>Mutually authenticates both the user and the corresponding resource  to prevent phishing and password attacks </li></ul></ul><ul><ul><li>Unique browser based digital certificate eliminates application integration, installation, and management of client software </li></ul></ul><ul><ul><li>Strong authentication native to SSO without third party integration </li></ul></ul><ul><ul><li>Mix and match 2-Factor Authentication and SSO runs simultaneously across multiple applications on-premise or in the cloud </li></ul></ul><ul><ul><li>No hardware tokens to be managed, lost or stolen </li></ul></ul>
    11. 11. SecureAuth IEP SSO Services <ul><li>Integrated SSO Services increase user productivity and reduce deployment burden on IT </li></ul><ul><ul><li>Extends Desktop log-on to the cloud providing secure, transparent access to Google Apps, Salesforce CRM, ADP, and other applications </li></ul></ul><ul><ul><li>100% integrated SSO with 2-factor authentication; or configurable as standalone </li></ul></ul><ul><ul><li>“ SAML Services in a Box”; automate SAML  1.1, 2.0, OpenID, etc. assertions </li></ul></ul><ul><ul><li>Automatically converts directory identities into application identities </li></ul></ul>
    12. 12. SecureAuth IdM Services <ul><li>Built-in IdM Services decrease administrative overhead and reduce help desk costs </li></ul><ul><ul><li>Ensures access anytime from anywhere and reduce calls to your help desk by enabling users to manage/reset their own password </li></ul></ul><ul><ul><li>Supports user self enrollment based on configurable verification methods to meet user and IT requirements </li></ul></ul><ul><ul><li>Fully integrated into Active Directory and other data stores means no data synching or yet another directory to maintain </li></ul></ul><ul><ul><li>Enforces authorization based on your RBAC policies for users and administrators </li></ul></ul>
    13. 13. SecureAuth IEP Version 6.0 Raising the Competitive Bar (again!) <ul><li>Mobile platform support </li></ul><ul><li>Expanded cloud coverage </li></ul><ul><li>Multi-tenancy architecture </li></ul><ul><li>Enhanced management and deployment functions </li></ul>
    14. 14. 2-Factor Authentication for Remote Access from Mobile Platforms <ul><li>Revolutionizing strong authentication for Android and iPhones/iPads </li></ul><ul><ul><li>1-touch access to web and cloud applications </li></ul></ul><ul><ul><li>Down-loadable SecureAuth application enables simple, secure set up for strong authentication </li></ul></ul><ul><ul><li>Easily deployed stay-resident x.509 certificate </li></ul></ul><ul><ul><li>1-touch certificate revocation </li></ul></ul><ul><li>2-Factor authentication from the mobile platform back to VPN,  on-premise web, and cloud applications </li></ul><ul><ul><li>iPhone/iPad, Android, Blackberry, Windows Phone 7, Symbian and more </li></ul></ul><ul><ul><ul><li>End -user self enrollment </li></ul></ul></ul><ul><ul><ul><li>Configurable validation options including stay resident </li></ul></ul></ul><ul><ul><ul><li>Authenticates the mobile user to the on-premise data store, including Active Directory </li></ul></ul></ul><ul><ul><ul><li>Deliver VPN certs for Juniper and Cisco clients </li></ul></ul></ul>
    15. 15. Expanded Cloud Coverage <ul><li>Amazon EC2 support to meet market demand </li></ul><ul><ul><li>Deploy SecureAuth IEP on Amazon EC2 platform </li></ul></ul><ul><ul><li>And/or implement SSO and authentication for Amazon hosted applications </li></ul></ul><ul><ul><li>Intelligent SSO ensures the right level of authentication </li></ul></ul><ul><ul><li>Leverages existing Desktop (domain) authentication and/or enforces web –based strong authentication </li></ul></ul><ul><li>New preconfigured cloud applications make it easier to deploy </li></ul><ul><ul><li>SuccessFactors </li></ul></ul><ul><ul><li>Concur </li></ul></ul><ul><ul><li>ADP </li></ul></ul><ul><ul><li>Microsoft Live@edu </li></ul></ul>
    16. 16. SecureAuth Multi-tenancy Architecture <ul><li>Enable unlimited web|VPN|SaaS applications or resources from a single SecureAuth Appliance </li></ul><ul><li>Enterprise Multi-tenant: within an organization to support diverse requirements of departments/business units, etc. </li></ul><ul><li>SaaS Multi-tenant: across organizations to support SaaS model </li></ul><ul><li>More scalable </li></ul><ul><ul><li>Multi-tenant infrastructure makes it easy to increase capacity when more horsepower is required (often delaying the purchase of new hardware) </li></ul></ul><ul><li>Better service </li></ul><ul><ul><li>Monitor and administer just one platform to deliver more efficient and effective service and support, including troubleshooting and problem resolution </li></ul></ul>
    17. 17. Enhanced Management and Deployment Functions <ul><li>Configure don ’t code </li></ul><ul><ul><li>SAML In a Box eliminates APIs </li></ul></ul><ul><ul><li>Enhanced federated identity support </li></ul></ul><ul><ul><li>Dial authentication options up or down to meet security requirements </li></ul></ul><ul><li>Enhanced user experience </li></ul><ul><ul><li>Internationalization of user verification interface </li></ul></ul>
    18. 18. Competitive Landscape Caution, Caveats Takes Work Yes - Supported No – Not Supported
    19. 19. 1100+ Customers Hundreds of Customers and Growing! Mentor Graphics Case Study www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/case_study_c36-558857.html
    20. 20. Case Study <ul><li>Dish Network </li></ul><ul><ul><li>Remote Access for vendors who install Dishes </li></ul></ul><ul><ul><li>Other need arose with their internally hosted web-applications </li></ul></ul><ul><ul><li>SSO requirements combined with 2-factor for all vendor and internal apps. </li></ul></ul><ul><li>Key IT Challenge </li></ul><ul><li>“ Finding a solution that can deliver what we need now and other needs that we foresee; and still other needs that we don’t foresee.” </li></ul>
    21. 21. Key Requirements <ul><li>No tokens or additional software needed </li></ul><ul><li>Auto-enrollment for end users </li></ul><ul><li>No additional data store needed </li></ul><ul><li>Simple for IT to expire certificates </li></ul><ul><li>Full X.509 bi-directional authentication </li></ul><ul><li>Fully branded logon interface </li></ul>“ Tokens worked well from a security standpoint, but our health care workers didn’t like them at all. They had to keep track of them; they often lost or damaged them, and it seemed like they would go missing at the worst possible times, preventing our employees from doing their jobs” Manager of Information Security, Carolinas HealthCare System
    22. 22. Other Key Benefits <ul><li>Evaluation, proof-of-concept, and deployment completed in less than 30 days </li></ul><ul><li>No APIs required </li></ul><ul><li>Full protection from Man-in-the-Middle replay attacks </li></ul><ul><li>Protection against phishing </li></ul><ul><li>Price point and end user ease of use comparable to that of user name and password </li></ul><ul><li>$782,000 c ost savings over 4 years at the current growth rate including: </li></ul><ul><ul><li>Costs related to growth </li></ul></ul><ul><ul><li>Hardware replacement </li></ul></ul><ul><ul><li>Software maintenance </li></ul></ul><ul><ul><li>Labor to manage and distribute hard tokens internally </li></ul></ul>
    23. 23. Strong Partner Network &quot;SecureAuth is an important component of our cloud security strategy and by partnering with them our customers gain access to some of the world's most advanced technology to protect their cloud, web and VPN resources from unauthorized access and the misuse of portable identities, ” said Gary Fish, FishNet Security president and CEO. “In one solution, SecureAuth’s identity management and enforcement platform enhances our ability to secure and simplify remote access for our client’s applications on-premise and in the cloud.&quot;
    24. 24. Summary (for enterprise) <ul><li>Three products for less than the price of one! </li></ul><ul><li>Reduces the risk of unauthorized access, phishing and password attacks, and misuse of portable identities </li></ul><ul><li>Increases user productivity </li></ul><ul><li>Rapid deployment; 100% configurable with no integration </li></ul><ul><li>Increases compliance/audit pass rates </li></ul>SecureAuth IEP: Unprecedented value for on-premise and cloud applications, VPN resources, and mobile devices
    25. 25. Summary (for Reseller) <ul><li>Three products for less than the price of one equals great margins! </li></ul><ul><li>Land and expand strategy gets you in the door quickly (~60 days); creates a great upsell opportunity for other projects </li></ul><ul><li>POC doesn ’t require onsite resources and the SecureAuth team will work with you every step of the way </li></ul><ul><li>Great customers references available </li></ul>SecureAuth IEP: Unprecedented value for on-premise and cloud applications, VPN resources, and mobile devices
    26. 26. CORAID: Redefining Storage Economics Confidential Analyst Presentation - January 2010 Questions