SlideShare a Scribd company logo
Managed
Authentication
Securing access to critical data


E-business helps organizations work more effectively             _ User provisioning, account creation/deletion, logging
and efficiently, providing access to corporate information          and auditing
assets in ways never dreamed possible previously.                _ 24/7 Tata Communications’ Service Desk to support
However, as companies open their networks to distributed           token-related end-user inquiries — PIN resets, lost/
computing and a variety of remote users, valuable and              damaged token replacements, application issues, account
sensitive information is potentially exposed. Security             lockouts, modification of users and token resynchronization
breaches result in data theft and financial fraud, which can      _ Comprehensive reporting — on-demand and scheduled for
cause major financial losses and brand damage. For this             IT audits and internal billback
reason, organizations are enhancing security systems by          _ Self-service portal which enables end-users and
adding an authentication layer to verify network users.            administrators to track token usage, report generation,
                                                                   PIN generation, PIN resets and emergency token requests
To help provide this protection, Tata Communications offers      _ Money-back guarantees on the performance and
Managed Authentication as part of its portfolio of Managed         responsiveness of our Managed Authentication Service
Security Services. Leveraging two-factor authentication,         _ Performance-based SLAs and multiple service levels to
the Managed Authentication Service utilizes both a user-           best address an organization’s unique requirements
created personal identification number (PIN) and a randomly
generated token code to protect network-connected                Key Benefits
assets against unauthorized access. The token-generating         _ Cloud based model offers low cost of operation, low CAPEX,
mechanism can include a physical device carried by users           built-in scalability, reliability and out-of-the-box integration
or a software application loaded onto users’ existing cell         with existing infrastructure.
phones, PDAs or desktops.                                        _ With in-the-cloud 2FA validation, Tata Communications
                                                                   handles the complexity of securing, managing, and
Key Service Features                                               maintaining the infrastructure for strong authentication
_ Fully managed and secure authentication servers hosted at      _ Helps reduce complexity of deployment, staffing
  the Tata Communications’ Security Services Operations Center     requirements, administrative and logistics overhead, user
_ Integration and configuration of the customer’s internal          management and infrastructure costs for lower TCO
  client applications                                            _ Performance-based Service Level Agreements (SLAs) -
_ Choice of multiple form factors — Hard tokens, Desktop Soft      covering change management, proactive system
  Tokens and Mobile Soft Tokens                                    monitoring, responsiveness, availability and token
_ Token life cycle management and token provisioning               replacement




                                                                                                         Enterprise
                                                                                              Managed Security Services
Managed Authentication
—Token Options




Managed Authentication — Token Options

An organization can select the token option most appropriate for their users and security policies.


Soft Token Managed Authentication                                                  Hard Token Managed Authentication

Tata Communications’ Soft Token Authentication has been                            Tata Communications’ hardware token, provided by RSA, is
developed to help companies authenticate users securely                            a physical device that generates a One-Time Password (OTP)
and conveniently without additional security hardware. Users                       every 60 seconds. Tata Communications supports complete
are no longer required to carry around multiple multiple                           end-to-end deployment and management of these tokens
hardware tokens. Instead, users can install token software on                      by administering the procurement, provisioning, application
their existing cell phones, PDAs or desktops.                                      integration and end-user support.

_ Mobile token software can be easily installed on the user’s                      _ Unique time-synchronous approach automatically changes
  mobile device and run on Blackberry, iPhone, or any Java                           the user’s password every 60 seconds
  enabled mobile device                                                            _ RSA SecurID® authentication is built upon the Advanced
_ No replacement costs incurred — soft tokens from Tata                              Encryption Standard (AES) algorithm, a recognized
  Communications never expire                                                        standard that is continuously scrutinized and challenged
_ Cellular network connectivity or SMS client are not required                       by cryptologists around the world to ensure its strength
  to generate token codes                                                            and dependability
_ Multiple integration points for existing application and                         _ RSA SecurID Tokens support interoperability with over
  services (HTTPS Servlet, Radius, Secure Web Services)                              350 partner applications, including VPN, wireless, network
_ Supports multiple tokens on a single device                                        communications, web applications and more
                                                                                   _ Token replacement and emergency token code provided to
                                                                                     ensure continuity of service




For more information on Managed Authentication Service or other Managed Security Services, please visit
www.tatacommunications.com/enterprise/security or email security.solution@tatacommunications.com




                                                                                                                www.tatacommunications.com




    © 2009 Tata Communications Transformation Services Ltd. All Rights Reserved.                                     2P_TC_MTA-data-sheet-V1.7_oct-2009

More Related Content

What's hot

Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Systems, Inc.
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Systems, Inc.
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
Hitachi ID Systems, Inc.
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheet
Wattson Alexander Ramírez Rodas
 
Access management
Access managementAccess management
Access management
Venkatesh Jambulingam
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
Hitachi ID Systems, Inc.
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
ferasfarag
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENT
hardik soni
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 

What's hot (17)

Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
ppt
pptppt
ppt
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheet
 
Access management
Access managementAccess management
Access management
 
Ct 1 Danielson
Ct 1 DanielsonCt 1 Danielson
Ct 1 Danielson
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Implementing vpn using direct access technology
Implementing vpn using direct access technologyImplementing vpn using direct access technology
Implementing vpn using direct access technology
 
PROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENTPROACTEYE ACCESS MANAGEMENT
PROACTEYE ACCESS MANAGEMENT
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 

Similar to 2p Mta Data Sheet V1.7 X1a

Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenskate_holden
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeNet
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013Hai Nguyen
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
Kalyana Sundaram
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
AppViewX
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4x
RyanPaul Mandel
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
Entrust Datacard
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryJohan Dentant
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
gilpinleeanna
 
status
statusstatus
status
pixeldemo
 

Similar to 2p Mta Data Sheet V1.7 X1a (20)

Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
CERT_ver-1.4
CERT_ver-1.4CERT_ver-1.4
CERT_ver-1.4
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Brochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4xBrochure stonegate sslvpn-x_a4x
Brochure stonegate sslvpn-x_a4x
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_Industry
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
status
statusstatus
status
 

More from alwayson

Az Managed Ocs
Az Managed OcsAz Managed Ocs
Az Managed Ocsalwayson
 
Az Managed Mobility Services
Az Managed Mobility ServicesAz Managed Mobility Services
Az Managed Mobility Servicesalwayson
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)alwayson
 
Sas Avaya Cm Bas Admin
Sas Avaya Cm Bas AdminSas Avaya Cm Bas Admin
Sas Avaya Cm Bas Adminalwayson
 
Glovia Remote Managed Services
Glovia Remote Managed ServicesGlovia Remote Managed Services
Glovia Remote Managed Servicesalwayson
 
10833 Ovrvw Ds V14 11 5
10833 Ovrvw Ds V14 11 510833 Ovrvw Ds V14 11 5
10833 Ovrvw Ds V14 11 5alwayson
 

More from alwayson (7)

Az Managed Ocs
Az Managed OcsAz Managed Ocs
Az Managed Ocs
 
Az Managed Mobility Services
Az Managed Mobility ServicesAz Managed Mobility Services
Az Managed Mobility Services
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
 
Sas Avaya Cm Bas Admin
Sas Avaya Cm Bas AdminSas Avaya Cm Bas Admin
Sas Avaya Cm Bas Admin
 
Glovia Remote Managed Services
Glovia Remote Managed ServicesGlovia Remote Managed Services
Glovia Remote Managed Services
 
Dev004103
Dev004103Dev004103
Dev004103
 
10833 Ovrvw Ds V14 11 5
10833 Ovrvw Ds V14 11 510833 Ovrvw Ds V14 11 5
10833 Ovrvw Ds V14 11 5
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

2p Mta Data Sheet V1.7 X1a

  • 1. Managed Authentication Securing access to critical data E-business helps organizations work more effectively _ User provisioning, account creation/deletion, logging and efficiently, providing access to corporate information and auditing assets in ways never dreamed possible previously. _ 24/7 Tata Communications’ Service Desk to support However, as companies open their networks to distributed token-related end-user inquiries — PIN resets, lost/ computing and a variety of remote users, valuable and damaged token replacements, application issues, account sensitive information is potentially exposed. Security lockouts, modification of users and token resynchronization breaches result in data theft and financial fraud, which can _ Comprehensive reporting — on-demand and scheduled for cause major financial losses and brand damage. For this IT audits and internal billback reason, organizations are enhancing security systems by _ Self-service portal which enables end-users and adding an authentication layer to verify network users. administrators to track token usage, report generation, PIN generation, PIN resets and emergency token requests To help provide this protection, Tata Communications offers _ Money-back guarantees on the performance and Managed Authentication as part of its portfolio of Managed responsiveness of our Managed Authentication Service Security Services. Leveraging two-factor authentication, _ Performance-based SLAs and multiple service levels to the Managed Authentication Service utilizes both a user- best address an organization’s unique requirements created personal identification number (PIN) and a randomly generated token code to protect network-connected Key Benefits assets against unauthorized access. The token-generating _ Cloud based model offers low cost of operation, low CAPEX, mechanism can include a physical device carried by users built-in scalability, reliability and out-of-the-box integration or a software application loaded onto users’ existing cell with existing infrastructure. phones, PDAs or desktops. _ With in-the-cloud 2FA validation, Tata Communications handles the complexity of securing, managing, and Key Service Features maintaining the infrastructure for strong authentication _ Fully managed and secure authentication servers hosted at _ Helps reduce complexity of deployment, staffing the Tata Communications’ Security Services Operations Center requirements, administrative and logistics overhead, user _ Integration and configuration of the customer’s internal management and infrastructure costs for lower TCO client applications _ Performance-based Service Level Agreements (SLAs) - _ Choice of multiple form factors — Hard tokens, Desktop Soft covering change management, proactive system Tokens and Mobile Soft Tokens monitoring, responsiveness, availability and token _ Token life cycle management and token provisioning replacement Enterprise Managed Security Services
  • 2. Managed Authentication —Token Options Managed Authentication — Token Options An organization can select the token option most appropriate for their users and security policies. Soft Token Managed Authentication Hard Token Managed Authentication Tata Communications’ Soft Token Authentication has been Tata Communications’ hardware token, provided by RSA, is developed to help companies authenticate users securely a physical device that generates a One-Time Password (OTP) and conveniently without additional security hardware. Users every 60 seconds. Tata Communications supports complete are no longer required to carry around multiple multiple end-to-end deployment and management of these tokens hardware tokens. Instead, users can install token software on by administering the procurement, provisioning, application their existing cell phones, PDAs or desktops. integration and end-user support. _ Mobile token software can be easily installed on the user’s _ Unique time-synchronous approach automatically changes mobile device and run on Blackberry, iPhone, or any Java the user’s password every 60 seconds enabled mobile device _ RSA SecurID® authentication is built upon the Advanced _ No replacement costs incurred — soft tokens from Tata Encryption Standard (AES) algorithm, a recognized Communications never expire standard that is continuously scrutinized and challenged _ Cellular network connectivity or SMS client are not required by cryptologists around the world to ensure its strength to generate token codes and dependability _ Multiple integration points for existing application and _ RSA SecurID Tokens support interoperability with over services (HTTPS Servlet, Radius, Secure Web Services) 350 partner applications, including VPN, wireless, network _ Supports multiple tokens on a single device communications, web applications and more _ Token replacement and emergency token code provided to ensure continuity of service For more information on Managed Authentication Service or other Managed Security Services, please visit www.tatacommunications.com/enterprise/security or email security.solution@tatacommunications.com www.tatacommunications.com © 2009 Tata Communications Transformation Services Ltd. All Rights Reserved. 2P_TC_MTA-data-sheet-V1.7_oct-2009