SlideShare a Scribd company logo
1 of 20
Download to read offline
Easy	Multi	Factor	Authentication	Strategies	
and	PCI	DSS	3.2
HELLO!
I am Anirban Banerjee.
I am the Founder and
CEO of Onion ID.
https://calendly.com/anirban/enterprise-demo/
Two/Multi Factor
Authentication
PCI DSS 3.2
Strategies
What	is	
Two-Factor	
Authentication?
▸ Adds	a	second	level	of	verification	to	the	
password-based	approach.
▸ Example:	a	text	message	to	your	phone,	a	value	
from	a	RSA	token.
▸ If	a	hacker	gets	your	username	and	password	they	
still	won’t	be	able	to	get	in	to	your	account.
Why	do	we	
need	this?
Usernames	&	Passwords	can	be	stolen!
• Phishing	 attacks	
• Same	credentials	across	apps
• Key-loggers
• Educated	guesses,	social	engineering
2FA	prevents	attackers	from	accessing	your	account	even	
if	they	obtain	your	username	and	password.
Mandated	in	Version	3.2	of	the	PCI	Data	Security	
Standard
Who	Uses	
Two-Factor?
Multi	Factor	Authentication
Adding	More	
Factors
• Increase	the	strength	of	authentication	by	adding	factors.	
• Five	categories	of	authentication	methods
• who	you	are,	
• what	you	know,	
• what	you	have,	
• what	you	typically	do,
• the	context.	
• Adding	factors	from	different	categories	can	increase	strength	only	if	the	
overall	set	of	vulnerabilities	is	reduced.
What	can	we	add?
Physical	
Biometric
▸ immutable	and	
unique
• Facial	recognition	
• Iris	Scan
• Retinal	Scan
• Fingerprint	Palm	
Scan
• Voice
• Liveliness	biometric	
factors	include:
• Pulse.	
CAPTCHA;	
etc
Behavioral/Biometric	 	
• based	on	person’s	
physical	
behavioural	activity	
patterns	
• Keyboard	
signature
• Voice		
Who	You	Are
Biometric
what	you	
know
what	you
have
what	you
Do	
Context
• User	Name	and	
Password	
(UN/PW),	
• A	passphrase
• a	PIN
• An	answer	to	a	
secret	question	
• One	Time	
Password	
(OTP)
• Smart	card
• X.509	and	
PKI
• Rarely	
used	alone
• Used	in	
combinatio
n	with	
UN/PW	
and	a	PIN
• Browsing	
patterns
• Time	of	
access
• Type	of	
device
• Used	in	
Combinati
on	with	
other	
methods
•
• Location;	
Time	of	
access;	
• Subscriber	
identity	
module	
(SIM)
• Frequency	
of	access;
• Used	with		
other	
methods
▸ Combining	two	or	more	authentication	methods	can	potentially	
increase	authentication	strength.
▸ However!
• Be	careful	not	to	introduce	vulnerabilities
• More	factorsè More	complex/costly	to	implement	&	use.The	more	the	
merrier?
The	more	the	
merrier?
▸ Simply	adding	factors	does	not	guarantee	more	protection
Source: Gartner
Finding	the	
Best	Factor		
Combo
Use	Needs	and	Constraints	to	Determine
• Authentication	strength	
• indicated	by	the	level	of	risk
• Total	Cost	of	Ownership
• Constrained	by	budget		
• Ease	of	use	
• universally	desirable,	but	it	is	
less	critical	the	greater	the	
consistency		
• Other	constraints	
• consistency	and	control	of	the	
endpoint	is	a	particular	
constraint;		
Source - Gartner
PCI	DSS	3.2
▸ Feb	1	2018
▸ Multi	Factor	authentication	for	everyone
▸ Need	to	protect	both	console	and	non	console	based	access
▸ New	requirements	10.8	and	10.8.1	outline	that	service	 providers	
need	to	detect	and	report	on	failures	of	critical	 security	control	
systems
▸ New	requirement	11.3.4.1	indicates	that	service	providers	need	to	
perform	penetration	testing	on	segmentation	controls	every	six	
months
Highlights
▸ Server	does	not	support	2FA	by	default
▸ App	does	not	support	SAML/Oauth
▸ App	has	no	native	support	for	2FA
▸ Regular	auditing	of	access
▸ Data	Privacy	issues,	data	segregation
Challenges
▸ Enable	MFA	via	Browser	extensions	or	Web	Filters
▸ Use	UX	friendly	MFA:	Geo	fencing,	proximity,	fingerprint
▸ Set	up	auditing	systems	by	parsing	SIEM	info
▸ Set	up	a	monthly	PCI	meeting	to	go	over	process	and	results
▸ Commercial	tools	– Onion	ID	to	do	privilege	management
Strategies
Conclusions
▸ Password	based	authentication	is	not	enough	any	more.
▸ Multi	Factor	authentication	is	here	to	stay!
▸ Many	different	options,	each	with	its	own	costs	and	vulnerabilities.
▸ Be	smart:	adding	more	factors	will	definitely	increase	cost	and	
complexity,	but	might	not	(sufficiently)	increase	security.
▸ Consider	the	trade-offs,	customize.	Pick	the	combination	that	
works	for	you.
Conclusions
THANK YOU!
Any questions?
You can find more about us at:
Onion ID – The Next Generation of Privilege Management
www.onionid.com , sales@onionid.com
Tel: +1-888-315-4745
https://calendly.com/anirban/enterprise-demo/

More Related Content

What's hot

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Two Factor Authentication Made Easy ICWE 2015
Two Factor Authentication Made Easy  ICWE 2015Two Factor Authentication Made Easy  ICWE 2015
Two Factor Authentication Made Easy ICWE 2015Alex Q. Chen
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication? Sinch
 
Phishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge AheadPhishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge AheadeLearning Papers
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Top 10 web server security flaws
Top 10 web server security flawsTop 10 web server security flaws
Top 10 web server security flawstobybear30
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site SecuritySteven Cahill
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testingsrivinayak
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelineswebhostingguy
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 

What's hot (20)

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Two Factor Authentication Made Easy ICWE 2015
Two Factor Authentication Made Easy  ICWE 2015Two Factor Authentication Made Easy  ICWE 2015
Two Factor Authentication Made Easy ICWE 2015
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 
Phishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge AheadPhishing Attacks: A Challenge Ahead
Phishing Attacks: A Challenge Ahead
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Web security
Web securityWeb security
Web security
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
Password management
Password managementPassword management
Password management
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Top 10 web server security flaws
Top 10 web server security flawsTop 10 web server security flaws
Top 10 web server security flaws
 
Web Server Web Site Security
Web Server Web Site SecurityWeb Server Web Site Security
Web Server Web Site Security
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Web security
Web securityWeb security
Web security
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 

Viewers also liked

Justifying Migration of legacy process control systems
Justifying Migration of legacy process control systemsJustifying Migration of legacy process control systems
Justifying Migration of legacy process control systemsBrian Thomas
 
Lsmw final with comments
Lsmw final with commentsLsmw final with comments
Lsmw final with commentsrajyalakshmi10
 
Introducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver SuiteIntroducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver SuitePrecisely
 
Mainframe Optimization in 2017
Mainframe Optimization in 2017Mainframe Optimization in 2017
Mainframe Optimization in 2017Precisely
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26koolkampus
 
Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...
Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...
Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...Kai Wähner
 
Migrating Legacy Applications to AWS Cloud: Strategies and Challenges
Migrating Legacy Applications to AWS Cloud: Strategies and ChallengesMigrating Legacy Applications to AWS Cloud: Strategies and Challenges
Migrating Legacy Applications to AWS Cloud: Strategies and ChallengesOSSCube
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Slaying The Legacy Dragon: Practical Lessons in Replacing Old Software
Slaying The Legacy Dragon: Practical Lessons in Replacing Old SoftwareSlaying The Legacy Dragon: Practical Lessons in Replacing Old Software
Slaying The Legacy Dragon: Practical Lessons in Replacing Old SoftwareTim Berglund
 

Viewers also liked (12)

Justifying Migration of legacy process control systems
Justifying Migration of legacy process control systemsJustifying Migration of legacy process control systems
Justifying Migration of legacy process control systems
 
Legacy Migration Overview
Legacy Migration OverviewLegacy Migration Overview
Legacy Migration Overview
 
Lsmw final with comments
Lsmw final with commentsLsmw final with comments
Lsmw final with comments
 
Introducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver SuiteIntroducing MFX for z/OS 2.1 & ZPSaver Suite
Introducing MFX for z/OS 2.1 & ZPSaver Suite
 
Mainframe Optimization in 2017
Mainframe Optimization in 2017Mainframe Optimization in 2017
Mainframe Optimization in 2017
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26
 
Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...
Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...
Enterprise Integration Patterns Revisited (EIP) for the Era of Big Data, Inte...
 
Migrating Legacy Applications to AWS Cloud: Strategies and Challenges
Migrating Legacy Applications to AWS Cloud: Strategies and ChallengesMigrating Legacy Applications to AWS Cloud: Strategies and Challenges
Migrating Legacy Applications to AWS Cloud: Strategies and Challenges
 
EAI example
EAI exampleEAI example
EAI example
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Slaying The Legacy Dragon: Practical Lessons in Replacing Old Software
Slaying The Legacy Dragon: Practical Lessons in Replacing Old SoftwareSlaying The Legacy Dragon: Practical Lessons in Replacing Old Software
Slaying The Legacy Dragon: Practical Lessons in Replacing Old Software
 
AWS Migration Planning Roadmap
AWS Migration Planning RoadmapAWS Migration Planning Roadmap
AWS Migration Planning Roadmap
 

Similar to Jun 29 - 2016-MultiFactorAuthentication

Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iPrecisely
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldForte Advisory, Inc.
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONProtected Harbor
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!Caroline Johnson
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...Caroline Johnson
 

Similar to Jun 29 - 2016-MultiFactorAuthentication (20)

Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
status
statusstatus
status
 
ffv
ffvffv
ffv
 
status
statusstatus
status
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
The Evolution of Authentication: Passwordless Solutions and Digital Identity ...
 

More from banerjeea

ISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDbanerjeea
 
Onion ID Overview
Onion ID OverviewOnion ID Overview
Onion ID Overviewbanerjeea
 
The 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access ManagementThe 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access Managementbanerjeea
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Using Behavior to Protect Cloud Servers
Using Behavior to Protect Cloud ServersUsing Behavior to Protect Cloud Servers
Using Behavior to Protect Cloud Serversbanerjeea
 
Active Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion IDActive Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion IDbanerjeea
 
Anirban webappsecusa2014
Anirban webappsecusa2014Anirban webappsecusa2014
Anirban webappsecusa2014banerjeea
 

More from banerjeea (7)

ISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion ID
 
Onion ID Overview
Onion ID OverviewOnion ID Overview
Onion ID Overview
 
The 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access ManagementThe 7 Layers of Privileged Access Management
The 7 Layers of Privileged Access Management
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Using Behavior to Protect Cloud Servers
Using Behavior to Protect Cloud ServersUsing Behavior to Protect Cloud Servers
Using Behavior to Protect Cloud Servers
 
Active Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion IDActive Authentication to Protect IT Assets - Onion ID
Active Authentication to Protect IT Assets - Onion ID
 
Anirban webappsecusa2014
Anirban webappsecusa2014Anirban webappsecusa2014
Anirban webappsecusa2014
 

Jun 29 - 2016-MultiFactorAuthentication