SlideShare a Scribd company logo
SphereShield
Secure Skype for Business
V7.0
Solution Overview
SphereShield offers
advanced compliance and
security solutions for Unified
Communication services
including Skype for Business.
Targeted Services
Skype for Business on premises
Skype for Business online (conditional access only)
Microsoft Teams
Office 365 -Exchange, OneDrive, SharePoint
Cisco Webex Teams (Spark)
Slack
Zoom
Microsoft Stream
Ring Central
= Released
=Released Q3,2020
SphereShield security features
Secure Authentication
Simple and secure TFA based on device as second factor.
Protect SfB & Exchange EWS
Network Account Lockout Protection
Prevent Account lockout issues in DDoS attacks through multiple UC
channels
Device Access Control
Manage which devices can connect using device enrolment
process
SphereShield security features
MDM Conditional Access
Verify only devices that are managed by MDM and compliant with
security policy can connect
Ethical Wall Functional control
Granular policy for all activities (IM, File sharing, presence etc.)
controlling external (Federation) and internal traffic
Credential Protection
Prevent network password theft by using app specific
credentials instead of domain credentials
SphereShield security features
Application firewall
Sanitize and validating all anonymous traffic requests in the DMZ
before entering the network
DLP Content Inspection
Inspect content passing through Skype for Business by DLP
(Data Loss Prevention) policy rules
Risk Engine
Define Geo location (Geo fencing) rules. Display live map of
connections. Profile user behaviour and create security alerts events
SphereShield security features
Disclaimer
Display disclaimers for internal and external users based on domains
eDiscovery
Advanced search export and modify dashboard for Skype for
Business Archiving DB
Features in depth
Secure Authentication/TFA
Blocking any request received in network servers
unless coming from an approved device
Matching device and user based on endpoint ID sent
by client
Several registration/enrolment options are available
to enforce access control policy
Protects both Skype for
Business & Exchange (EWS)
Device Access Control
There are Three Level enrollment Options.
Automatic Registration
Device ID is registered
upon first use of account
Admin Manual enrollment
Admin management of user
list using training mode and
rejected auditing list
Self Service/Two Step
Registration
Internal site registration and
additional sync within a defined
time frame to complete
registration
Play Video Play Video
Play Video
MDM Conditional Registration
Limit the registration only to managed devices (with MDM)
Supported with all MDM vendors in the market
MDM Integration
MDM Conditional Access
Ongoing validation that device is managed and has not become Out Of Compliant
(OOC) as defined in the MDM vendor
Supported with leading vendors
MDM Conditional Registration
WIFI access control
Application
management (MAM)
VPN triggering / control
Compatible with all MDM vendors in the market
SphereShield can limit the registration of SfB to managed devices only.
Compatible with any MDM solution supporting one of the following
capabilities:
MDM Registration Using Wi Fi
MDM Registration Using SphereShield App
Play Video
MDM Registration Using VPN
MDM Conditional Access
Automatically and immediately block SfB access for devices that:
Have become Out Of Compliance
Removed from MDM control
Available for:
MDM Continuous Verification Topology
Secure Authentication
Architecture - Bastion Reverse Proxy
SphereShield solution includes Bastion which is a dedicated
reverse proxy developed by AGAT.
Can be implemented in conjunction with any generic products
such as F5, Netscaler, Barracuda, Kemp and more
Typically traffic is routed through to Bastion
Specific integration available For F5 BIG-IP
Reverse Proxy Topology
TFA + Access control Main features
View approved &
blocked devices
Restrict registration and
ongoing connection by IP
range
Access Rule black/white list
Define number of
devices per user
Allow/Block Web app
login
Filter by device type
& OS
Require re-
authentication by time
- Session termination
Disable save
password on client
Registration policy (Two
steps/ Manual/
Automatic)
General Capabilities
Multi LDAP support (for HA & distributed implantation)
Support of Multi level admin management
Web service for external event to lock/approve device/user
House keeping service - AD sync, cleanup, notification
Auditing, logs, event viewer
Reports & Search
Access Portal Reports
Authentication
Devices
Security Auditing
Failed logins
Network Account Lockout Protection
Account Lockout Occurs When:
User changed the
Active Directory
password, but did not
change the settings on
the device
Password Change
The username (without
the password)
discovered by a hacker
who tried to log in
several times
DDoS, DoS, brute force
attacks - Such attacks
can result in network
downtime
Username Hack Network Attacks
The challenge:
Multi protocol – HTTPS/SIP
Multi method – Basic, NTLM, SOAP
Multi channel – Sign in, Meeting, Web API, Exchange
Multi Locations – APAC, EMEA and USA
Network Account Lockout Protection
All failed login are audited
Activate Soft Lockout in DMZ when attack detected
Unified defense
Solution protecting all protocols, methods and channels
Application Firewall
Solve security risks from anonymous traffic entering the network
without inspection.
1. Protocol level sanitization
2. Application data validation (meeting ID)
3. Session termination and requests rewrite
Security Layers:
Ethical Wall
Solves ethical and compliance regulations,
security and data protection issues controlling
both:
Federation with external companies
Internal communication between different groups
Sample Policy - External
Sample Policy - Internal
Ethical Wall Setting
Policy
Condition
Policy Rule
Ethical Wall Policies
Ethical Wall dimensions
Control specific modalities
Build rules based on
Audio
Video
Conferencing
Present desktop
Present program
Presence
IM
File transfer
Contact card
App sharing
PowerPoint sharing
Active directory groups
External/Internal domain
External/Internal SIP
In contact list
Ethical Wall - Notification
IM user notification of Ethical wall activity/policy
Activity auditing registration - table, logs and admin
email notifications
User blocked
from a specific
operation
External user is
unable to reach
you
External user
unable to see
your presence
Ethical Wall Topology
DLP Engine
Server side solution inspecting content passing through any
channel.
Sending messages to existing DLP vendors or SphereShield
DLP engine to meet existing policies.
SphereShield DLP Engine
Actions
Block, Mask, Notify
Group membership
based rules
Content policy rules
Based on content
Such as credit card
Numbers, ID numbers,
profanity And more
Commercial DLP
integration with
Symantec, McAfee,
Forcepoint and any
standard ICAP interface
DLP engine
DLP Topology
DLP Notification Sample
Play Video
Active Directory Credential Protection
Connect using App dedicated Skype credentials
Eliminate risk of domain password theft
No storage of Active Directory passwords on server or device
Supports Exchange & Skype with one App credentials
A new approach in protecting the Active Directory
credentials.
Active Directory App login
Creating dedicated Skype
credential on a self service
internal web site for use on
the device, instead of Active
Directory credentials.
Play Video
SphereShield Credentials Architecture
Mobile Smart Card Solution
With the dedicated login
solution, the user logs into
the Access Portal
Authenticates to the
network computer using a
smart card
Creates a dedicated
password for use on
device
Network login without username and password for Active
Directory
RSA integration
Users enter their RSA Token authentication code instead of
Active Directory password
SphereShield verifies password against RSA
Authentication Manager and impersonate user against
Skype
Strong TFA
Avoid using domain credentials
Disclaimers rules
Set disclaimer for internal and external (federated or guests) based domain
Disclaimer types
Internal User Client
Presented to the internal user in the
SfB client every time a new
conversation/conference has
started.
IM Conversation
Included with the first IM message
sent while the communication is a
conversation (one on one).
IM Conference
Sent as IM once a user has joined
the conference.
Invite To External Conference
Sent as IM to internal user when he
was invited to an external
conference.
eDiscovery
Advanced
search by text,
user, dates and
more
Search for personal
information
Data governance
Export user data
See message context
in incidents
Delete personal
information
eDiscovery
Risk Engine
Geo Fencing
Geo Fencing Settings
Set Geo Fencing rules based on
groups, domains or users.
Allow, block or monitor access from
specific countries.
Integrated/Partnered Technologies
McAfee
ForcePoint
Symantec
GTB
Microsoft
F5 networks
Citrix
Data Loss PreventionInfrastructure EMM/MDM
MobileIron
VMWARE AirWatch
IBM MaaS360
BlackBerry
Citrix XenMobile
PKI
Faitien
Gemalto
Authentication
Google authenticator
RSA secureID
Product Documents
Skype for
Business Security
Threats
SphereShield
datasheet
SphereShield
product page
More Info
Visit our website
AGAT Software
Contact us
info@agatsoftware.com
+972-525209860
Thank you

More Related Content

What's hot

Virtual assistant presentation
Virtual assistant presentationVirtual assistant presentation
Virtual assistant presentation
AGAT2
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
AlgoSec
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
Precisely
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
Yoav Crombie
 
Sandboxing
SandboxingSandboxing
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
davebrosnan
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
jasonlan
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
Eoin Keary
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
Ricardo Resnik
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
Sandboxing
SandboxingSandboxing
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
MarketingArrowECS_CZ
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
Rodrigo Martini
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Ajin Abraham
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
Ricardo Resnik
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
Castleforce
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Benelux
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
Mike Wallen
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
Tatyana Kobets
 

What's hot (20)

Virtual assistant presentation
Virtual assistant presentationVirtual assistant presentation
Virtual assistant presentation
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
SkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for BusinessSkypeShield - Securing Skype for Business
SkypeShield - Securing Skype for Business
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
00. introduction to app sec v3
00. introduction to app sec v300. introduction to app sec v3
00. introduction to app sec v3
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015Hacking Tizen : The OS of Everything - Nullcon Goa 2015
Hacking Tizen : The OS of Everything - Nullcon Goa 2015
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 
Sophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of SophosSophos Security Day Belgium - The Hidden Gems of Sophos
Sophos Security Day Belgium - The Hidden Gems of Sophos
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 

Similar to SphereShield for Skype for Business - Compliance and Security

SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
AGATSoftware
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
Information Security Services SA
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Information Security Services SA
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
ILANTUS Technologies
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
VMware Academy
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
Tatyana Kobets
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
jasonlan
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
OneLogin
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
Pavel Fyodorov
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
Peter Daalmans
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
Anthony Daniel
 
Soa security2
Soa security2Soa security2
Soa security2
wardell henley
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
Scott Hoag
 
Week Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptxWeek Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptx
ArjayBalberan1
 

Similar to SphereShield for Skype for Business - Compliance and Security (20)

SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Flak+technologies
Flak+technologiesFlak+technologies
Flak+technologies
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
Agnitum Technology Licensing
Agnitum Technology LicensingAgnitum Technology Licensing
Agnitum Technology Licensing
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Soa security2
Soa security2Soa security2
Soa security2
 
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
 
Week Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptxWeek Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptx
 

Recently uploaded

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
aisafed42
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
anfaltahir1010
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 

Recently uploaded (20)

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 

SphereShield for Skype for Business - Compliance and Security

  • 2. Solution Overview SphereShield offers advanced compliance and security solutions for Unified Communication services including Skype for Business.
  • 3. Targeted Services Skype for Business on premises Skype for Business online (conditional access only) Microsoft Teams Office 365 -Exchange, OneDrive, SharePoint Cisco Webex Teams (Spark) Slack Zoom Microsoft Stream Ring Central = Released =Released Q3,2020
  • 4. SphereShield security features Secure Authentication Simple and secure TFA based on device as second factor. Protect SfB & Exchange EWS Network Account Lockout Protection Prevent Account lockout issues in DDoS attacks through multiple UC channels Device Access Control Manage which devices can connect using device enrolment process
  • 5. SphereShield security features MDM Conditional Access Verify only devices that are managed by MDM and compliant with security policy can connect Ethical Wall Functional control Granular policy for all activities (IM, File sharing, presence etc.) controlling external (Federation) and internal traffic Credential Protection Prevent network password theft by using app specific credentials instead of domain credentials
  • 6. SphereShield security features Application firewall Sanitize and validating all anonymous traffic requests in the DMZ before entering the network DLP Content Inspection Inspect content passing through Skype for Business by DLP (Data Loss Prevention) policy rules Risk Engine Define Geo location (Geo fencing) rules. Display live map of connections. Profile user behaviour and create security alerts events
  • 7. SphereShield security features Disclaimer Display disclaimers for internal and external users based on domains eDiscovery Advanced search export and modify dashboard for Skype for Business Archiving DB
  • 9. Secure Authentication/TFA Blocking any request received in network servers unless coming from an approved device Matching device and user based on endpoint ID sent by client Several registration/enrolment options are available to enforce access control policy Protects both Skype for Business & Exchange (EWS)
  • 10. Device Access Control There are Three Level enrollment Options. Automatic Registration Device ID is registered upon first use of account Admin Manual enrollment Admin management of user list using training mode and rejected auditing list Self Service/Two Step Registration Internal site registration and additional sync within a defined time frame to complete registration Play Video Play Video Play Video
  • 11. MDM Conditional Registration Limit the registration only to managed devices (with MDM) Supported with all MDM vendors in the market MDM Integration MDM Conditional Access Ongoing validation that device is managed and has not become Out Of Compliant (OOC) as defined in the MDM vendor Supported with leading vendors
  • 12. MDM Conditional Registration WIFI access control Application management (MAM) VPN triggering / control Compatible with all MDM vendors in the market SphereShield can limit the registration of SfB to managed devices only. Compatible with any MDM solution supporting one of the following capabilities:
  • 14. MDM Registration Using SphereShield App Play Video
  • 16. MDM Conditional Access Automatically and immediately block SfB access for devices that: Have become Out Of Compliance Removed from MDM control Available for:
  • 19. Architecture - Bastion Reverse Proxy SphereShield solution includes Bastion which is a dedicated reverse proxy developed by AGAT. Can be implemented in conjunction with any generic products such as F5, Netscaler, Barracuda, Kemp and more Typically traffic is routed through to Bastion Specific integration available For F5 BIG-IP
  • 21. TFA + Access control Main features View approved & blocked devices Restrict registration and ongoing connection by IP range Access Rule black/white list Define number of devices per user Allow/Block Web app login Filter by device type & OS Require re- authentication by time - Session termination Disable save password on client Registration policy (Two steps/ Manual/ Automatic)
  • 22. General Capabilities Multi LDAP support (for HA & distributed implantation) Support of Multi level admin management Web service for external event to lock/approve device/user House keeping service - AD sync, cleanup, notification Auditing, logs, event viewer Reports & Search
  • 24. Network Account Lockout Protection Account Lockout Occurs When: User changed the Active Directory password, but did not change the settings on the device Password Change The username (without the password) discovered by a hacker who tried to log in several times DDoS, DoS, brute force attacks - Such attacks can result in network downtime Username Hack Network Attacks The challenge: Multi protocol – HTTPS/SIP Multi method – Basic, NTLM, SOAP Multi channel – Sign in, Meeting, Web API, Exchange Multi Locations – APAC, EMEA and USA
  • 25. Network Account Lockout Protection All failed login are audited Activate Soft Lockout in DMZ when attack detected Unified defense Solution protecting all protocols, methods and channels
  • 26. Application Firewall Solve security risks from anonymous traffic entering the network without inspection. 1. Protocol level sanitization 2. Application data validation (meeting ID) 3. Session termination and requests rewrite Security Layers:
  • 27. Ethical Wall Solves ethical and compliance regulations, security and data protection issues controlling both: Federation with external companies Internal communication between different groups
  • 28. Sample Policy - External
  • 29. Sample Policy - Internal
  • 32. Ethical Wall dimensions Control specific modalities Build rules based on Audio Video Conferencing Present desktop Present program Presence IM File transfer Contact card App sharing PowerPoint sharing Active directory groups External/Internal domain External/Internal SIP In contact list
  • 33. Ethical Wall - Notification IM user notification of Ethical wall activity/policy Activity auditing registration - table, logs and admin email notifications User blocked from a specific operation External user is unable to reach you External user unable to see your presence
  • 35. DLP Engine Server side solution inspecting content passing through any channel. Sending messages to existing DLP vendors or SphereShield DLP engine to meet existing policies.
  • 36. SphereShield DLP Engine Actions Block, Mask, Notify Group membership based rules Content policy rules Based on content Such as credit card Numbers, ID numbers, profanity And more Commercial DLP integration with Symantec, McAfee, Forcepoint and any standard ICAP interface DLP engine
  • 39. Active Directory Credential Protection Connect using App dedicated Skype credentials Eliminate risk of domain password theft No storage of Active Directory passwords on server or device Supports Exchange & Skype with one App credentials A new approach in protecting the Active Directory credentials.
  • 40. Active Directory App login Creating dedicated Skype credential on a self service internal web site for use on the device, instead of Active Directory credentials. Play Video
  • 42. Mobile Smart Card Solution With the dedicated login solution, the user logs into the Access Portal Authenticates to the network computer using a smart card Creates a dedicated password for use on device Network login without username and password for Active Directory
  • 43. RSA integration Users enter their RSA Token authentication code instead of Active Directory password SphereShield verifies password against RSA Authentication Manager and impersonate user against Skype Strong TFA Avoid using domain credentials
  • 44. Disclaimers rules Set disclaimer for internal and external (federated or guests) based domain
  • 45. Disclaimer types Internal User Client Presented to the internal user in the SfB client every time a new conversation/conference has started. IM Conversation Included with the first IM message sent while the communication is a conversation (one on one). IM Conference Sent as IM once a user has joined the conference. Invite To External Conference Sent as IM to internal user when he was invited to an external conference.
  • 46. eDiscovery Advanced search by text, user, dates and more Search for personal information Data governance Export user data See message context in incidents Delete personal information
  • 50. Geo Fencing Settings Set Geo Fencing rules based on groups, domains or users. Allow, block or monitor access from specific countries.
  • 51. Integrated/Partnered Technologies McAfee ForcePoint Symantec GTB Microsoft F5 networks Citrix Data Loss PreventionInfrastructure EMM/MDM MobileIron VMWARE AirWatch IBM MaaS360 BlackBerry Citrix XenMobile PKI Faitien Gemalto Authentication Google authenticator RSA secureID
  • 52. Product Documents Skype for Business Security Threats SphereShield datasheet SphereShield product page
  • 53. More Info Visit our website AGAT Software Contact us info@agatsoftware.com +972-525209860 Thank you