SlideShare a Scribd company logo
Citrix ShareFile is a secure data sync and sharing service
that allows organizations to mobilize all enterprise data
and empower user productivity anywhere. ShareFile
enables mobile productivity with read-write access
to data and allows users to securely share files with
anyone and sync files across all of their devices. Citrix
ShareFile has a strong presence in security-conscious
verticals, including Finance, Accounting, Legal,
Insurance and Healthcare. It was important that they
provide these customers with strong access controls to
avoid a breach of their account.
Case Study
Citrix ShareFile Provides
Additional Security to
Global Users With TeleSign
Providing current and future ShareFile
customers with the capability to leverage multifactor
authentication to protect access to their sensitive data
is a best practice that is quickly becoming industry
standard and personally gives me peace of mind.
Manny Landron, CISSP, CISA, CISM, Citrix ShareFile
Industry
• Cloud Software
Profile
• Founded in 1989
• HQ Fort Lauderdale, FL
Challenge
• Adding an extra layer of
online security that didn’t
require customers to
remember additional
usernames and passwords
Benefits
• Protects user data
• Maintain brand reputation
and trust
• Prevents account compromise
• Better user experience
Product
• SMS  Voice Verification
Challenge
Citrix ShareFile was looking for a way to add an extra layer
of online security with a robust solution that wouldn’t
require customers to remember yet another series of
usernames and passwords. Looking for a globally reliable
authentication provider that not only emphasizes security
but also the nuances of an easy user experience can be
a difficult process. Citrix ShareFile needed a partner that
could work with their UI/UX team to provide best practice
recommendations and ensure that opting in and using two-
factor authentication (2FA) would be as simple as possible
while remaining extremely secure.
TeleSign checked all the necessary requirements, including
global coverage, convenient options like voice and SMS for
every type of user, experience with similar customers, as well
as an obsession with security and user experience.
After vetting providers, Citrix ShareFile realized that TeleSign
was unmatched in the industry and would be their partner
going forward.
Solution
Citrix ShareFile gave their users the option of activating
multi-factor authentication on their ShareFile account using
TeleSign’s SMS Verification. Once users choose this option,
they are required to enter a one-time PIN code, sent to their
phone number, already on record, whenever they log in
from a new device or unknown IP address. This represents
an extra layer of protection, beyond a username and
password, which effectively blocks fraudsters from gaining
access to an account, even if a fraudster has obtained the
login credentials. Once a fraudster attempts to log in, 2FA is
activated, preventing any possibility of account compromise.
Unlike standard authentication procedures, the codes that
SMS Verification uses for 2FA login are unique and generated
new every time. Were a breach to occur, and usernames
and passwords stolen, ShareFile customers could still be
certain their data was secure. Also, to allow for occasions
when a customer might not have access to their primary
phone number, Citrix ShareFile allows them to add a back-up
number. An effective fallback, because very few people, no
matter where they happen to be, will not have access to one
of their two numbers.
Using TeleSign, Citrix can provide phone-based 2FA in
more than 200 countries in 87 languages. Citrix ShareFile’s
business partners and users can be confident that SMS
Verification is fully effective everywhere they are.
In addition to SMS Verification, Citrix ShareFile also used
TeleSign’s Voice Verification for markets where SMS coverage
may be unreliable; where receiving an SMS incurs a costs for
the user, for users who cannot receive SMS (like a fixed line
phone), or for those who just preferred to be contacted by a
voice call.
Since offering ShareFile users the option of two-factor
authentication by SMS or voice call through TeleSign Verify,
Citrix enabled security conscious customers to avoid a
breach on their account with stronger access controls. Many
competitors in the file sharing market have experienced
security issues resulting in a negative image in the press. By
using TeleSign, not only has user data been protected, but
Citrix ShareFile’s brand reputation and the trust placed in it
by its customers has remained intact.
About Citrix ShareFile
Citrix is leading the transition to software-defining the
workplace, uniting virtualization, mobility management,
networking and SaaS solutions to enable new ways for
businesses and people to work better. Citrix solutions power
business mobility through secure, mobile workspaces that
provide people with instant access to apps, desktops, data
and communications on any device, over any network and
cloud. With annual revenue in 2014 of $3.14 billion, Citrix
solutions are in use at more than 330,000 organizations and
by over 100 million users globally.
TeleSign is the leader in Mobile Identity solutions, helping
customers secure more than 3.5 billion end user accounts
worldwide and prevent registration fraud, while improving
user experience and managing costs. TeleSign delivers account
security and fraud prevention with two-factor authentication
(2FA) based on each user’s Mobile Identity (phone number,
device and behavior) and driven by real-time, global
intelligence, including reputation scoring and device data.
For more information, please visit www.telesign.com | @TeleSign
© 2015 TeleSign. All rights reserved. TeleSign,
PhoneID, TeleBureau and others are trademarks
of TeleSign Corporation, Inc. The TeleSign logo and
other creative assets are owned and protected
under copyright and/or trademark law. CSCSF315

More Related Content

What's hot

A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
FIDO Alliance
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
ForgeRock
 
INFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - finalINFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - finalGil Sasson
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
ForgeRock
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
Ubisecure
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
CloudIDSummit
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
Andris Soroka
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
Drew Koenig
 
BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry Connect
BlackBerry
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
Michael Queralt
 
Ring central with okta
Ring central with oktaRing central with okta
Ring central with okta
Anirban Sen Chowdhary
 
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
ForgeRock
 
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce
harsh rana
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
Ubisecure
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
Entrust Datacard
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
WSO2
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
Ed Brill
 

What's hot (20)

A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
INFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - finalINFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - final
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry Connect
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
Finance
FinanceFinance
Finance
 
Ring central with okta
Ring central with oktaRing central with okta
Ring central with okta
 
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
 
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
 

Similar to TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
Abhishek Sood
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Nuno Alves
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
Citrix
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
Citrix
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
InstaSafe Technologies
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineHamid Rashid
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
ForgeRock
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
Mint Group
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
Heidelberg India
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
Rajat Jain
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
Citrix
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
Nuno Alves
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.pptPulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
KendraJohnson54
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
Icomm Technologies
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
Nuno Alves
 

Similar to TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study (20)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_Online
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.pptPulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study

  • 1. Citrix ShareFile is a secure data sync and sharing service that allows organizations to mobilize all enterprise data and empower user productivity anywhere. ShareFile enables mobile productivity with read-write access to data and allows users to securely share files with anyone and sync files across all of their devices. Citrix ShareFile has a strong presence in security-conscious verticals, including Finance, Accounting, Legal, Insurance and Healthcare. It was important that they provide these customers with strong access controls to avoid a breach of their account. Case Study Citrix ShareFile Provides Additional Security to Global Users With TeleSign Providing current and future ShareFile customers with the capability to leverage multifactor authentication to protect access to their sensitive data is a best practice that is quickly becoming industry standard and personally gives me peace of mind. Manny Landron, CISSP, CISA, CISM, Citrix ShareFile Industry • Cloud Software Profile • Founded in 1989 • HQ Fort Lauderdale, FL Challenge • Adding an extra layer of online security that didn’t require customers to remember additional usernames and passwords Benefits • Protects user data • Maintain brand reputation and trust • Prevents account compromise • Better user experience Product • SMS Voice Verification
  • 2. Challenge Citrix ShareFile was looking for a way to add an extra layer of online security with a robust solution that wouldn’t require customers to remember yet another series of usernames and passwords. Looking for a globally reliable authentication provider that not only emphasizes security but also the nuances of an easy user experience can be a difficult process. Citrix ShareFile needed a partner that could work with their UI/UX team to provide best practice recommendations and ensure that opting in and using two- factor authentication (2FA) would be as simple as possible while remaining extremely secure. TeleSign checked all the necessary requirements, including global coverage, convenient options like voice and SMS for every type of user, experience with similar customers, as well as an obsession with security and user experience. After vetting providers, Citrix ShareFile realized that TeleSign was unmatched in the industry and would be their partner going forward. Solution Citrix ShareFile gave their users the option of activating multi-factor authentication on their ShareFile account using TeleSign’s SMS Verification. Once users choose this option, they are required to enter a one-time PIN code, sent to their phone number, already on record, whenever they log in from a new device or unknown IP address. This represents an extra layer of protection, beyond a username and password, which effectively blocks fraudsters from gaining access to an account, even if a fraudster has obtained the login credentials. Once a fraudster attempts to log in, 2FA is activated, preventing any possibility of account compromise. Unlike standard authentication procedures, the codes that SMS Verification uses for 2FA login are unique and generated new every time. Were a breach to occur, and usernames and passwords stolen, ShareFile customers could still be certain their data was secure. Also, to allow for occasions when a customer might not have access to their primary phone number, Citrix ShareFile allows them to add a back-up number. An effective fallback, because very few people, no matter where they happen to be, will not have access to one of their two numbers. Using TeleSign, Citrix can provide phone-based 2FA in more than 200 countries in 87 languages. Citrix ShareFile’s business partners and users can be confident that SMS Verification is fully effective everywhere they are. In addition to SMS Verification, Citrix ShareFile also used TeleSign’s Voice Verification for markets where SMS coverage may be unreliable; where receiving an SMS incurs a costs for the user, for users who cannot receive SMS (like a fixed line phone), or for those who just preferred to be contacted by a voice call. Since offering ShareFile users the option of two-factor authentication by SMS or voice call through TeleSign Verify, Citrix enabled security conscious customers to avoid a breach on their account with stronger access controls. Many competitors in the file sharing market have experienced security issues resulting in a negative image in the press. By using TeleSign, not only has user data been protected, but Citrix ShareFile’s brand reputation and the trust placed in it by its customers has remained intact. About Citrix ShareFile Citrix is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. TeleSign is the leader in Mobile Identity solutions, helping customers secure more than 3.5 billion end user accounts worldwide and prevent registration fraud, while improving user experience and managing costs. TeleSign delivers account security and fraud prevention with two-factor authentication (2FA) based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data. For more information, please visit www.telesign.com | @TeleSign © 2015 TeleSign. All rights reserved. TeleSign, PhoneID, TeleBureau and others are trademarks of TeleSign Corporation, Inc. The TeleSign logo and other creative assets are owned and protected under copyright and/or trademark law. CSCSF315