Symantec VIP:
Strong Authentication for
your organization in a cost-
effective cloud-based
model.
Nantharat Puwarang, CISSP
Sr. Technical Consultant
Key to the Cloud with Symantec VIP - Paypal
2Symantec VIP – Solution Overview
Agenda
Overview1
Validation & ID Protection Service Overview2
Use Cases3
4Symantec VIP – Solution Overview
ตัวตนบนโลกออนไลนตัวตนบนโลกออนไลนตัวตนบนโลกออนไลนตัวตนบนโลกออนไลน
“On the Internet, no-one knows you’re a dog”
5Symantec VIP – Solution Overview
IT Helpdesk Common issues with Password
Passwords No Longer Offer Sufficient Protection
Source: Forrester Research, Florida State University, Imperva
Weak passwords
still the norm
Too many
passwords for
employees to
remember
Password
change/recovery
is top access
problem
• 55% of enterprises report
this is #1 issue for users
• 87% of enterprises need users to
have 2 or more passwords
for access to resources
• 66% have 6+ password policies!
• 1 in 5 users default to
simple passwords
• Only 30% require strong auth
• 54% had a breach in last year
6Symantec VIP – Solution Overview
Security Threat
7Symantec VIP – Solution Overview
Raising Trust And Improving Security For Consumers
Organisations Users/Devices
• Must establish trust with
their users through security
and reputation services
• Must authenticate and
manage user identities
• Must be able to verify the
security and reputation of
the on-line organization
prior to interaction
• Must be able to present
identity credentials before
accessing sensitive or
personal information
Trust The Organisation
Trust The User
Symantec Enables Mutual Authentication & Trust
VeriSign® Identity Protection Network
Cloud Based One Time Passwords SSL & Trust ServicesFDS & Risk Analysis
8Symantec VIP – Solution Overview
Making Strong Authentication with 2FA
9Symantec VIP – Solution Overview
Strong Authentication Is Critical to Protecting Assets
Cryptographically enhanced credentials ensure trusted access
Username/Passwords
Mother’s Maiden Name
Transaction History
OTP passwords alternatives
(risk-based or symmetric key cryptography)
Or
Digital Certificate
(public key cryptography)
Something You Know Something You Have
10Symantec VIP – Solution Overview
OATH and OTP generation
Secret key Moving factor
Time Counter
123456
OTP
OATH (HOTP, TOTP, OCRA)
Algorithm
www.openauthentication.org
11Symantec VIP – Solution Overview
OTP validation
User’s OTP
credential
Validation
service
123456
Compare results
To validate an OTP, the Validation Service performs the same
calculation as the OTP Credential and compares the result.
123456
12Symantec VIP – Solution Overview
Symantec Validation & ID Protection Service
Enterprise
Consumer Portal,
Business Partner
Extranet
Corporate Network
Cloud-based
Real Time
Authentication
User with VIP
Credential
13Symantec VIP – Solution Overview
A Strategic Approach to Authentication
Symantec™ VIP
Standalone OTP
Credentials
HardwareToken
Mobile,Desktop
Software
Embedded
Out-of-Band
SMS
VoiceCall
Email
Strong
Device IDs
Client-based
DeviceID
ClientlessDevice
ID
Risk
Based
Intelligent
Authentication
Symantec™ VIP Provides Flexible Strong Authentication Options
14Symantec VIP – Solution Overview
Symantec Validation & ID Protection (VIP)
Easy to Use & Deploy, Multiple VIP Credentials
OTP Security Token
Mobile Phone Credentials
OTP Security Card
SMS OTP /
Voice Enabled Pass-code / Embeded
345231
Software Token
15Symantec VIP – Solution Overview
Easy to Use Management Portal
16Symantec VIP – Solution Overview
Easy to Use Self Service Portals:
• Download your mobile credentials for Android, iOS, Blackberry,
Windows Mobile, and J2ME platforms https://idprotect.verisign.com
• Manage all your
credentials
(register, rename,
test, and remove)
Update – see Notes
17Symantec VIP – Solution Overview
Use Cases 1 :
VIP RADIUS integration Enterprise
applications
18Symantec VIP – Solution Overview
Symantec VIP - Enterprise Deployment Architecture
19Symantec VIP – Solution Overview
Secure remote access: VPN
Integrates out-of-the-box to Radius-based VPN gateways.
20Symantec VIP – Solution Overview
VIP Supports Many 3rd Party Integrations
• Array Networks
• Barracuda
• Check Point
• Citrix Systems
• Cisco
• IBM
• Juniper
• Microsoft
• and more at…
http://www.symantec.com/verisign/vip-
authentication-service/agents-options-
add-ons
21Symantec VIP – Solution Overview
Use Cases 2 :
VIP Integration with Enterprise AD
22Symantec VIP – Solution Overview
VIP with Windows AD
23Symantec VIP – Solution Overview
VIP integration with Windows AD
24Symantec VIP – Solution Overview
Symantec™ VIP Intelligent Authentication
• Superior protection vs. passwords
– Analyses login risk based on
device and behavior profiling
• Transparent user experience
– Invisibly authenticates users
except in cases of high risk logins
• Unique Symantec threat protection
– Uses Norton client, Symantec
End Point Protection, and
Symantec™ Global Intelligence
Network to help defeat emerging
threats
Augmenting Symantec™ VIP with Risk-Based Authentication
25Symantec VIP – Solution Overview
How Risk-based “Intelligent Authentication” Works
Evaluate…
• Do we know this device?
• Is this device trustworthy?
• Is the user behavior suspicious?
• Are there other potential threats?
Combining Passwords With Device ID And Risk Analysis
Complex Device ID
Threat Analysis
Actionable Risk Score
…and respond
• Low Risk: Grant access without an
additional challenge
• High Risk: Challenge user via Out-
Of-Band authentication process
User Behavior
26Symantec VIP – Solution Overview
Intelligent Authentication in Action…
Gatehouse
• User ID
• Password
Roadway Scanner
• Symantec Global Intelligence Network
• Device ID
• Fingerprint
• Symantec Endpoint Protection
• User Behaviour
Enter Validation Code
Correct Code
grants Access
Send Code by
SMS, email or voice
A Triggered Response In Elevated Risk Scenarios
27Symantec VIP – Solution Overview
Symantec Authentication Security and Reliability
Experience
15 years Validating Websites, User,
and Devices, with over 400,000
clients world wide
Secure Bandwidth
3 Billion Secure Validations a Day
with 100 % uptime for over the
last 5 years in a Saas Model
28Symantec VIP – Solution Overview
Why Symantec VIP?
Planning Beyond the Immediate Risk
Deploy authentication quickly & easily with no up-
front capital investmentCost-Effective
Choose the right authentication for your application,
user, device, and use caseFlexible
Provide a positive user experience and reduce the IT
burdenUser-Friendly
Address evolving authentication requirements with a
single vendorFuture-Proof
29Symantec VIP – Solution Overview
A Few VIP Customers
30Symantec VIP – Solution Overview
Q&A
31Symantec VIP – Solution Overview
Symantec VIP – Trial Account
• Register trial at
– https://vipmanager.verisign.com/vipmgr/createtrialaccount.v
• All of software and Guide can download in Account tabs
32Symantec VIP – Solution Overview
Thank you!
SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2011 Symantec Corporation. All rights reserved.
Nantharat_puwarang@symantec.com
33Symantec VIP – Solution Overview
Hardware Requirements Software Requirements
• Intel or Intel-compatible 32-bit or
64-bit architecture
• 2 GB RAM
• 10GB disk space
One of the following operating systems:
• Microsoft Windows 2003 Enterprise R2
SP2 (32-bit)
• Microsoft Windows 2003 Enterprise SP2
(32-bit)
• Microsoft Windows 2008 Enterprise SP2
(32-bit)
• Microsoft Windows 2008 Enterprise SP2
(64-bit)
• Microsoft Windows 2008 Server R2 (64-
bit)
One of the following browsers (to access
the Configuration Console):
• Microsoft Internet Explorer 7.0 or later
• Firefox 3.0 or later
VIP Enterprise Gateway 9.0: Windows hardware and
software requirements
34Symantec VIP – Solution Overview
Hardware Requirements Software Requirements
• Intel or Intel-compatible 32-bit or
64-bit architecture
• 2 GB RAM
• 10GB disk space
One of the following operating systems:
• Red Hat Linux EL 5.x (32-bit)
• Red Hat Linux EL 5.x (64-bit)
• Red Hat Linux EL 6.1 (32-bit)
One of the following browsers (to access
the Configuration Console):
• Microsoft Internet Explorer 7.0 or later
• Firefox 3.0 or later
Supporting applications:
• GNU C Library (glibc) 2.4 or higher
VIP Enterprise Gateway 9.0: Linux hardware and
software requirements
For the latest supported platforms, check the VIP Enterprise Gateway
Installation and Configuration Guide.
35Symantec VIP – Solution Overview

Strong authentication for your organization in a cost effective cloud-based model

  • 1.
    Symantec VIP: Strong Authenticationfor your organization in a cost- effective cloud-based model. Nantharat Puwarang, CISSP Sr. Technical Consultant
  • 2.
    Key to theCloud with Symantec VIP - Paypal 2Symantec VIP – Solution Overview
  • 3.
    Agenda Overview1 Validation & IDProtection Service Overview2 Use Cases3 4Symantec VIP – Solution Overview
  • 4.
  • 5.
    IT Helpdesk Commonissues with Password Passwords No Longer Offer Sufficient Protection Source: Forrester Research, Florida State University, Imperva Weak passwords still the norm Too many passwords for employees to remember Password change/recovery is top access problem • 55% of enterprises report this is #1 issue for users • 87% of enterprises need users to have 2 or more passwords for access to resources • 66% have 6+ password policies! • 1 in 5 users default to simple passwords • Only 30% require strong auth • 54% had a breach in last year 6Symantec VIP – Solution Overview
  • 6.
    Security Threat 7Symantec VIP– Solution Overview
  • 7.
    Raising Trust AndImproving Security For Consumers Organisations Users/Devices • Must establish trust with their users through security and reputation services • Must authenticate and manage user identities • Must be able to verify the security and reputation of the on-line organization prior to interaction • Must be able to present identity credentials before accessing sensitive or personal information Trust The Organisation Trust The User Symantec Enables Mutual Authentication & Trust VeriSign® Identity Protection Network Cloud Based One Time Passwords SSL & Trust ServicesFDS & Risk Analysis 8Symantec VIP – Solution Overview
  • 8.
    Making Strong Authenticationwith 2FA 9Symantec VIP – Solution Overview
  • 9.
    Strong Authentication IsCritical to Protecting Assets Cryptographically enhanced credentials ensure trusted access Username/Passwords Mother’s Maiden Name Transaction History OTP passwords alternatives (risk-based or symmetric key cryptography) Or Digital Certificate (public key cryptography) Something You Know Something You Have 10Symantec VIP – Solution Overview
  • 10.
    OATH and OTPgeneration Secret key Moving factor Time Counter 123456 OTP OATH (HOTP, TOTP, OCRA) Algorithm www.openauthentication.org 11Symantec VIP – Solution Overview
  • 11.
    OTP validation User’s OTP credential Validation service 123456 Compareresults To validate an OTP, the Validation Service performs the same calculation as the OTP Credential and compares the result. 123456 12Symantec VIP – Solution Overview
  • 12.
    Symantec Validation &ID Protection Service Enterprise Consumer Portal, Business Partner Extranet Corporate Network Cloud-based Real Time Authentication User with VIP Credential 13Symantec VIP – Solution Overview
  • 13.
    A Strategic Approachto Authentication Symantec™ VIP Standalone OTP Credentials HardwareToken Mobile,Desktop Software Embedded Out-of-Band SMS VoiceCall Email Strong Device IDs Client-based DeviceID ClientlessDevice ID Risk Based Intelligent Authentication Symantec™ VIP Provides Flexible Strong Authentication Options 14Symantec VIP – Solution Overview
  • 14.
    Symantec Validation &ID Protection (VIP) Easy to Use & Deploy, Multiple VIP Credentials OTP Security Token Mobile Phone Credentials OTP Security Card SMS OTP / Voice Enabled Pass-code / Embeded 345231 Software Token 15Symantec VIP – Solution Overview
  • 15.
    Easy to UseManagement Portal 16Symantec VIP – Solution Overview
  • 16.
    Easy to UseSelf Service Portals: • Download your mobile credentials for Android, iOS, Blackberry, Windows Mobile, and J2ME platforms https://idprotect.verisign.com • Manage all your credentials (register, rename, test, and remove) Update – see Notes 17Symantec VIP – Solution Overview
  • 17.
    Use Cases 1: VIP RADIUS integration Enterprise applications 18Symantec VIP – Solution Overview
  • 18.
    Symantec VIP -Enterprise Deployment Architecture 19Symantec VIP – Solution Overview
  • 19.
    Secure remote access:VPN Integrates out-of-the-box to Radius-based VPN gateways. 20Symantec VIP – Solution Overview
  • 20.
    VIP Supports Many3rd Party Integrations • Array Networks • Barracuda • Check Point • Citrix Systems • Cisco • IBM • Juniper • Microsoft • and more at… http://www.symantec.com/verisign/vip- authentication-service/agents-options- add-ons 21Symantec VIP – Solution Overview
  • 21.
    Use Cases 2: VIP Integration with Enterprise AD 22Symantec VIP – Solution Overview
  • 22.
    VIP with WindowsAD 23Symantec VIP – Solution Overview
  • 23.
    VIP integration withWindows AD 24Symantec VIP – Solution Overview
  • 24.
    Symantec™ VIP IntelligentAuthentication • Superior protection vs. passwords – Analyses login risk based on device and behavior profiling • Transparent user experience – Invisibly authenticates users except in cases of high risk logins • Unique Symantec threat protection – Uses Norton client, Symantec End Point Protection, and Symantec™ Global Intelligence Network to help defeat emerging threats Augmenting Symantec™ VIP with Risk-Based Authentication 25Symantec VIP – Solution Overview
  • 25.
    How Risk-based “IntelligentAuthentication” Works Evaluate… • Do we know this device? • Is this device trustworthy? • Is the user behavior suspicious? • Are there other potential threats? Combining Passwords With Device ID And Risk Analysis Complex Device ID Threat Analysis Actionable Risk Score …and respond • Low Risk: Grant access without an additional challenge • High Risk: Challenge user via Out- Of-Band authentication process User Behavior 26Symantec VIP – Solution Overview
  • 26.
    Intelligent Authentication inAction… Gatehouse • User ID • Password Roadway Scanner • Symantec Global Intelligence Network • Device ID • Fingerprint • Symantec Endpoint Protection • User Behaviour Enter Validation Code Correct Code grants Access Send Code by SMS, email or voice A Triggered Response In Elevated Risk Scenarios 27Symantec VIP – Solution Overview
  • 27.
    Symantec Authentication Securityand Reliability Experience 15 years Validating Websites, User, and Devices, with over 400,000 clients world wide Secure Bandwidth 3 Billion Secure Validations a Day with 100 % uptime for over the last 5 years in a Saas Model 28Symantec VIP – Solution Overview
  • 28.
    Why Symantec VIP? PlanningBeyond the Immediate Risk Deploy authentication quickly & easily with no up- front capital investmentCost-Effective Choose the right authentication for your application, user, device, and use caseFlexible Provide a positive user experience and reduce the IT burdenUser-Friendly Address evolving authentication requirements with a single vendorFuture-Proof 29Symantec VIP – Solution Overview
  • 29.
    A Few VIPCustomers 30Symantec VIP – Solution Overview
  • 30.
    Q&A 31Symantec VIP –Solution Overview
  • 31.
    Symantec VIP –Trial Account • Register trial at – https://vipmanager.verisign.com/vipmgr/createtrialaccount.v • All of software and Guide can download in Account tabs 32Symantec VIP – Solution Overview
  • 32.
    Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL– INTERNAL USE ONLY Copyright © 2011 Symantec Corporation. All rights reserved. Nantharat_puwarang@symantec.com 33Symantec VIP – Solution Overview
  • 33.
    Hardware Requirements SoftwareRequirements • Intel or Intel-compatible 32-bit or 64-bit architecture • 2 GB RAM • 10GB disk space One of the following operating systems: • Microsoft Windows 2003 Enterprise R2 SP2 (32-bit) • Microsoft Windows 2003 Enterprise SP2 (32-bit) • Microsoft Windows 2008 Enterprise SP2 (32-bit) • Microsoft Windows 2008 Enterprise SP2 (64-bit) • Microsoft Windows 2008 Server R2 (64- bit) One of the following browsers (to access the Configuration Console): • Microsoft Internet Explorer 7.0 or later • Firefox 3.0 or later VIP Enterprise Gateway 9.0: Windows hardware and software requirements 34Symantec VIP – Solution Overview
  • 34.
    Hardware Requirements SoftwareRequirements • Intel or Intel-compatible 32-bit or 64-bit architecture • 2 GB RAM • 10GB disk space One of the following operating systems: • Red Hat Linux EL 5.x (32-bit) • Red Hat Linux EL 5.x (64-bit) • Red Hat Linux EL 6.1 (32-bit) One of the following browsers (to access the Configuration Console): • Microsoft Internet Explorer 7.0 or later • Firefox 3.0 or later Supporting applications: • GNU C Library (glibc) 2.4 or higher VIP Enterprise Gateway 9.0: Linux hardware and software requirements For the latest supported platforms, check the VIP Enterprise Gateway Installation and Configuration Guide. 35Symantec VIP – Solution Overview