Addressing Password Creep

1,335 views

Published on

This slide presentation provides an overview of the challenges of password creep and the solutions to solve these issues.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,335
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Easy for you
  • Easy ComplianceThe Department of Justice created a great slide deck at the tenth annual CIB Technology Conference which breaks down the CJIS requirements
  • Easy ComplianceThe Department of Justice created a great slide deck at the tenth annual CIB Technology Conference which breaks down the CJIS requirements
  • What do you do with encryption when they forget and they are in the field?
  • Strong Security, but easier on you and your users, no loss in productivity
  • Strong Security, but easier on you and your users, no loss in productivity
  • Advantages: simpler and better value-for-moneyEasier and less expensive to manage and maintain – e.g. at least 30% TCO savings vs. combining several “point” solutionsImproved overall performance thanks to integration across applications – e.g. no incompatibility, security policies are always sync’dImproved user adoption and lower support costs – e.g. saving just one support call per user may pay back the cost of the software
  • Advantages: simpler and better value-for-moneyEasier and less expensive to manage and maintain – e.g. at least 30% TCO savings vs. combining several “point” solutionsImproved overall performance thanks to integration across applications – e.g. no incompatibility, security policies are always sync’dImproved user adoption and lower support costs – e.g. saving just one support call per user may pay back the cost of the software
  • Addressing Password Creep

    1. 1. Addressing Password Creep withDigitalPersona Pro<br />Jim FultonVice President, DigitalPersona<br />
    2. 2. Best-in-class centrally-managed solutions<br />Over 95M users worldwide use DigitalPersona technology<br />Award-winning products<br />SC Magazine, 5-Star Best Buy, 2008 and 2009<br />Frost & Sullivan, Global Product Differentiation Innovation, 2007<br />CRN, Emerging Tech Vendor, 2007<br />Info Security Product Guide, Best Deployment Scenario, 2006<br />Microsoft Innovations, 2004<br />HP partner for Endpoint Protection software<br />Delivering centrally-managed security for SMBs and Enterprises<br />Global company, headquartered in Silicon Valley, USA<br />Founded in 1997; operations in Americas, EMEA and Asia<br />Who is DigitalPersona<br />
    3. 3. DigitalPersona – A Leader In Security<br />Government<br />Retail/POS<br />Healthcare<br />Energy<br />Education<br />Financial Services<br />OEMs<br />
    4. 4. Where is Password Creep Coming From<br />Password Mandates<br /><ul><li>Password policies vary widely by application</li></ul>Application Enforcement<br /><ul><li>Users getting prompted to manage many more passwords</li></ul>User Errors/Confusion<br />
    5. 5. Where is Password Creep Coming From<br />Password Mandates<br /><ul><li>Password policies vary widely by application</li></ul>Application Enforcement<br /><ul><li>Users getting prompted to manage many more passwords</li></ul>User Errors/Confusion<br />Rising Helpdesk Costs + Uncertain Compliance<br />
    6. 6. This Problem Takes Many Forms<br />Access Management<br />Secure logon and authentication for networks and applications<br />Data Protection<br />Encryption for computers and data at rest<br />Secure Communications<br />Digital signature and secure file sharing<br />
    7. 7. Managing Many Security Systems is Challenging<br />Manage<br />Manage<br />Manage<br />Manage<br />Manage<br />SecureEmail &Documents<br />Full DiskEncryption<br />SecureVPN<br />SingleSign-On(SSO)<br />Smartcards,Tokens,Biometrics<br />
    8. 8. Managing Many Security Systems is Challenging<br />Manage<br />Manage<br />Manage<br />Manage<br />Manage<br />Different products don’t fit together<br /><ul><li>Expensive, redundant
    9. 9. Complex for IT & users</li></ul>SecureEmail &Documents<br />Full DiskEncryption<br />SecureVPN<br />SingleSign-On(SSO)<br />Smartcards,Tokens,Biometrics<br />
    10. 10. Central Management is the Solution<br />ControlAccess<br />ProtectData<br />Businesses can nowcentrally managesecurity policies throughDigitalPersona Pro<br />Manage<br />Secure Communications<br />All-in-one Endpoint ProtectionStrong|Easy to Manage|Affordable<br />
    11. 11. Solutions Powered by DigitalPersona Pro<br />Data Protection<br />Access Recovery<br />Encrypt customer data and IP<br />Recover access to locked computers<br />Remote Access Security<br />Single Sign-On<br />Multi-factor VPN authentication<br />Eliminate password burdens/costs<br />Strong Authentication<br />Compliance<br />Know who did what, where<br />Implement strong controls<br />Secure Communications<br />Fast access<br />Digital signature and encryptionfor email and shared files<br />Improve productivity for shared PCs<br />
    12. 12. Example: Addressing CJIS for Government Agencies<br />CJIS requires advanced authentication<br /><ul><li>Passwords must be at least 8 characters
    13. 13. 2-Factor Authentication</li></ul>CJIS mandates data encryption<br />
    14. 14. Example: Addressing CJIS for Government Agencies<br />DigitalPersona Pro simplifies strong passwords<br />Eliminate password reset burdens on helpdesk – fast ROI<br />Prevent sharing of passwords, social engineering attacks<br />Enables strong authentication<br />Fingerprints, smart cards, face<br />Windows, Web, Citrix, VPNs, legacy apps<br />Enables disk and file encryption<br />CJIS requires advanced authentication<br /><ul><li>Passwords must be at least 8 characters
    15. 15. 2-Factor Authentication</li></ul>CJIS mandates data encryption<br />my$trongP@ssw0rd!<br />
    16. 16. How Strong Passwords Are Made Simple<br />
    17. 17. DigitalPersona Pro Gives IT Control Over Authentication<br />
    18. 18. DigitalPersona Pro Enters Passwords for the User<br />myusername<br />********<br />
    19. 19. Strong Security Becomes Simple<br />And the user is logged in!<br />myusername<br />********<br />
    20. 20. Example: Preventing Disasters<br />What do you do when users run into problems?<br />Forgotten passwords<br />Lost smartcards<br />Damaged hardware<br />COMPANYNETBob_Smith<br />
    21. 21. DigitalPersona Pro Access Recovery<br />Administrators can give users an unlock code – even when users are on the road<br />
    22. 22. DigitalPersona Pro Access Recovery<br />Administrators can give users an unlock code – even when users are on the road<br />COMPANYNETBob_Smith<br />Prevent Lockouts<br />
    23. 23. Manageability – keep control across all PCs<br /><ul><li>Enforce policies and recover from problems – from one console</li></ul>Security – make strong protection easy<br /><ul><li>Simplify strong authentication for multiple applications
    24. 24. Encrypt data without fear of data loss</li></ul>Compliance – know who does what<br /><ul><li>Implement controls to show “due care,” boost accountability
    25. 25. Show compliance with comprehensive audit logs</li></ul>Efficiency – streamline processes, save money<br /><ul><li>Reduce costs/downtime from forgotten passwords or damaged PCs</li></ul>DigitalPersona Pro<br />
    26. 26. Q & A<br />Manageability – keep control across all PCs<br /><ul><li>Enforcepolicies and recover from problems – from one console</li></ul>Security – make strong protection easy<br /><ul><li>Simplify strong authentication for multiple applications
    27. 27. Encrypt data without fear of data loss</li></ul>Compliance – know who does what<br /><ul><li>Implement controls to show “due care,” boost accountability
    28. 28. Show compliance with comprehensive audit logs</li></ul>Efficiency – streamline processes, save money<br /><ul><li>Reduce costs/downtime from forgotten passwords or damaged PCs</li></ul>www.digitalpersona.com/enterprise<br />

    ×