SlideShare a Scribd company logo
• What is Multi-Factor Authentication
• Why MFA matters to the Enterprise?
• Introduction to XSpectra
• Demo
• Q & A
Multi-Factor Authentication - Moving Towards the Enterprise
Rohan Weerasinghe, Product Evangelist, XSpectra
Mycroft Inc.
INTRODUCTIONS
Copyright ©2014 Mycroft Inc. All rights reserved
Edward Edge, Product Evangelist, XSpectra
Mycroft Inc.
WHAT IS MFA & WHY DOES IT MATTER TO THE ENTERPRISE?
The trend is moving from relying on simple username & passwords to wider scale
use of two-factor and multi-factor authentication (MFA), such as software tokens
There are three different kinds of authentication factors:
Something you know – password, PIN, challenge questions
Something you have – fob, mobile phone (OTP), certificate
Something you are – fingerprint, facial recognition, voice pattern
Copyright ©2014 Mycroft Inc. All rights reserved
CASE IN POINT…
• FEBRUARY 26, 2014: Data breach at Indiana University - 146,000 students’ SSN exposed
• FEBRUARY 23, 2014: Apple issues fix for breach which could have provided hackers a route to read
emails, instant messages, social media posts & even online bank transactions.
• DECEMBER 19, 2013: 110M personal payment information accessed due to Target breach
• JANUARY 23, 2013: Neiman Marcus announces 1.1M customer cards hacked by malicious software
• JULY 12, 2012: Yahoo confirmed 400,000+ users info compromised. (Gmail, AOL & Hotmail)
• JULY 10, 2012: 420,000 hashed Formspring passwords were publicly posted to a third-party forum
• JUNE 5, 2012: Cloudflare’s customer accounts are breached via their CEO’s personal gmail account
• APRIL 24, 2012: Nissian announced security breach earlier this year
• FEBRUARY 13, 2012: Microsoft’s online store in India hacked, user information compromised
• FEBRUARY 11, 2012: U.K.-based TicketWeb direct marketing system hacked,
• JANUARY 15, 2012: Hackers access personal information from Zappos’ 24 million users
• JANUARY 5, 2012: 45,000 Facebook passwords compromised, mostly in the U.K. and France
AND ON & ON & ON….
TRADITIONAL ENTERPRISE WITH NETWORK PERIMETER
Enterprise Apps
Network Perimeter
Internal Employee
Public
Private
SaaS
Copyright ©2014 Mycroft Inc. All rights reserved
…and remote employees
Enterprise Apps
Network Perimeter
Internal Employee
SINGLE POINT OF PERIMETER CONTROL IS GOING AWAY
Public
Private
Mobile employee
VPN
SaaS
Copyright ©2014 Mycroft Inc. All rights reserved
…and remote employees …and cloud applications
Enterprise Apps
Network Perimeter
Cloud
Apps/Platforms
& Web Services
SaaS
Internal Employee
SINGLE POINT OF PERIMETER CONTROL IS GOING AWAY
Public
Private
Mobile employee
VPN
SaaS
Copyright ©2014 Mycroft Inc. All rights reserved
…and remote employees …and cloud applications …and external users
Partner User
Consumer
Enterprise Apps
Network Perimeter
Cloud
Apps/Platforms
& Web Services
SaaS
Internal Employee
SINGLE POINT OF PERIMETER CONTROL IS GOING AWAY
Public
Private
Mobile employee
VPN
No single perimeter to
control!
SaaS
Copyright ©2014 Mycroft Inc. All rights reserved
IDENTITY IS THE NEW PERIMETER
THE REQUIREMENT: A CENTRALIZED IDENTITY SERVICE
Enterprise
Apps
Cloud
Apps/Platforms
& Web Services
SaaS
Identity
Internal Employee
Mobile employee
Partner User
On Premise
Consumer
Copyright ©2014 Mycroft Inc. All rights reserved
XSPECTRA OVERVIEW
• On-demand IAM service based on CA CloudMinder™ based
on longest, deepest history & experience in IAM built
specifically for expansion to address full spectrum of
organizational risk needs
• Broadest & deepest feature set built for growing
companies including:
• Federated Single Sign-On
• Automated & Self Service User Management
• Multifactor Authentication
• Centralized Holistic Provisioning & De-provisioning
• Identity Platform
• Risk Based Policy Enforcement
• Addresses customer needs quickly through automation
• Top-tier Security Operations Center in compliance with
SAS 70 security standards for up to 24x7 support
• Customizations team of professional services experts in-
house to quickly address specific requirements
• IAM capabilities without need for large IT infrastructure
INTRODUCING….
 Low cost with subscription pricing
 Enterprise-class features &
functions
 HYBRID SOLUTION that integrates
on-premise & cloud apps
 Quick deployment
Copyright ©2014 Mycroft Inc. All rights reserved
CONCEPTUAL ARCHITECTURE
Copyright ©2014 Mycroft Inc. All rights reserved
MYCROFT XSPECTRA ON-DEMAND SERVICE
Strong Authentication
 QnA, OAuth, OpenID, Arcot PKI/OTP
 Security Code over SMS/Email/Voice
 Device identification
 Risk detection & prevention
 Configurable rules engine
 Adaptive and step-up authentication
 Geo-location & velocity checking
 Fraud case management
CA CloudMinder™ Advanced Authentication
Federated SSO
 Standards-based federation
 STS (Token Translation)
 Portal to launch services
 Integration with other services
CA CloudMinder™ Single Sign-on
 User management
 Access request
 Hybrid provisioning-cloud & on-premise
 Identity synchronization
CA CloudMinder™ Identity Management
Identity ManagementExpands current market offerings through:
• Full Life Cycle Provisioning to targeted endpoint
on-premise such as Active
Directory, Oracle, SAP, etc.
• Multifactor & Risk-based Authentication with
choice of credential formats
• Configurable policies for custom risk
assessments
• Federated SSO to cloud-platforms and SaaS
applications
• Self-Service capabilities such as
registration, profile management, access
requests, etc
• Seamless integration with on-premise, cloud or
hosted environments
• All the benefits of the cloud including monthly
subscription pricing, no up-front
investment, reduced in-house costs & fast access
Copyright ©2014 Mycroft Inc. All rights reserved
MYCROFT XSPECTRA ON-DEMAND SERVICE
• Enhances log-in process to provide strong
authentication
• Implements risk-based authentication
• Non-intrusive to the user experience
• Measure risk based on device
characteristics, location & velocity
• Enhances credentials to support two-
factor authentication
• Arcot ID OTP
• Arcot ID PKI
• Supports authentication attempts from
PC, Mac, tablet & phones
Copyright ©2014 Mycroft Inc. All rights reserved
Advanced Authentication
MYCROFT XSPECTRA RISK-BASED AUTHENTICATION
TWO-FACTOR AUTHENTICATION WITH OTP
• Once the user is
registered, one-time
password (OTP) is a generated
by
iPhone, Android, Blackberry, a
nd Windows clients
• The OTP is active for short
while and regenerates
periodically – usually under a
minute – however this is
configurable
• The user retrieves the OTP
using their own PIN (Personal
Identification Number)
Copyright ©2014 Mycroft Inc. All rights reserved
Copyright ©2014 Mycroft Inc. All rights reserved
MULTIFACTOR AUTHENTICATION
• Strong authentication & risk evaluation
help reduce fraud misuse
• Low TCO - efficient self-service
capabilities, no infrastructure to deploy
and no software upgrade expenses
• Compliance - Strong & risk-based
authentication can help meet
FFIEC, HIPAA, PCI and SOX guidelines
Strong Authentication
 QnA, OAuth, OpenID, Arcot PKI/OTP
 Security Code over SMS/Email/Voice
 Device identification
 Risk detection & prevention
 Configurable rules engine
 Adaptive and step-up authentication
 Geo-location & velocity checking
 Fraud case management
Copyright ©2014 Mycroft Inc. All rights reserved
Mycroft Inc.
369 Lexington Ave
New York, NY 10017 212-983-
2656
info@mycroftinc.com
www.mycroftcloud.com
@IAMXSpectra
Copyright ©2014 Mycroft Inc. All rights reserved

More Related Content

What's hot

Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
Santosh Satam
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
Salesforce Admins
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
Santosh Satam
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
IBM Security
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
xband
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
onionid12
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
David Strom
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
HYPR
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
CTM360
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
TecsyntSolutions
 

What's hot (20)

Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 

Similar to Multi-Factor Authentication - "Moving Towards the Enterprise"

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Emrah Alpa, CISSP CEH CCSK
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
AuthShield Labs
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Delivery Centric
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Michael Furman
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
BeyondTrust
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Core Security
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Symantec Brasil
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
ForgeRock
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems Pvt. Ltd
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva
 

Similar to Multi-Factor Authentication - "Moving Towards the Enterprise" (20)

Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
Lyra Infosystems - Remote Support/ Privileged Identity & Access Management
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Multi-Factor Authentication - "Moving Towards the Enterprise"

  • 1. • What is Multi-Factor Authentication • Why MFA matters to the Enterprise? • Introduction to XSpectra • Demo • Q & A Multi-Factor Authentication - Moving Towards the Enterprise
  • 2. Rohan Weerasinghe, Product Evangelist, XSpectra Mycroft Inc. INTRODUCTIONS Copyright ©2014 Mycroft Inc. All rights reserved Edward Edge, Product Evangelist, XSpectra Mycroft Inc.
  • 3. WHAT IS MFA & WHY DOES IT MATTER TO THE ENTERPRISE? The trend is moving from relying on simple username & passwords to wider scale use of two-factor and multi-factor authentication (MFA), such as software tokens There are three different kinds of authentication factors: Something you know – password, PIN, challenge questions Something you have – fob, mobile phone (OTP), certificate Something you are – fingerprint, facial recognition, voice pattern Copyright ©2014 Mycroft Inc. All rights reserved
  • 4. CASE IN POINT… • FEBRUARY 26, 2014: Data breach at Indiana University - 146,000 students’ SSN exposed • FEBRUARY 23, 2014: Apple issues fix for breach which could have provided hackers a route to read emails, instant messages, social media posts & even online bank transactions. • DECEMBER 19, 2013: 110M personal payment information accessed due to Target breach • JANUARY 23, 2013: Neiman Marcus announces 1.1M customer cards hacked by malicious software • JULY 12, 2012: Yahoo confirmed 400,000+ users info compromised. (Gmail, AOL & Hotmail) • JULY 10, 2012: 420,000 hashed Formspring passwords were publicly posted to a third-party forum • JUNE 5, 2012: Cloudflare’s customer accounts are breached via their CEO’s personal gmail account • APRIL 24, 2012: Nissian announced security breach earlier this year • FEBRUARY 13, 2012: Microsoft’s online store in India hacked, user information compromised • FEBRUARY 11, 2012: U.K.-based TicketWeb direct marketing system hacked, • JANUARY 15, 2012: Hackers access personal information from Zappos’ 24 million users • JANUARY 5, 2012: 45,000 Facebook passwords compromised, mostly in the U.K. and France AND ON & ON & ON….
  • 5. TRADITIONAL ENTERPRISE WITH NETWORK PERIMETER Enterprise Apps Network Perimeter Internal Employee Public Private SaaS Copyright ©2014 Mycroft Inc. All rights reserved
  • 6. …and remote employees Enterprise Apps Network Perimeter Internal Employee SINGLE POINT OF PERIMETER CONTROL IS GOING AWAY Public Private Mobile employee VPN SaaS Copyright ©2014 Mycroft Inc. All rights reserved
  • 7. …and remote employees …and cloud applications Enterprise Apps Network Perimeter Cloud Apps/Platforms & Web Services SaaS Internal Employee SINGLE POINT OF PERIMETER CONTROL IS GOING AWAY Public Private Mobile employee VPN SaaS Copyright ©2014 Mycroft Inc. All rights reserved
  • 8. …and remote employees …and cloud applications …and external users Partner User Consumer Enterprise Apps Network Perimeter Cloud Apps/Platforms & Web Services SaaS Internal Employee SINGLE POINT OF PERIMETER CONTROL IS GOING AWAY Public Private Mobile employee VPN No single perimeter to control! SaaS Copyright ©2014 Mycroft Inc. All rights reserved
  • 9. IDENTITY IS THE NEW PERIMETER THE REQUIREMENT: A CENTRALIZED IDENTITY SERVICE Enterprise Apps Cloud Apps/Platforms & Web Services SaaS Identity Internal Employee Mobile employee Partner User On Premise Consumer Copyright ©2014 Mycroft Inc. All rights reserved
  • 10. XSPECTRA OVERVIEW • On-demand IAM service based on CA CloudMinder™ based on longest, deepest history & experience in IAM built specifically for expansion to address full spectrum of organizational risk needs • Broadest & deepest feature set built for growing companies including: • Federated Single Sign-On • Automated & Self Service User Management • Multifactor Authentication • Centralized Holistic Provisioning & De-provisioning • Identity Platform • Risk Based Policy Enforcement • Addresses customer needs quickly through automation • Top-tier Security Operations Center in compliance with SAS 70 security standards for up to 24x7 support • Customizations team of professional services experts in- house to quickly address specific requirements • IAM capabilities without need for large IT infrastructure INTRODUCING….  Low cost with subscription pricing  Enterprise-class features & functions  HYBRID SOLUTION that integrates on-premise & cloud apps  Quick deployment Copyright ©2014 Mycroft Inc. All rights reserved
  • 11. CONCEPTUAL ARCHITECTURE Copyright ©2014 Mycroft Inc. All rights reserved
  • 12. MYCROFT XSPECTRA ON-DEMAND SERVICE Strong Authentication  QnA, OAuth, OpenID, Arcot PKI/OTP  Security Code over SMS/Email/Voice  Device identification  Risk detection & prevention  Configurable rules engine  Adaptive and step-up authentication  Geo-location & velocity checking  Fraud case management CA CloudMinder™ Advanced Authentication Federated SSO  Standards-based federation  STS (Token Translation)  Portal to launch services  Integration with other services CA CloudMinder™ Single Sign-on  User management  Access request  Hybrid provisioning-cloud & on-premise  Identity synchronization CA CloudMinder™ Identity Management Identity ManagementExpands current market offerings through: • Full Life Cycle Provisioning to targeted endpoint on-premise such as Active Directory, Oracle, SAP, etc. • Multifactor & Risk-based Authentication with choice of credential formats • Configurable policies for custom risk assessments • Federated SSO to cloud-platforms and SaaS applications • Self-Service capabilities such as registration, profile management, access requests, etc • Seamless integration with on-premise, cloud or hosted environments • All the benefits of the cloud including monthly subscription pricing, no up-front investment, reduced in-house costs & fast access Copyright ©2014 Mycroft Inc. All rights reserved
  • 13. MYCROFT XSPECTRA ON-DEMAND SERVICE • Enhances log-in process to provide strong authentication • Implements risk-based authentication • Non-intrusive to the user experience • Measure risk based on device characteristics, location & velocity • Enhances credentials to support two- factor authentication • Arcot ID OTP • Arcot ID PKI • Supports authentication attempts from PC, Mac, tablet & phones Copyright ©2014 Mycroft Inc. All rights reserved Advanced Authentication
  • 14. MYCROFT XSPECTRA RISK-BASED AUTHENTICATION
  • 15. TWO-FACTOR AUTHENTICATION WITH OTP • Once the user is registered, one-time password (OTP) is a generated by iPhone, Android, Blackberry, a nd Windows clients • The OTP is active for short while and regenerates periodically – usually under a minute – however this is configurable • The user retrieves the OTP using their own PIN (Personal Identification Number) Copyright ©2014 Mycroft Inc. All rights reserved
  • 16. Copyright ©2014 Mycroft Inc. All rights reserved
  • 17. MULTIFACTOR AUTHENTICATION • Strong authentication & risk evaluation help reduce fraud misuse • Low TCO - efficient self-service capabilities, no infrastructure to deploy and no software upgrade expenses • Compliance - Strong & risk-based authentication can help meet FFIEC, HIPAA, PCI and SOX guidelines Strong Authentication  QnA, OAuth, OpenID, Arcot PKI/OTP  Security Code over SMS/Email/Voice  Device identification  Risk detection & prevention  Configurable rules engine  Adaptive and step-up authentication  Geo-location & velocity checking  Fraud case management Copyright ©2014 Mycroft Inc. All rights reserved
  • 18. Mycroft Inc. 369 Lexington Ave New York, NY 10017 212-983- 2656 info@mycroftinc.com www.mycroftcloud.com @IAMXSpectra Copyright ©2014 Mycroft Inc. All rights reserved

Editor's Notes

  1. Employees steal, people hack, identity-centric world. Secure your stuff – market opp is total fear. - Fear, need to protect, identity centric
  2. In the past, we had a single firewall and all your employees and applications were behind it. You could run any protocols you wanted, and you had complete control. Life was good.
  3. Then, you install a VPN to deal with remote users.Along came partners and consumers who need to access your applications, both on-premise and in the cloud. There is now great complexity in managing security for the extended environment. You can no longer control the location of users, and yet you must provide convenient and secure access to your enterprise applications to them. Same with partners.[CLICK for animation]The network perimeter is now gone. There is no single perimeter anymore.A new model is necessary to deal with this complexity.
  4. Then, you install a VPN to deal with remote users.Along came partners and consumers who need to access your applications, both on-premise and in the cloud. There is now great complexity in managing security for the extended environment. You can no longer control the location of users, and yet you must provide convenient and secure access to your enterprise applications to them. Same with partners.[CLICK for animation]The network perimeter is now gone. There is no single perimeter anymore.A new model is necessary to deal with this complexity.
  5. Then, you install a VPN to deal with remote users.Along came partners and consumers who need to access your applications, both on-premise and in the cloud. There is now great complexity in managing security for the extended environment. You can no longer control the location of users, and yet you must provide convenient and secure access to your enterprise applications to them. Same with partners.The network perimeter is now gone. There is no single perimeter anymore.A new model is necessary to deal with this complexity.
  6. So, what we’re seeing is that identity has become the new perimeter. The whole notion of “inside the network” or “outside the network” is gone. The network is everywhere, and identity is what enables us to enforce security and enhance business across the whole environment.But, how does this work? A centralized identity service becomes our central control point that determines who has access to what, and enforces that policy – on premise or in the cloud.We can determine the level of authentication that is required up front, even if it’s different than what the app requires. We can authorize which app each user can use, and audit their activity across the range of apps.When a user leaves, by disabling their central authentication credentials, you can prevent them getting access to any of their apps. So, it simplifies the process of de-provisioning accounts and access upon termination.