SlideShare a Scribd company logo
Addressing Password Creep withDigitalPersona Pro Jim FultonVice President, DigitalPersona
Best-in-class centrally-managed solutions Over 95M users worldwide use DigitalPersona technology Award-winning products SC Magazine, 5-Star Best Buy, 2008 and 2009 Frost & Sullivan, Global Product Differentiation Innovation, 2007 CRN, Emerging Tech Vendor, 2007 Info Security Product Guide, Best Deployment Scenario, 2006 Microsoft Innovations, 2004 HP partner for Endpoint Protection software Delivering centrally-managed security for SMBs and Enterprises Global company, headquartered in Silicon Valley, USA Founded in 1997; operations in Americas, EMEA and Asia Who is DigitalPersona
DigitalPersona – A Leader In Security Government Retail/POS Healthcare Energy Education Financial Services OEMs
Where is Password Creep Coming From Password Mandates ,[object Object],Application Enforcement ,[object Object],User Errors/Confusion
Where is Password Creep Coming From Password Mandates ,[object Object],Application Enforcement ,[object Object],User Errors/Confusion Rising Helpdesk Costs + Uncertain Compliance
This Problem Takes Many Forms Access Management Secure logon and authentication for networks and applications Data Protection Encryption for computers and data at rest Secure Communications Digital signature and secure file sharing
Managing Many Security Systems is Challenging Manage Manage Manage Manage Manage SecureEmail &Documents Full DiskEncryption SecureVPN SingleSign-On(SSO) Smartcards,Tokens,Biometrics
Managing Many Security Systems is Challenging Manage Manage Manage Manage Manage Different products don’t fit together ,[object Object]
Complex for IT & usersSecureEmail &Documents Full DiskEncryption SecureVPN SingleSign-On(SSO) Smartcards,Tokens,Biometrics
Central Management is the Solution ControlAccess ProtectData Businesses can nowcentrally managesecurity policies throughDigitalPersona Pro Manage Secure Communications All-in-one Endpoint ProtectionStrong|Easy to Manage|Affordable
Solutions Powered by DigitalPersona Pro Data Protection Access Recovery Encrypt customer data and IP Recover access to locked computers Remote Access Security Single Sign-On Multi-factor VPN authentication Eliminate password burdens/costs Strong Authentication Compliance Know who did what, where Implement strong controls Secure Communications Fast access Digital signature and encryptionfor email and shared files Improve productivity for shared PCs
Example: Addressing CJIS for Government Agencies CJIS requires advanced authentication ,[object Object]
2-Factor AuthenticationCJIS mandates data encryption
Example: Addressing CJIS for Government Agencies DigitalPersona Pro simplifies strong passwords Eliminate password reset burdens on helpdesk – fast ROI Prevent sharing of passwords, social engineering attacks Enables strong authentication Fingerprints, smart cards, face Windows, Web, Citrix, VPNs, legacy apps Enables disk and file encryption CJIS requires advanced authentication ,[object Object]
2-Factor AuthenticationCJIS mandates data encryption my$trongP@ssw0rd!
How Strong Passwords Are Made Simple
DigitalPersona Pro Gives IT Control Over Authentication
DigitalPersona Pro Enters Passwords for the User myusername ********
Strong Security Becomes Simple And the user is logged in! myusername ********
Example: Preventing Disasters What do you do when users run into problems? Forgotten passwords Lost smartcards Damaged hardware COMPANYNETob_Smith
DigitalPersona Pro Access Recovery Administrators can give users an unlock code – even when users are on the road

More Related Content

What's hot

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
Petr Dvorak
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
Intel IT Center
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
IBM Security
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
edwinlorenzana
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
IAM: Getting the basics right
IAM: Getting the basics rightIAM: Getting the basics right
IAM: Getting the basics right
David Doret
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Systems, Inc.
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Sierraware
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
ObserveIT
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
Enterprise Management Associates
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
Prof. Jacques Folon (Ph.D)
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
Brandon Dunlap
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
J
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
OneLogin
 

What's hot (20)

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
IAM: Getting the basics right
IAM: Getting the basics rightIAM: Getting the basics right
IAM: Getting the basics right
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 

Viewers also liked

Jan13slides
Jan13slidesJan13slides
Jan13slides
ifcaonline
 
Mette Klingenberg og Lotte Christensen - gården bag palisaden
Mette Klingenberg og Lotte Christensen - gården bag palisadenMette Klingenberg og Lotte Christensen - gården bag palisaden
Mette Klingenberg og Lotte Christensen - gården bag palisaden
Association of Danish Museums / Organisationen Danske Museer
 
Prezentace
PrezentacePrezentace
Prezentace835329
 
Birgitte Faurhøj Olsen - orientering om nyfundne kalkmalerier
Birgitte Faurhøj Olsen  - orientering om nyfundne kalkmalerierBirgitte Faurhøj Olsen  - orientering om nyfundne kalkmalerier
Birgitte Faurhøj Olsen - orientering om nyfundne kalkmalerier
Association of Danish Museums / Organisationen Danske Museer
 
Psd funding report final
Psd funding report finalPsd funding report final
Psd funding report final
Brandon Williams
 
Fra campingvogn til kulturarvstjeneste
Fra campingvogn til kulturarvstjenesteFra campingvogn til kulturarvstjeneste
Fra campingvogn til kulturarvstjeneste
Association of Danish Museums / Organisationen Danske Museer
 
Applicant webinar tobacco community initiatives
Applicant webinar tobacco community initiativesApplicant webinar tobacco community initiatives
Applicant webinar tobacco community initiatives
Brandon Williams
 
Programmeren in alice[1]
Programmeren in alice[1]Programmeren in alice[1]
Programmeren in alice[1]Gilles Horemans
 
2 nws social_media_edited
2 nws social_media_edited2 nws social_media_edited
2 nws social_media_edited
Brandon Williams
 
شروط ومعايير الاستفادة من الدعم المباشر للنساء الأرامل
شروط ومعايير الاستفادة من الدعم المباشر للنساء الأراملشروط ومعايير الاستفادة من الدعم المباشر للنساء الأرامل
شروط ومعايير الاستفادة من الدعم المباشر للنساء الأراملياسين محمد
 

Viewers also liked (20)

Peter Bye Jensen, De levede og de døde i hårup - gravpladsen
Peter Bye Jensen, De levede og de døde i hårup - gravpladsenPeter Bye Jensen, De levede og de døde i hårup - gravpladsen
Peter Bye Jensen, De levede og de døde i hårup - gravpladsen
 
Mogens Bo Henriksen, Voldtofte
Mogens Bo Henriksen, VoldtofteMogens Bo Henriksen, Voldtofte
Mogens Bo Henriksen, Voldtofte
 
Jan13slides
Jan13slidesJan13slides
Jan13slides
 
Mette Klingenberg og Lotte Christensen - gården bag palisaden
Mette Klingenberg og Lotte Christensen - gården bag palisadenMette Klingenberg og Lotte Christensen - gården bag palisaden
Mette Klingenberg og Lotte Christensen - gården bag palisaden
 
Morten D. D. Hansen: Passion og massemedier. ODM Internationalt Formidlingsse...
Morten D. D. Hansen: Passion og massemedier. ODM Internationalt Formidlingsse...Morten D. D. Hansen: Passion og massemedier. ODM Internationalt Formidlingsse...
Morten D. D. Hansen: Passion og massemedier. ODM Internationalt Formidlingsse...
 
Prezentace
PrezentacePrezentace
Prezentace
 
Henrik Sell - tilbage til istiden
Henrik Sell -  tilbage til istidenHenrik Sell -  tilbage til istiden
Henrik Sell - tilbage til istiden
 
Udstilling af mumier
Udstilling af mumierUdstilling af mumier
Udstilling af mumier
 
Birgitte Faurhøj Olsen - orientering om nyfundne kalkmalerier
Birgitte Faurhøj Olsen  - orientering om nyfundne kalkmalerierBirgitte Faurhøj Olsen  - orientering om nyfundne kalkmalerier
Birgitte Faurhøj Olsen - orientering om nyfundne kalkmalerier
 
Psd funding report final
Psd funding report finalPsd funding report final
Psd funding report final
 
Fra campingvogn til kulturarvstjeneste
Fra campingvogn til kulturarvstjenesteFra campingvogn til kulturarvstjeneste
Fra campingvogn til kulturarvstjeneste
 
Jørgen Westphal, Bevaringsprincipper
Jørgen Westphal, BevaringsprincipperJørgen Westphal, Bevaringsprincipper
Jørgen Westphal, Bevaringsprincipper
 
Ulla Schaltz, Give me five
Ulla Schaltz, Give me fiveUlla Schaltz, Give me five
Ulla Schaltz, Give me five
 
Anja Vegebjerg Jensen, Forhistorisk uheld = arkæologisk lykketræf
Anja Vegebjerg Jensen, Forhistorisk uheld = arkæologisk lykketræfAnja Vegebjerg Jensen, Forhistorisk uheld = arkæologisk lykketræf
Anja Vegebjerg Jensen, Forhistorisk uheld = arkæologisk lykketræf
 
Julie Lolk, Toftesøgård
Julie Lolk, ToftesøgårdJulie Lolk, Toftesøgård
Julie Lolk, Toftesøgård
 
Stine Laursen De der blev hjemme
Stine Laursen De der blev hjemmeStine Laursen De der blev hjemme
Stine Laursen De der blev hjemme
 
Applicant webinar tobacco community initiatives
Applicant webinar tobacco community initiativesApplicant webinar tobacco community initiatives
Applicant webinar tobacco community initiatives
 
Programmeren in alice[1]
Programmeren in alice[1]Programmeren in alice[1]
Programmeren in alice[1]
 
2 nws social_media_edited
2 nws social_media_edited2 nws social_media_edited
2 nws social_media_edited
 
شروط ومعايير الاستفادة من الدعم المباشر للنساء الأرامل
شروط ومعايير الاستفادة من الدعم المباشر للنساء الأراملشروط ومعايير الاستفادة من الدعم المباشر للنساء الأرامل
شروط ومعايير الاستفادة من الدعم المباشر للنساء الأرامل
 

Similar to Addressing Password Creep

Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
Samsung SDS America
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
Plain Concepts
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
BVU
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Enterprise Management Associates
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
DWP Information Architects Inc.
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
David J Rosenthal
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
SecureAuth
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
SimplySecure Reseller SA Amit
SimplySecure Reseller SA AmitSimplySecure Reseller SA Amit
SimplySecure Reseller SA Amit
Amit Parbhucharan
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
ClickSSL
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
NovaQuantum
 

Similar to Addressing Password Creep (20)

Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SimplySecure Reseller SA Amit
SimplySecure Reseller SA AmitSimplySecure Reseller SA Amit
SimplySecure Reseller SA Amit
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

Addressing Password Creep

  • 1. Addressing Password Creep withDigitalPersona Pro Jim FultonVice President, DigitalPersona
  • 2. Best-in-class centrally-managed solutions Over 95M users worldwide use DigitalPersona technology Award-winning products SC Magazine, 5-Star Best Buy, 2008 and 2009 Frost & Sullivan, Global Product Differentiation Innovation, 2007 CRN, Emerging Tech Vendor, 2007 Info Security Product Guide, Best Deployment Scenario, 2006 Microsoft Innovations, 2004 HP partner for Endpoint Protection software Delivering centrally-managed security for SMBs and Enterprises Global company, headquartered in Silicon Valley, USA Founded in 1997; operations in Americas, EMEA and Asia Who is DigitalPersona
  • 3. DigitalPersona – A Leader In Security Government Retail/POS Healthcare Energy Education Financial Services OEMs
  • 4.
  • 5.
  • 6. This Problem Takes Many Forms Access Management Secure logon and authentication for networks and applications Data Protection Encryption for computers and data at rest Secure Communications Digital signature and secure file sharing
  • 7. Managing Many Security Systems is Challenging Manage Manage Manage Manage Manage SecureEmail &Documents Full DiskEncryption SecureVPN SingleSign-On(SSO) Smartcards,Tokens,Biometrics
  • 8.
  • 9. Complex for IT & usersSecureEmail &Documents Full DiskEncryption SecureVPN SingleSign-On(SSO) Smartcards,Tokens,Biometrics
  • 10. Central Management is the Solution ControlAccess ProtectData Businesses can nowcentrally managesecurity policies throughDigitalPersona Pro Manage Secure Communications All-in-one Endpoint ProtectionStrong|Easy to Manage|Affordable
  • 11. Solutions Powered by DigitalPersona Pro Data Protection Access Recovery Encrypt customer data and IP Recover access to locked computers Remote Access Security Single Sign-On Multi-factor VPN authentication Eliminate password burdens/costs Strong Authentication Compliance Know who did what, where Implement strong controls Secure Communications Fast access Digital signature and encryptionfor email and shared files Improve productivity for shared PCs
  • 12.
  • 14.
  • 15. 2-Factor AuthenticationCJIS mandates data encryption my$trongP@ssw0rd!
  • 16. How Strong Passwords Are Made Simple
  • 17. DigitalPersona Pro Gives IT Control Over Authentication
  • 18. DigitalPersona Pro Enters Passwords for the User myusername ********
  • 19. Strong Security Becomes Simple And the user is logged in! myusername ********
  • 20. Example: Preventing Disasters What do you do when users run into problems? Forgotten passwords Lost smartcards Damaged hardware COMPANYNETob_Smith
  • 21. DigitalPersona Pro Access Recovery Administrators can give users an unlock code – even when users are on the road
  • 22. DigitalPersona Pro Access Recovery Administrators can give users an unlock code – even when users are on the road COMPANYNETob_Smith Prevent Lockouts
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.

Editor's Notes

  1. Easy for you
  2. Easy ComplianceThe Department of Justice created a great slide deck at the tenth annual CIB Technology Conference which breaks down the CJIS requirements
  3. Easy ComplianceThe Department of Justice created a great slide deck at the tenth annual CIB Technology Conference which breaks down the CJIS requirements
  4. What do you do with encryption when they forget and they are in the field?
  5. Strong Security, but easier on you and your users, no loss in productivity
  6. Strong Security, but easier on you and your users, no loss in productivity
  7. Advantages: simpler and better value-for-moneyEasier and less expensive to manage and maintain – e.g. at least 30% TCO savings vs. combining several “point” solutionsImproved overall performance thanks to integration across applications – e.g. no incompatibility, security policies are always sync’dImproved user adoption and lower support costs – e.g. saving just one support call per user may pay back the cost of the software
  8. Advantages: simpler and better value-for-moneyEasier and less expensive to manage and maintain – e.g. at least 30% TCO savings vs. combining several “point” solutionsImproved overall performance thanks to integration across applications – e.g. no incompatibility, security policies are always sync’dImproved user adoption and lower support costs – e.g. saving just one support call per user may pay back the cost of the software