SlideShare a Scribd company logo
© 2014 SecureAuth. All rights reserved.
2
Introduction……………………………………...…Steve Spaun
Channel Systems Overview and
The New Threat Landscape…………………..…Rick Geary
The Past, Present, and Future of
Authentication……………………………………..Milton Keath
Q&A……………………………………………...…Audience
Agenda and Speakers
© 2014 SecureAuth. All rights reserved.
©2012 Channel Systems, LLC. All Rights Reserved.
networking security storage mobility
Our Model
Our Goalis to educate and take a true Trusted Advisor approach to
help our customers solve complex use cases.
Our Focusis to continually represent some of the fastest growing and
game changing manufacturer’s technologies in Networking, Security,
Mobility and Storage.
Our Valueis to help our customers reduce risk, reduce cost, improve
business processes, centralize with an attractive Return on Investment
(ROI).
Our Visionis to continually be your analyst by doing research and due
diligence on new and upcoming Infrastructure technologies to add to
our portfolio that may help our customers.
Our Commitmentis to provide the best service and on time delivery
with the highest level of customer satisfaction.
.
TechnologyClients
OUR SOLUTIONS
We provide our clients with the best data center solutions in network, security, performance storage
and the endpoint.
Security Solutions Network Solutions
Advanced Malware Detection Access Control
Next Gen Firewall Wireless/WLAN
Database Firewall Load Balancers
Next-Gen NAC Core Network Services
Web App Firewall Gigabit Switches
Data Leakage Prevention Network Monitoring
Security Posture Management Change & Configuration Management
Security Information Event Mgmt Application Performance Monitoring
Identity Management WAN Optimization
Site-to-Site Encryption Routers and Switches
Mobility Performance Storage
Any Device; Any O/S; Any Application 100% Flash Array
Application Control NAS / SAN
Device Control 10X-50X Faster
Patch and Remediation 10X Smaller
Configuration Management 10X Less Power Consumption
Power Management 10X Easier
Antivirus Game-changing Performance
Disk Encryption Less Cost Than Spinning Disk
Identity & Threat Management Enterprise Reliability
Email & Content Management
The New Threat Landscape
© 2014 SecureAuth. All rights reserved.
2/3 of U.S. firms
report that
they have been the
victim of cyber attacks
40%
of all IT executives
expect a major
cybersecurity incident
115% CAGR
unique malware
since 2009
9,000+
malicious websites
identified per day
00.01 Every second 14 adults become a
victim of cyber crime
6.5xNumber of cyber
attacks since 2006
95new vulnerabilities
discovered each week
The IT Problem
NEW THREAT LANDSCAPE
Dynamic,
Polymorphic MalwareCoordinated Persistent Threat Actors
Multi-Vector Attacks Multi-Staged Attacks
Not Secure! What’s Changed?
© 2014 SecureAuth. All rights reserved.
10
Lets go back in history
At One Time… early 90s
The Analyst/Experts felt the ONLY way to
solve software distribution was:
• System Management Services or
• Service Oriented Management Systems
That is:
A centralized software distribution server
That kept all the “Thick Clients’ up to date
For all your latest apps
• Borland
• Sybase
• dBase
• Powerbuilder
Then:
• Every time the system needed to update
authentication and workflow:
• The CENTERALIZED server
• PUSHED to all the CONTROLLED
CLIENTS
Pretty dated Stuff, eh?
1995 Chrysler K-Car
© 2014 SecureAuth. All rights reserved.
11
Lets go back in history (cont)
 ISAPI (and other connectors) are old school
 They cause real issues in web deployments:
o Performance – they really degrade performance
o Functionality – They often break existing web and
operating functionality
o Maintenance – They require to be upgraded when web
site/app server are upgraded
• THIS IS THE #1 COMPLAINT FROM ENTERPRISES
However, in Mid 90’s web agents such as ISAPI filters
came out and WAM tools are still using them today.
1996 Hit
© 2014 SecureAuth. All rights reserved.
12
Lets go back in history (cont)
What Saved Us… mid 90’s and turn of the
Century
Was the Web
• Clientless Software
• Server Controlled Software
• No Thick Clients to update
• No devices to manage
And:
• WAMs: (Web Access Management)
• Centralized/Abstracted Web:
• SSO
• AuthN
• AuthZ
The Solution
• Allowed for access control
• To MILLIONS of Users
• And quantified/ access
• AuthN, AuthZ, Audit
• NO CLIENT UPDATES
This is at least, better, no?
2002 Toyota Celica
© 2014 SecureAuth. All rights reserved.
13
Lets go back in history (cont)
But, still have agents/connectors/filters.
This is where the ONESIES come in. Integrators come in and hack
a solution together. And what happens when a requirement changes
after 6 months?
Have to undo previous integration.
Have to pay for agent upgrades.
Authentication (2FA) and Trust (SSO) were treated as two
separate solutions.
© 2014 SecureAuth. All rights reserved.
TPAR (Target, Proxy, Authentication, Proxy)
© 2014 SecureAuth. All rights reserved.
15
3 Steps to Typical Enterprise Architecture
1. Development Team creates project
2. Enterprise Architecture Team designs workflow
A. You have to do SSO
B. What type of directory
C. How does it integrate into Apps and user Devices
D. All decisions are based on the 3 R’s
i. Roles
ii. Resources
iii. Regulations
3. Then the deployment guy has to do the integration
© 2014 SecureAuth. All rights reserved.
16
BUT
6 months later something changes
which can require major rewrite
© 2014 SecureAuth. All rights reserved.
17
AUTHENTICATION CHALLENGE
ENTERPRISES FACE
1XID
DEVICE
PASSWORD
FEW APPLICATIONS
2005
ENTERPRISE USERS:
2014
ENTERPRISE USERS:
nXIDS
DEVICES
PASSWORDS
MANY APPLICATIONS
VS.
BYOD
© 2014 SecureAuth. All rights reserved.
18
Most have heard of the AAA’s of Security
Authentication Authorization Accounting
Now there are actually 5 A’s of Security
Accept Authorization Authentication Accounting Assert
We will go more
in depth later about
TRAR along with the 5 and 6 A’s
Authentication and Trust in One Solution
© 2014 SecureAuth. All rights reserved. 2014 Chevy Volt
TRAR (Target, Redirect, Authentication, Redirect)
{Without Agents or Proxies}
Combining both
© 2014 SecureAuth. All rights reserved.
20
Present and very near Future
· Geo Fencing
· Geo Velocity
· IP Reputation
· Threat Intelligence
· TOR, Robot, Anonymizer proxy detection
Authentication, Risk Analysis, and Trust in One Solution
© 2014 SecureAuth. All rights reserved.
50th Anniversary
2015 Mustang
A classic just got better
Future of
Authentication
© 2014 SecureAuth. All rights reserved.
© 2014 SecureAuth. All rights reserved.
In a not too distant future
· Backend Attribute Exchange
Enterprise hosted data on demand through the cloud
· Combining Authentication, Big Data, Risk Analysis,
Business Intelligence and Trust together
Elio
Forward Thinking
© 2012 SecureAuth. All rights reserved.23
You have an opportunity to win an Amazon gift card
towards a 3D phone.
Schedule, by July 18th 2014, a webinar/technical demo
with Channel Systems for a SecureAuth demo and your
name will be entered into a drawing for the phone.
Please send your request to solutions@channelsys.com.
Channel Systems Certified partner of SecureAuth
24
Q&A
Who Title E-mail Phone
Steve Spaun Vice President sspaun@channelsys.com +1.817.475.5850
Rick Geary President rick@channelsys.com +1.919.699.0180
Milton Keath Sr. Sales
Engineer
milton@secureauth.com +1.817.200.7566
SecureAuth
Sales
SecureAuth
Sales
sales@secureauth.com +1.949.777.6959
Contest Entry Amazon 3D
Phone
solutions@channelsys.com
© 2014 SecureAuth. All rights reserved.

More Related Content

What's hot

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
Solarwinds N-able
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
Zscaler
 
Hackers Locked
Hackers Locked Hackers Locked
Hackers Locked
Sam S
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
Moshe Ferber
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
Cprime
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance Security
Flexera
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
Moshe Ferber
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
 
Sophos 2010
Sophos 2010 Sophos 2010
Sophos 2010
Tom Fernandes
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
Zscaler
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Moshe Ferber
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
 

What's hot (20)

Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Hackers Locked
Hackers Locked Hackers Locked
Hackers Locked
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance Security
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
 
Sophos 2010
Sophos 2010 Sophos 2010
Sophos 2010
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23   from zero to secure in 1 minute - nir valtman and moshe ferberDefcon23   from zero to secure in 1 minute - nir valtman and moshe ferber
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 

Viewers also liked

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
Hai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
Hai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
rodrida1
 
Sms based otp
Sms based otpSms based otp
Sms based otp
Hai Nguyen
 
271 300 - st-flash
271 300 - st-flash271 300 - st-flash
271 300 - st-flash
DonGilgamesh
 
La Letra Chica / Small Print
La Letra Chica / Small PrintLa Letra Chica / Small Print
La Letra Chica / Small Print
jimenezgustavo
 
Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)
Liburutegiak Kultura Saila
 
IvaBelovariZivotopis
IvaBelovariZivotopisIvaBelovariZivotopis
IvaBelovariZivotopisIva Belovari
 
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Grupo ROP Argentina
 
Techos sandwich Autoportantes
Techos sandwich AutoportantesTechos sandwich Autoportantes
Techos sandwich Autoportantes
Azul Talleres
 
Tendencias Social Media 2016
Tendencias Social Media 2016Tendencias Social Media 2016
Tendencias Social Media 2016
Adsmurai
 
Presentación 1º secundaria - CCA
Presentación 1º secundaria - CCAPresentación 1º secundaria - CCA
Presentación 1º secundaria - CCA
Kin Camp
 
Estrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de MarketingEstrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de Marketing
Germán Piñeiro Vázquez
 
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
IP-ShareMedia UG (haftungsbeschränkt)
 
Revista Forever Decembrie
Revista Forever DecembrieRevista Forever Decembrie
Revista Forever Decembrie
Iuliana Fartade
 
E4U Screening Service
E4U Screening ServiceE4U Screening Service
E4U Screening Service
madhu54321
 
Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1
guestab659f
 
SBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPTSBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPT
Eight Trails
 

Viewers also liked (20)

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
271 300 - st-flash
271 300 - st-flash271 300 - st-flash
271 300 - st-flash
 
La Letra Chica / Small Print
La Letra Chica / Small PrintLa Letra Chica / Small Print
La Letra Chica / Small Print
 
Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)Reunión grupo de trabajo eLiburutegia (2016/06/23)
Reunión grupo de trabajo eLiburutegia (2016/06/23)
 
IvaBelovariZivotopis
IvaBelovariZivotopisIvaBelovariZivotopis
IvaBelovariZivotopis
 
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
Dra. Lomuto Retinopatía del Prematuro Argentina 2011 y 1er sem 2012
 
Techos sandwich Autoportantes
Techos sandwich AutoportantesTechos sandwich Autoportantes
Techos sandwich Autoportantes
 
Tendencias Social Media 2016
Tendencias Social Media 2016Tendencias Social Media 2016
Tendencias Social Media 2016
 
Presentación 1º secundaria - CCA
Presentación 1º secundaria - CCAPresentación 1º secundaria - CCA
Presentación 1º secundaria - CCA
 
Estrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de MarketingEstrategia Integral 2.0 en el Plan de Marketing
Estrategia Integral 2.0 en el Plan de Marketing
 
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
Einladung IP-ShareMedia Forumfra 29 11 2011 Goethe Univerity Frankfurt Germany
 
Revista Forever Decembrie
Revista Forever DecembrieRevista Forever Decembrie
Revista Forever Decembrie
 
E4U Screening Service
E4U Screening ServiceE4U Screening Service
E4U Screening Service
 
Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1Maria JesúS HernáNdez SáNchez1
Maria JesúS HernáNdez SáNchez1
 
SBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPTSBDC Online Marketing Checkup - PPT
SBDC Online Marketing Checkup - PPT
 

Similar to Advanced Authentication: Past, Present, and Future

Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptx
ssuserba2d14
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile Computing
E Radar
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
Vistara
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
Andrew Ames
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
AirTight Networks
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Cyren, Inc
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
CA API Management
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Codemotion
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
Amazon Web Services
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
centralohioissa
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
David Castro
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
CA Technologies
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
JoshuaCiccone2
 
MindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationMindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_Presentation
Brad Skeel
 

Similar to Advanced Authentication: Past, Present, and Future (20)

Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptx
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Trust in Mobile Computing
Trust in Mobile ComputingTrust in Mobile Computing
Trust in Mobile Computing
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
MindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationMindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_Presentation
 

More from SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
SecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
SecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
SecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
SecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
SecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
SecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
SecureAuth
 

More from SecureAuth (20)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 

Recently uploaded

Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
sandeepmenon62
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio, Inc.
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 

Recently uploaded (20)

Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data PlatformAlluxio Webinar | 10x Faster Trino Queries on Your Data Platform
Alluxio Webinar | 10x Faster Trino Queries on Your Data Platform
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 

Advanced Authentication: Past, Present, and Future

  • 1. © 2014 SecureAuth. All rights reserved.
  • 2. 2 Introduction……………………………………...…Steve Spaun Channel Systems Overview and The New Threat Landscape…………………..…Rick Geary The Past, Present, and Future of Authentication……………………………………..Milton Keath Q&A……………………………………………...…Audience Agenda and Speakers © 2014 SecureAuth. All rights reserved.
  • 3. ©2012 Channel Systems, LLC. All Rights Reserved. networking security storage mobility
  • 4. Our Model Our Goalis to educate and take a true Trusted Advisor approach to help our customers solve complex use cases. Our Focusis to continually represent some of the fastest growing and game changing manufacturer’s technologies in Networking, Security, Mobility and Storage. Our Valueis to help our customers reduce risk, reduce cost, improve business processes, centralize with an attractive Return on Investment (ROI). Our Visionis to continually be your analyst by doing research and due diligence on new and upcoming Infrastructure technologies to add to our portfolio that may help our customers. Our Commitmentis to provide the best service and on time delivery with the highest level of customer satisfaction. . TechnologyClients
  • 5. OUR SOLUTIONS We provide our clients with the best data center solutions in network, security, performance storage and the endpoint. Security Solutions Network Solutions Advanced Malware Detection Access Control Next Gen Firewall Wireless/WLAN Database Firewall Load Balancers Next-Gen NAC Core Network Services Web App Firewall Gigabit Switches Data Leakage Prevention Network Monitoring Security Posture Management Change & Configuration Management Security Information Event Mgmt Application Performance Monitoring Identity Management WAN Optimization Site-to-Site Encryption Routers and Switches Mobility Performance Storage Any Device; Any O/S; Any Application 100% Flash Array Application Control NAS / SAN Device Control 10X-50X Faster Patch and Remediation 10X Smaller Configuration Management 10X Less Power Consumption Power Management 10X Easier Antivirus Game-changing Performance Disk Encryption Less Cost Than Spinning Disk Identity & Threat Management Enterprise Reliability Email & Content Management
  • 6. The New Threat Landscape © 2014 SecureAuth. All rights reserved.
  • 7. 2/3 of U.S. firms report that they have been the victim of cyber attacks 40% of all IT executives expect a major cybersecurity incident 115% CAGR unique malware since 2009 9,000+ malicious websites identified per day 00.01 Every second 14 adults become a victim of cyber crime 6.5xNumber of cyber attacks since 2006 95new vulnerabilities discovered each week The IT Problem
  • 8. NEW THREAT LANDSCAPE Dynamic, Polymorphic MalwareCoordinated Persistent Threat Actors Multi-Vector Attacks Multi-Staged Attacks Not Secure! What’s Changed?
  • 9. © 2014 SecureAuth. All rights reserved.
  • 10. 10 Lets go back in history At One Time… early 90s The Analyst/Experts felt the ONLY way to solve software distribution was: • System Management Services or • Service Oriented Management Systems That is: A centralized software distribution server That kept all the “Thick Clients’ up to date For all your latest apps • Borland • Sybase • dBase • Powerbuilder Then: • Every time the system needed to update authentication and workflow: • The CENTERALIZED server • PUSHED to all the CONTROLLED CLIENTS Pretty dated Stuff, eh? 1995 Chrysler K-Car © 2014 SecureAuth. All rights reserved.
  • 11. 11 Lets go back in history (cont)  ISAPI (and other connectors) are old school  They cause real issues in web deployments: o Performance – they really degrade performance o Functionality – They often break existing web and operating functionality o Maintenance – They require to be upgraded when web site/app server are upgraded • THIS IS THE #1 COMPLAINT FROM ENTERPRISES However, in Mid 90’s web agents such as ISAPI filters came out and WAM tools are still using them today. 1996 Hit © 2014 SecureAuth. All rights reserved.
  • 12. 12 Lets go back in history (cont) What Saved Us… mid 90’s and turn of the Century Was the Web • Clientless Software • Server Controlled Software • No Thick Clients to update • No devices to manage And: • WAMs: (Web Access Management) • Centralized/Abstracted Web: • SSO • AuthN • AuthZ The Solution • Allowed for access control • To MILLIONS of Users • And quantified/ access • AuthN, AuthZ, Audit • NO CLIENT UPDATES This is at least, better, no? 2002 Toyota Celica © 2014 SecureAuth. All rights reserved.
  • 13. 13 Lets go back in history (cont) But, still have agents/connectors/filters. This is where the ONESIES come in. Integrators come in and hack a solution together. And what happens when a requirement changes after 6 months? Have to undo previous integration. Have to pay for agent upgrades. Authentication (2FA) and Trust (SSO) were treated as two separate solutions. © 2014 SecureAuth. All rights reserved. TPAR (Target, Proxy, Authentication, Proxy)
  • 14. © 2014 SecureAuth. All rights reserved.
  • 15. 15 3 Steps to Typical Enterprise Architecture 1. Development Team creates project 2. Enterprise Architecture Team designs workflow A. You have to do SSO B. What type of directory C. How does it integrate into Apps and user Devices D. All decisions are based on the 3 R’s i. Roles ii. Resources iii. Regulations 3. Then the deployment guy has to do the integration © 2014 SecureAuth. All rights reserved.
  • 16. 16 BUT 6 months later something changes which can require major rewrite © 2014 SecureAuth. All rights reserved.
  • 17. 17 AUTHENTICATION CHALLENGE ENTERPRISES FACE 1XID DEVICE PASSWORD FEW APPLICATIONS 2005 ENTERPRISE USERS: 2014 ENTERPRISE USERS: nXIDS DEVICES PASSWORDS MANY APPLICATIONS VS. BYOD © 2014 SecureAuth. All rights reserved.
  • 18. 18 Most have heard of the AAA’s of Security Authentication Authorization Accounting Now there are actually 5 A’s of Security Accept Authorization Authentication Accounting Assert We will go more in depth later about TRAR along with the 5 and 6 A’s Authentication and Trust in One Solution © 2014 SecureAuth. All rights reserved. 2014 Chevy Volt TRAR (Target, Redirect, Authentication, Redirect) {Without Agents or Proxies} Combining both
  • 19. © 2014 SecureAuth. All rights reserved.
  • 20. 20 Present and very near Future · Geo Fencing · Geo Velocity · IP Reputation · Threat Intelligence · TOR, Robot, Anonymizer proxy detection Authentication, Risk Analysis, and Trust in One Solution © 2014 SecureAuth. All rights reserved. 50th Anniversary 2015 Mustang A classic just got better
  • 21. Future of Authentication © 2014 SecureAuth. All rights reserved.
  • 22. © 2014 SecureAuth. All rights reserved. In a not too distant future · Backend Attribute Exchange Enterprise hosted data on demand through the cloud · Combining Authentication, Big Data, Risk Analysis, Business Intelligence and Trust together Elio Forward Thinking
  • 23. © 2012 SecureAuth. All rights reserved.23 You have an opportunity to win an Amazon gift card towards a 3D phone. Schedule, by July 18th 2014, a webinar/technical demo with Channel Systems for a SecureAuth demo and your name will be entered into a drawing for the phone. Please send your request to solutions@channelsys.com. Channel Systems Certified partner of SecureAuth
  • 24. 24 Q&A Who Title E-mail Phone Steve Spaun Vice President sspaun@channelsys.com +1.817.475.5850 Rick Geary President rick@channelsys.com +1.919.699.0180 Milton Keath Sr. Sales Engineer milton@secureauth.com +1.817.200.7566 SecureAuth Sales SecureAuth Sales sales@secureauth.com +1.949.777.6959 Contest Entry Amazon 3D Phone solutions@channelsys.com © 2014 SecureAuth. All rights reserved.