SlideShare a Scribd company logo
1 of 4
Download to read offline
Adaptive	
  Security	
  Manager™	
  
	
  	
  	
  	
  	
  	
  Copyright	
  ©2016	
  aPersona,	
  Inc.	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  www.apersona.com	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Patent	
  Pending	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  v8	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
I	
  
	
  
	
  
	
  
	
  
	
   	
  
Adaptive	
  Security	
  Manager™	
  
	
  	
  	
  	
  	
  	
  Copyright	
  ©2016	
  aPersona,	
  Inc.	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  www.apersona.com	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Patent	
  Pending	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  v8	
  
	
  
Industry	
  Authentication	
  &	
  Risk	
  
The	
  aPersona	
  Adaptive	
  Security	
  Manager™	
  (ASM™)	
  delivers	
  strong	
  authentication	
  with	
  a	
  revolutionary,	
  future	
  proof,	
  adaptive	
  multi	
  
factor	
  technology	
  that	
  addresses	
  the	
  need	
  to	
  protect	
  millions	
  of	
  currently	
  unsecure	
  logins	
  and	
  application	
  access	
  users.	
  aPersona	
  
accomplishes	
  this	
  thru	
  patent-­‐pending,	
  adaptive,	
  behavioral	
  recognition	
  technology	
  providing	
  the	
  lowest	
  total	
  cost	
  of	
  ownership	
  
while	
  invisibly	
  and	
  reliably	
  protecting	
  vulnerable	
  credentials	
  from	
  fraud	
  and	
  misuse.	
  
Truly	
  Adaptive	
  Technology	
  Powered	
  by	
  Real	
  Intelligence	
  
Patent-­‐Pending	
  Patterns	
  of	
  Behavior	
  Authentication	
  –	
  Every	
  user	
  has	
  his	
  or	
  her	
  own	
  unique	
  Patterns	
  of	
  Behavior	
  in	
  
cyberspace.	
  aPersona’s	
  patent-­‐pending	
  adaptive	
  multi-­‐factor	
  authentication	
  platform	
  learns	
  these	
  Patterns	
  of	
  Behavior	
  
(PoB)	
  and	
  gathers	
  forensics	
  for	
  reliable	
  and	
  efficient	
  authentication	
  for	
  any	
  type	
  of	
  transaction.	
  These	
  individual	
  PoBs	
  
provide	
  strong	
  assurance	
  for	
  invisible	
  multi-­‐factor	
  authentication,	
  and	
  meet	
  the	
  standards	
  for	
  NIST	
  FICAM	
  Trust	
  Criteria	
  
Level	
  3.	
  
	
  
Truly	
  Adaptive	
  for	
  a	
  Frictionless	
  User	
  Experience	
  –	
  Adaptive	
  Security	
  Manager™	
  is	
  always	
  learning	
  and	
  evolving	
  the	
  
digital	
   behavior	
   of	
   each	
   user	
   as	
   they	
   change	
   devices,	
   networks,	
   and	
   the	
   way	
   they	
   interact	
   with	
   online	
   and	
   mobile	
  
applications.	
  Rather	
  than	
  rely	
  on	
  industry	
  blacklists	
  that	
  are	
  never	
  up	
  to	
  date,	
  ASM™	
  intelligently	
  blacklists	
  everything	
  
outside	
  a	
  user’s	
  normal	
  patterns	
  of	
  behavior.	
  This	
  allows	
  ASM™	
  to	
  know	
  when	
  to	
  allow	
  a	
  transaction	
  and	
  	
  only	
  when	
  
needed,	
  when	
  to	
  step-­‐up	
  authentication	
  for	
  a	
  user	
  allowing	
  for	
  a	
  seamless	
  layered	
  security	
  architecture.	
  	
  
	
  
No	
  Static	
  Factors	
   –	
  The	
  Adaptive	
   Security	
   Manager™	
  patent	
   pending	
   technology	
   provides	
   continuously	
   evolving	
   and	
  
ever	
  changing	
  digital	
  forensic	
  signatures.	
  This	
  means	
  there	
  are	
  no	
  seed	
  “keys	
  to	
  the	
  kingdom”	
  or	
  static	
  authentication	
  
factors	
  sitting	
  around	
  waiting	
  to	
  be	
  discovered	
  or	
  stolen.	
  
	
  
Great	
  End-­‐User	
  Experience	
  
Nothing	
   to	
   Install	
   –	
   The	
   problem	
   with	
   consumer	
   authentication	
   is	
   that	
   it	
   must	
   be	
   frictionless	
   or	
   consumers	
   will	
   go	
  
elsewhere.	
   However,	
   they	
   still	
   expect	
   to	
   be	
   protected.	
   Therefore,	
   the	
   aPersona	
   ASM™	
   does	
   not	
   require	
   the	
   user	
   to	
  
download	
  a	
  token	
  generating	
  application	
  or	
  any	
  other	
  software.	
  
	
  
Nothing	
  Extra	
  to	
  Carry	
  –	
  Not	
  only	
  do	
  users	
  hate	
  to	
  keep	
  up	
  with	
  hard	
  tokens	
  and	
  USB	
  key	
  fobs,	
  they	
  are	
  expensive	
  to	
  
buy	
  and	
  administer.	
  ASM™	
  does	
  not	
  require	
  users	
  to	
  have	
  anything	
  other	
  than	
  the	
  device	
  from	
  which	
  they	
  are	
  accessing	
  
the	
  application.	
  In	
  the	
  event	
  ASM™	
  needs	
  to	
  confirm	
  a	
  new	
  behavior,	
  a	
  one-­‐time	
  password	
  is	
  sent	
  via	
  email,	
  SMS,	
  or	
  
voice	
  call.	
  
	
  
Invisible	
   Registration	
   &	
   Initial	
   Learning	
   –	
   As	
   new	
   user	
   accounts	
   are	
   added	
   and	
   begin	
   accessing	
   ASM™	
   protected	
  
applications,	
  a	
  profile	
  is	
  automatically	
  created	
  and	
  ASM™	
  begins	
  learning	
  the	
  user’s	
  behavior.	
  
	
  
Invisible	
  Authentication	
  –	
  When	
  users	
  login	
  or	
  do	
  any	
  authenticated	
  transaction	
  within	
  an	
  application,	
  ASM™	
  quickly	
  
and	
  invisibly	
  evaluates	
  over	
  100	
  behavioral	
  characteristics	
  to	
  authenticate	
  the	
  user’s	
  identity.	
  This	
  allows	
  for	
  layered	
  
security	
  and	
  a	
  great	
  user	
  experience.	
  
	
  
	
   	
  
Adaptive	
  Security	
  Manager™	
  
	
  	
  	
  	
  	
  	
  Copyright	
  ©2016	
  aPersona,	
  Inc.	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  www.apersona.com	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Patent	
  Pending	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  v8	
  
	
  
Easy	
  Configuration	
  &	
  Administration	
  
Auto	
   Learning	
   &	
   Auto	
   Registration	
   –	
   Once	
   a	
   security	
   policy	
   is	
   chosen	
   and	
   transactions	
   are	
   sent	
   to	
   the	
   ASM™	
   for	
  
authentication,	
   the	
   ASM™	
   will	
   begin	
   automatically	
   registering	
   users	
   and	
   learning	
   their	
   behavioral	
   patterns.	
   If	
  
administrators	
  only	
  want	
  the	
  ASM™	
  to	
  learn	
  without	
  challenging	
  users,	
  they	
  simply	
  put	
  the	
  security	
  policy	
  in	
  “Learning	
  
Mode.”	
  Each	
  security	
  policy	
  can	
  be	
  in	
  one	
  of	
  three	
  modes:	
  Learning,	
  Predicting,	
  or	
  Protecting.	
  
	
  
Strong	
   Authentication	
   and	
   Auto	
   Whitelisting	
   –	
   The	
   aPersona	
   ASM™	
   evaluates	
   over	
   100	
   forensic	
   and	
   behavioral	
  
characteristics	
  to	
  create	
  unique	
  behavioral	
  profiles	
  for	
  each	
  user.	
  Only	
  transactions	
  falling	
  within	
  normal	
  user	
  behaviors	
  
are	
  whitelisted.	
  This	
  creates	
  very	
  strong	
  identity	
  authentication.	
  Everything	
  outside	
  of	
  that	
  is	
  automatically	
  blacklisted	
  at	
  
the	
   individual	
   user	
   level	
   unless	
   the	
   user	
   specifically	
   adds	
   it	
   to	
   their	
   whitelist	
   by	
   successfully	
   completing	
   the	
   user	
  
challenge.	
  
	
  
Use	
  Your	
  Existing	
  Database	
  –	
  ASM™	
  is	
  database	
  agnostic	
  by	
  design.	
  However,	
  if	
  you	
  are	
  looking	
  for	
  a	
  recommendation,	
  
we	
  recommend	
  MySQL	
  for	
  low	
  to	
  moderate	
  transaction	
  volume	
  and	
  PostgreSQL	
  for	
  high	
  volume	
  instances.	
  
	
  
Enterprise	
   Management	
   Portal	
   –	
   In	
   addition	
   to	
   a	
   very	
   robust	
   API,	
   everything	
   an	
   administrator	
   needs	
   to	
   do	
   can	
   be	
  
accessed	
  through	
  a	
  user-­‐friendly,	
  web	
  management	
  portal.	
  
	
  
Pre-­‐configured	
   &	
   Custom	
   Security	
   Policies	
   –	
   Get	
   in	
   compliance	
   with	
   LOA	
   3	
   requirements	
   quickly	
   by	
   using	
   our	
   pre-­‐
configured	
   security	
   policies.	
   We	
   also	
   give	
   you	
   the	
   flexibility	
   to	
   create	
   custom	
   policies	
   to	
   suit	
   just	
   about	
   any	
   need.	
  
Layered	
  security	
  is	
  built-­‐in	
  to	
  every	
  security	
  policy.	
  
	
  
Multi-­‐tenant	
  –	
  Create	
  separate	
  instances	
  and	
  security	
  policy	
  groups	
  for	
  specific	
  applications,	
  business	
  units,	
  or	
  even	
  
clients.	
  ASM™	
  is	
  designed	
  for	
  service	
  provider	
  flexibility	
  whether	
  your	
  clients	
  are	
  internal	
  or	
  external.	
  
	
  
Low	
  TCO	
  –	
  Self-­‐registration,	
  self-­‐learning,	
  and	
  self-­‐purging	
  along	
  with	
  very	
  thin	
  resource	
  requirements	
  give	
  ASM™	
  a	
  very	
  
low	
   Total	
   Cost	
   of	
   Ownership.	
   We	
   don’t	
   require	
   expensive	
   database	
   licenses	
   or	
   hardware,	
   and	
   our	
   license	
   and	
  
maintenance	
  fees	
  are	
  designed	
  to	
  make	
  sense	
  to	
  protect	
  thousands	
  or	
  millions	
  of	
  users.	
  
	
  
Highly	
  Scalable	
  –	
  The	
  ASM™	
  architecture	
  is	
  designed	
  to	
  allow	
  for	
  easy	
  on-­‐demand	
  scaling	
  for	
  peak	
  loads.	
  Simply	
  spin	
  up	
  
additional	
  application	
  servers	
  to	
  meet	
  peak	
  demand	
  and	
  de-­‐provision	
  them	
  once	
  the	
  peak	
  load	
  has	
  passed.	
  
	
  
Compliance	
  Reporting	
  
The	
   Adaptive	
   Security	
   Manager™	
   extensive	
   compliance	
   reporting	
   tool	
   supports	
   your	
   PCI	
   DSS,	
   HIPAA,	
   CJIS,	
   FFIEC,	
   and	
   SSAE16	
  
compliance	
  requirements.	
  In	
  addition,	
  our	
  reporting	
  also	
  provides	
  Big-­‐data	
  information	
  and	
  analytics	
  on:	
  Invisible/transparent	
  User	
  
Registrations,	
   Forensic	
   Learning,	
   Monitoring,	
   Risk	
   Scoring,	
   and	
   Real-­‐Time	
   Risk	
   Analysis	
   Reports	
   that	
   address	
   all	
   transactions.	
   All	
  
simply	
  managed	
  thru	
  a	
  single	
  pane	
  of	
  glass	
  management	
  services	
  portal	
  for	
  operational	
  management.	
  	
  No	
  other	
  solution	
  allows	
  this	
  
simple,	
  seamless	
  yet	
  cost	
  effective	
  security	
  authentication	
  protection	
  and	
  reporting.	
  
	
  
	
   	
  
Adaptive	
  Security	
  Manager™	
  
	
  	
  	
  	
  	
  	
  Copyright	
  ©2016	
  aPersona,	
  Inc.	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  www.apersona.com	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Patent	
  Pending	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  v8	
  
	
  
aPersona	
  Scalability,	
  Flexibility	
  &	
  Big	
  Data	
  Risk	
  Analytics	
  
aPersona’s	
  Adaptive	
  Security	
  Manager™	
  scales	
  across	
  your	
  organization	
  and	
  enables	
  a	
  customized	
  set	
  of	
  factors	
  that	
  match	
  the	
  
levels	
   of	
   risk	
   or	
   compliance	
   needed	
   by	
   user,	
   transaction,	
   service,	
   location,	
   user	
   group,	
   and	
   transaction	
   values	
   all	
   governed	
   and	
  
managed	
  centrally	
  over	
  selectable	
  periods	
  of	
  time.	
  The	
  Adaptive	
  Security	
  Manager™	
  uses	
  a	
  multi-­‐tenant	
  architecture	
  that	
  enables	
  
enterprises	
   and	
   IT	
   service	
   providers	
   to	
   isolate,	
   support,	
   and	
   manage	
   any	
   combination	
   of	
   user	
   groups,	
   organizational	
   groups,	
  
geographic	
  groups,	
  and/or	
  customers	
  easily	
  from	
  a	
  single	
  management	
  portal.	
  Further,	
  aPersona’s	
  advanced	
  reporting	
  and	
  analytics	
  
gives	
  IT	
  security	
  personnel	
  real-­‐time	
  forensic	
  data	
  for	
  Big	
  Data	
  risk	
  analysis	
  and	
  analytics.	
  
	
  
	
  
Finding	
  the	
  balance	
  between	
  user	
  convenience,	
  commerce	
  and	
  security	
  is	
  challenging.	
  The	
  Adaptive	
  Security	
  Manager™	
  gives	
  you	
  
the	
  tools	
  to	
  take	
  back	
  control	
  while	
  giving	
  users	
  transparent	
  access	
  your	
  services.	
  “Naked	
  Security”	
  just	
  doesn’t	
  cut	
  it	
  anymore;	
  
aPersona	
  brings	
  the	
  intelligence	
  and	
  adaptability	
  that’s	
  necessary	
  to	
  successfully	
  deliver	
  easy	
  to	
  use	
  and	
  secured	
  services	
  to	
  users.	
  	
  
	
  
	
  

More Related Content

What's hot

Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksPayPalX Developer Network
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile DevicesSecure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile DevicesSAP Solution Extensions
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiAkamai Technologies
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Mona Rajput
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next levelPer Larsen
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Automotive Cybersecurity Best Practices
Automotive Cybersecurity Best PracticesAutomotive Cybersecurity Best Practices
Automotive Cybersecurity Best PracticesBamboo Apps
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next levelPer Larsen
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 

What's hot (19)

Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile DevicesSecure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
Secure Enterprise Apps in Seconds Across Managed and Unmanaged Mobile Devices
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, AkamaiClosing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
 
Principles for Secure Design and Software Security
Principles for Secure Design and Software Security Principles for Secure Design and Software Security
Principles for Secure Design and Software Security
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Automotive Cybersecurity Best Practices
Automotive Cybersecurity Best PracticesAutomotive Cybersecurity Best Practices
Automotive Cybersecurity Best Practices
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 

Viewers also liked

Cartaz seminário paulo freire, 2013
Cartaz seminário paulo freire, 2013Cartaz seminário paulo freire, 2013
Cartaz seminário paulo freire, 2013pibiduergsmontenegro
 
Ata da reuniao de 14 de maio de 2013
Ata da reuniao de 14 de maio de 2013Ata da reuniao de 14 de maio de 2013
Ata da reuniao de 14 de maio de 2013pibiduergsmontenegro
 
Case Study on Results Measurement & Attribution
Case Study on Results Measurement & AttributionCase Study on Results Measurement & Attribution
Case Study on Results Measurement & AttributionMohammed Nurul Azam
 
Foto de página inteira sbt brasilia
Foto de página inteira sbt brasiliaFoto de página inteira sbt brasilia
Foto de página inteira sbt brasiliaMeio & Mensagem
 
QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA?
QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA? QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA?
QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA? Semente de Chia
 
Kit de Semente de Chia para o seu dia!
Kit de Semente de Chia para o seu dia!Kit de Semente de Chia para o seu dia!
Kit de Semente de Chia para o seu dia!Semente de Chia
 
Modems introdução
Modems introduçãoModems introdução
Modems introduçãoTiago
 
Keyword Research - Beyond The Ordinary
Keyword Research - Beyond The OrdinaryKeyword Research - Beyond The Ordinary
Keyword Research - Beyond The OrdinaryAlex Cohen
 
Actor presenta joel
Actor presenta joelActor presenta joel
Actor presenta joeljoelsandoval
 
Uso de Selfies por los Jovenes en Puerto Rico
Uso de Selfies por los Jovenes en Puerto RicoUso de Selfies por los Jovenes en Puerto Rico
Uso de Selfies por los Jovenes en Puerto RicoLuis Baquero
 
Lowendalmasai labour cost optimization
Lowendalmasai labour cost optimizationLowendalmasai labour cost optimization
Lowendalmasai labour cost optimizationGiuseppe Mele
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperChris Reese
 
Las Redes Sociales y su impacto en las Familias Puertorriquenas
Las Redes Sociales y su impacto en las Familias PuertorriquenasLas Redes Sociales y su impacto en las Familias Puertorriquenas
Las Redes Sociales y su impacto en las Familias PuertorriquenasLuis Baquero
 
Parlamento europeo
Parlamento europeoParlamento europeo
Parlamento europeojvallinar01
 
Wor(l)d Global Network - Pay Plan
Wor(l)d Global Network - Pay PlanWor(l)d Global Network - Pay Plan
Wor(l)d Global Network - Pay PlanDr. Dave HM
 

Viewers also liked (20)

Cartaz seminário paulo freire, 2013
Cartaz seminário paulo freire, 2013Cartaz seminário paulo freire, 2013
Cartaz seminário paulo freire, 2013
 
P1 e1 internet
P1 e1 internetP1 e1 internet
P1 e1 internet
 
Recursos
RecursosRecursos
Recursos
 
Ata da reuniao de 14 de maio de 2013
Ata da reuniao de 14 de maio de 2013Ata da reuniao de 14 de maio de 2013
Ata da reuniao de 14 de maio de 2013
 
Powergen2012
Powergen2012Powergen2012
Powergen2012
 
Case Study on Results Measurement & Attribution
Case Study on Results Measurement & AttributionCase Study on Results Measurement & Attribution
Case Study on Results Measurement & Attribution
 
Foto de página inteira sbt brasilia
Foto de página inteira sbt brasiliaFoto de página inteira sbt brasilia
Foto de página inteira sbt brasilia
 
QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA?
QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA? QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA?
QUAIS OS BENEFÍCIOS DA CHIA CÁPSULA?
 
Kit de Semente de Chia para o seu dia!
Kit de Semente de Chia para o seu dia!Kit de Semente de Chia para o seu dia!
Kit de Semente de Chia para o seu dia!
 
Modems introdução
Modems introduçãoModems introdução
Modems introdução
 
Keyword Research - Beyond The Ordinary
Keyword Research - Beyond The OrdinaryKeyword Research - Beyond The Ordinary
Keyword Research - Beyond The Ordinary
 
Peto 70ª cipm
Peto 70ª cipmPeto 70ª cipm
Peto 70ª cipm
 
Actor presenta joel
Actor presenta joelActor presenta joel
Actor presenta joel
 
ESTUDIANTE
ESTUDIANTEESTUDIANTE
ESTUDIANTE
 
Uso de Selfies por los Jovenes en Puerto Rico
Uso de Selfies por los Jovenes en Puerto RicoUso de Selfies por los Jovenes en Puerto Rico
Uso de Selfies por los Jovenes en Puerto Rico
 
Lowendalmasai labour cost optimization
Lowendalmasai labour cost optimizationLowendalmasai labour cost optimization
Lowendalmasai labour cost optimization
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
 
Las Redes Sociales y su impacto en las Familias Puertorriquenas
Las Redes Sociales y su impacto en las Familias PuertorriquenasLas Redes Sociales y su impacto en las Familias Puertorriquenas
Las Redes Sociales y su impacto en las Familias Puertorriquenas
 
Parlamento europeo
Parlamento europeoParlamento europeo
Parlamento europeo
 
Wor(l)d Global Network - Pay Plan
Wor(l)d Global Network - Pay PlanWor(l)d Global Network - Pay Plan
Wor(l)d Global Network - Pay Plan
 

Similar to aPersona-aMFA-wPatternsOfBehaviorTech-v8_5

9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808Hai Nguyen
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your EnterpriseVinod K
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustInstaSafe Technologies
 
Dynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAPDynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAPTomas Martinez
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...manoharparakh
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...manoharparakh
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAmazon Web Services
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...Amazon Web Services
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Aruba, a Hewlett Packard Enterprise company
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...Ivanti
 
IAM Solution design to create a powerpoint
IAM Solution design to create a powerpointIAM Solution design to create a powerpoint
IAM Solution design to create a powerpointsrikanthmasss3
 

Similar to aPersona-aMFA-wPatternsOfBehaviorTech-v8_5 (20)

9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero Trust
 
Dynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAPDynamics - Administre sus usuarios, roles y perfiles en SAP
Dynamics - Administre sus usuarios, roles y perfiles en SAP
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...Guarding Your Business's Core The Vital Role of Privileged Access Management ...
Guarding Your Business's Core The Vital Role of Privileged Access Management ...
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
 
IAM Solution design to create a powerpoint
IAM Solution design to create a powerpointIAM Solution design to create a powerpoint
IAM Solution design to create a powerpoint
 
WHY MSSPs LOVE OUR SOLUTION
WHY MSSPs LOVE OUR SOLUTIONWHY MSSPs LOVE OUR SOLUTION
WHY MSSPs LOVE OUR SOLUTION
 

aPersona-aMFA-wPatternsOfBehaviorTech-v8_5

  • 1. Adaptive  Security  Manager™              Copyright  ©2016  aPersona,  Inc.                                          www.apersona.com                                                    Patent  Pending                                                                                                              v8                                         I              
  • 2. Adaptive  Security  Manager™              Copyright  ©2016  aPersona,  Inc.                                          www.apersona.com                                                    Patent  Pending                                                                                                              v8     Industry  Authentication  &  Risk   The  aPersona  Adaptive  Security  Manager™  (ASM™)  delivers  strong  authentication  with  a  revolutionary,  future  proof,  adaptive  multi   factor  technology  that  addresses  the  need  to  protect  millions  of  currently  unsecure  logins  and  application  access  users.  aPersona   accomplishes  this  thru  patent-­‐pending,  adaptive,  behavioral  recognition  technology  providing  the  lowest  total  cost  of  ownership   while  invisibly  and  reliably  protecting  vulnerable  credentials  from  fraud  and  misuse.   Truly  Adaptive  Technology  Powered  by  Real  Intelligence   Patent-­‐Pending  Patterns  of  Behavior  Authentication  –  Every  user  has  his  or  her  own  unique  Patterns  of  Behavior  in   cyberspace.  aPersona’s  patent-­‐pending  adaptive  multi-­‐factor  authentication  platform  learns  these  Patterns  of  Behavior   (PoB)  and  gathers  forensics  for  reliable  and  efficient  authentication  for  any  type  of  transaction.  These  individual  PoBs   provide  strong  assurance  for  invisible  multi-­‐factor  authentication,  and  meet  the  standards  for  NIST  FICAM  Trust  Criteria   Level  3.     Truly  Adaptive  for  a  Frictionless  User  Experience  –  Adaptive  Security  Manager™  is  always  learning  and  evolving  the   digital   behavior   of   each   user   as   they   change   devices,   networks,   and   the   way   they   interact   with   online   and   mobile   applications.  Rather  than  rely  on  industry  blacklists  that  are  never  up  to  date,  ASM™  intelligently  blacklists  everything   outside  a  user’s  normal  patterns  of  behavior.  This  allows  ASM™  to  know  when  to  allow  a  transaction  and    only  when   needed,  when  to  step-­‐up  authentication  for  a  user  allowing  for  a  seamless  layered  security  architecture.       No  Static  Factors   –  The  Adaptive   Security   Manager™  patent   pending   technology   provides   continuously   evolving   and   ever  changing  digital  forensic  signatures.  This  means  there  are  no  seed  “keys  to  the  kingdom”  or  static  authentication   factors  sitting  around  waiting  to  be  discovered  or  stolen.     Great  End-­‐User  Experience   Nothing   to   Install   –   The   problem   with   consumer   authentication   is   that   it   must   be   frictionless   or   consumers   will   go   elsewhere.   However,   they   still   expect   to   be   protected.   Therefore,   the   aPersona   ASM™   does   not   require   the   user   to   download  a  token  generating  application  or  any  other  software.     Nothing  Extra  to  Carry  –  Not  only  do  users  hate  to  keep  up  with  hard  tokens  and  USB  key  fobs,  they  are  expensive  to   buy  and  administer.  ASM™  does  not  require  users  to  have  anything  other  than  the  device  from  which  they  are  accessing   the  application.  In  the  event  ASM™  needs  to  confirm  a  new  behavior,  a  one-­‐time  password  is  sent  via  email,  SMS,  or   voice  call.     Invisible   Registration   &   Initial   Learning   –   As   new   user   accounts   are   added   and   begin   accessing   ASM™   protected   applications,  a  profile  is  automatically  created  and  ASM™  begins  learning  the  user’s  behavior.     Invisible  Authentication  –  When  users  login  or  do  any  authenticated  transaction  within  an  application,  ASM™  quickly   and  invisibly  evaluates  over  100  behavioral  characteristics  to  authenticate  the  user’s  identity.  This  allows  for  layered   security  and  a  great  user  experience.        
  • 3. Adaptive  Security  Manager™              Copyright  ©2016  aPersona,  Inc.                                          www.apersona.com                                                    Patent  Pending                                                                                                              v8     Easy  Configuration  &  Administration   Auto   Learning   &   Auto   Registration   –   Once   a   security   policy   is   chosen   and   transactions   are   sent   to   the   ASM™   for   authentication,   the   ASM™   will   begin   automatically   registering   users   and   learning   their   behavioral   patterns.   If   administrators  only  want  the  ASM™  to  learn  without  challenging  users,  they  simply  put  the  security  policy  in  “Learning   Mode.”  Each  security  policy  can  be  in  one  of  three  modes:  Learning,  Predicting,  or  Protecting.     Strong   Authentication   and   Auto   Whitelisting   –   The   aPersona   ASM™   evaluates   over   100   forensic   and   behavioral   characteristics  to  create  unique  behavioral  profiles  for  each  user.  Only  transactions  falling  within  normal  user  behaviors   are  whitelisted.  This  creates  very  strong  identity  authentication.  Everything  outside  of  that  is  automatically  blacklisted  at   the   individual   user   level   unless   the   user   specifically   adds   it   to   their   whitelist   by   successfully   completing   the   user   challenge.     Use  Your  Existing  Database  –  ASM™  is  database  agnostic  by  design.  However,  if  you  are  looking  for  a  recommendation,   we  recommend  MySQL  for  low  to  moderate  transaction  volume  and  PostgreSQL  for  high  volume  instances.     Enterprise   Management   Portal   –   In   addition   to   a   very   robust   API,   everything   an   administrator   needs   to   do   can   be   accessed  through  a  user-­‐friendly,  web  management  portal.     Pre-­‐configured   &   Custom   Security   Policies   –   Get   in   compliance   with   LOA   3   requirements   quickly   by   using   our   pre-­‐ configured   security   policies.   We   also   give   you   the   flexibility   to   create   custom   policies   to   suit   just   about   any   need.   Layered  security  is  built-­‐in  to  every  security  policy.     Multi-­‐tenant  –  Create  separate  instances  and  security  policy  groups  for  specific  applications,  business  units,  or  even   clients.  ASM™  is  designed  for  service  provider  flexibility  whether  your  clients  are  internal  or  external.     Low  TCO  –  Self-­‐registration,  self-­‐learning,  and  self-­‐purging  along  with  very  thin  resource  requirements  give  ASM™  a  very   low   Total   Cost   of   Ownership.   We   don’t   require   expensive   database   licenses   or   hardware,   and   our   license   and   maintenance  fees  are  designed  to  make  sense  to  protect  thousands  or  millions  of  users.     Highly  Scalable  –  The  ASM™  architecture  is  designed  to  allow  for  easy  on-­‐demand  scaling  for  peak  loads.  Simply  spin  up   additional  application  servers  to  meet  peak  demand  and  de-­‐provision  them  once  the  peak  load  has  passed.     Compliance  Reporting   The   Adaptive   Security   Manager™   extensive   compliance   reporting   tool   supports   your   PCI   DSS,   HIPAA,   CJIS,   FFIEC,   and   SSAE16   compliance  requirements.  In  addition,  our  reporting  also  provides  Big-­‐data  information  and  analytics  on:  Invisible/transparent  User   Registrations,   Forensic   Learning,   Monitoring,   Risk   Scoring,   and   Real-­‐Time   Risk   Analysis   Reports   that   address   all   transactions.   All   simply  managed  thru  a  single  pane  of  glass  management  services  portal  for  operational  management.    No  other  solution  allows  this   simple,  seamless  yet  cost  effective  security  authentication  protection  and  reporting.        
  • 4. Adaptive  Security  Manager™              Copyright  ©2016  aPersona,  Inc.                                          www.apersona.com                                                    Patent  Pending                                                                                                              v8     aPersona  Scalability,  Flexibility  &  Big  Data  Risk  Analytics   aPersona’s  Adaptive  Security  Manager™  scales  across  your  organization  and  enables  a  customized  set  of  factors  that  match  the   levels   of   risk   or   compliance   needed   by   user,   transaction,   service,   location,   user   group,   and   transaction   values   all   governed   and   managed  centrally  over  selectable  periods  of  time.  The  Adaptive  Security  Manager™  uses  a  multi-­‐tenant  architecture  that  enables   enterprises   and   IT   service   providers   to   isolate,   support,   and   manage   any   combination   of   user   groups,   organizational   groups,   geographic  groups,  and/or  customers  easily  from  a  single  management  portal.  Further,  aPersona’s  advanced  reporting  and  analytics   gives  IT  security  personnel  real-­‐time  forensic  data  for  Big  Data  risk  analysis  and  analytics.       Finding  the  balance  between  user  convenience,  commerce  and  security  is  challenging.  The  Adaptive  Security  Manager™  gives  you   the  tools  to  take  back  control  while  giving  users  transparent  access  your  services.  “Naked  Security”  just  doesn’t  cut  it  anymore;   aPersona  brings  the  intelligence  and  adaptability  that’s  necessary  to  successfully  deliver  easy  to  use  and  secured  services  to  users.