Soft-Tronik - Partner Security Konferencia Bezpe čnostné ... · PDF fileSoft-Tronik - Partner Security Konferencia Bezpe čnostné riešenia pre Business ... RSA SecurID ® authentication

  • Upload
    vocong

  • View
    218

  • Download
    1

Embed Size (px)

Citation preview

  • Soft-Tronik - Partner Security Konferencia

    Bezpenostn rieenia pre BusinessakcelerciuKarol Piling [email protected] +421905856352

    SE C&EE

  • 2

    IT Customer Landscape

  • 3

    secure datasecure access

    Introducing Information-centric Security

    customers

    partners

    employees

    security information management

    secure enterprise dataPreserve the confidentiality and integrity of critical data wherever it resides

    secure employee accessEnable secure, anytime, anywhere access to corporate resources

    secure partner accessOpen internal systems to trusted partners

    secure customer accessOffer self-service channels, prevent fraud, and enhance consumer confidence

    manage security informationComply with security policy and regulations

  • RSA SecurID update

  • 5

    Corporate Office

    From inside the organization:Secure Enterprise Access

    Growing Need for Secure Information AccessFrom Outside and Within the Organization

    Web and

    Browser

    Apps

    EnterpriseSSO

    MicrosoftLogon

    WirelessNetwork

    Desktop

    Apps

    IT Infra-

    structure

    TerminalServices

    From outside the organization:Secure Remote Access

    Corporate Office

    Web Apps Terminal Services

    E-mail

    VPN

  • 6

    RSA SecurIDTime Synchronous Two-Factor Authentication

    RSAAuthentication

    Manager

    RAS,VPN,

    Web Server,

    WAP

    etc.

    RSA Authentication

    Agent

    SeedTime

    Algorithm

    SeedTime

    032848032848

    Algorithm

    Same SeedSame Seed

    Same TimeSame Time

  • 7

    RSA SecurID a broad range of form factors today

    RSA SecurID Hardware Tokens SID700,

    SID900 Transaction signing token

    - Classic SecurID

    SID800 as a smart card and SecurID token

    Two factor with windows credential or certificate

    Key for unlocking Hard Disk Encryption solution s

    Access to Digital Certificates for secure e-mail, signing, and file encryption needs

    Boot and HDD encryption

    Pointsec, Safeboot, Ultimaco, Winmagic ... www.rsasecured.com

  • 8

    Boot Process

    Secures OSbefore it starts

    User found in Disk Encryption Vendor Database

    End-user certificate

    cross-referenced

    Operating System

    Secure Data

    System Files

    Windows Windows WebHost Citrix

    Windows Java

    Replacing user names and passwords with strong authentication when logging into disk encryption solution ensures greater desktop and laptop security

    Hard Disk Encryption Solution

    RSA SecurID authentication for Secure Remote AccessSecuring the Remote Desktop and Laptop

  • 9

    PartnerDescription

    Biometrics

    Who are our SecurID Ready Authenticator Partners?

    Converged PDA & Phone Use as standalone SID token

    or for mobile VPNs

    Processor for secure key generation and management

    Flash Drives

    Smart Phones

    Trusted Platform Modules

    SIM

    USB Memory Stick withSecure Storage

    Potential for additional applications

    Fingerprint reader embedded in laptop, PC, mobile phone.

    Used for 2 or 3 factor ID

    UPEK

    AuthenTec

    Privaris

    Broadcom

    SanDiskRedCannon

    MXIIronKey

    Vodafone Smart card for mobile devices.

    RIMMotorola

    NokiaSony Ericsson

    .

  • 10

    What is our Software Token offering?

    Desktop Software Token

    SecurID Toolbar Token

    Mobile Software Tokens RIM Blackberry

    Microsoft PocketPC

    Palm OS

    Java Phone

    Windows Mobile 5.0

  • 11

    0 1 2 3 4 5 6 7 8 9

    RSA Flexible OTP Authenticators

    Features Integrate OTP technology into an ISO compliant plastic

    card

    Enabling OTPs to be displayed on the physical card surface

    Standard OTP tokens OTP on a bank or payment card

    Premium OTP tokens Combines OTP with technologies such as smart chip,

    physical access, RFID, etc.

    Online BankingPayment/ATM

    Credit Card Trx

    Corp ID BadgeNetwork Access

    Building AccessPayment & Vending

    Trx Signing

    Smart Chip

  • 12

    Secure Remote and Enterprise Access

    Federated Identity Management

    Web SSO

    RSA Authentication

    Manager

    Web Access

    Citrix

    Desktop/Laptop Security

    WAP/802.11Wireless

    Enterprise SSO

    Web Host Citrix

    Windows Java

    Microsoft Windows Login

    Lo

    ca

    l au

    then

    tica

    tio

    n,

    Wir

    ele

    ss,

    VP

    N

    RSA SecurID

    for Microsoft Windows

    Administrative Access

    OS/Network Devices

    RSA CertificateManager

    OR

    VPN Gateway

  • 13

    Interoperable with over 300 solutions

    Web applications and servers Oracle

    EMC Documentum

    Sun Microsystems

    Apache

    BEA

    IBM

    Microsoft

    Provisioning Computer Associates

    IBM

    Thor Technologies

    BMC

    Sun Microsystems

    Email, workflow and office automation Microsoft

    Novell

    Adobe

    IBM

    Remote Access iPass

    Citrix

    Nortel

    Symantec

    Wireless

    Cisco

    Microsoft

    Nokia

    Perimeter defense (Firewalls, VPNs and Intrusion Detection)

    Aventail

    Check Point Software

    Cisco

    Citrix

    Juniper

    Nortel

    Nokia

    Microsoft

    Network and communications Lucent

    Cisco

    Radius 3COM

    Funk Software

    Cisco

    Lucent

    Customer Benefit: Reduced time to market and lower deployment costs

    www.rsasecured.com

  • RSA Database Security ManagerRSA File Security Manager

  • 15

    Product Portfolio

    RSA Database Security Manager High-performance, enterprise-class security for sensitive data in

    databases

    RSA File Security Manager Transparent and easy-to-administer security for sensitive data in

    files and folders

    Central Management Console

    Automated installation, deployment

    System dashboard to Define security policy,

    Manage encryption & access control services

    Manage reporting/ auditing services

    Deployment Options

    Software-only; Hardware/software (via HSMs)

  • 16

    RSA Database Security ManagerWhat is our Database Security Management Solution?

    Adapters: Installed and co-located along with protected database systems

    Adapter Manager Central GUI based management console

    Manages database security from a central location

    Audit Services System Captures, stores and secures access to activity logs

    Accessible as raw audit data files or GUI based view

    Tools & Utilities Enables business processes such as secure data import/export operations

  • 17

    RSA Database Security ManagerSupport Matrix

    32--------32Teradata v606.01.00.03

    --X32/64XX32Sybase 15.0

    --X32/64XX32Sybase 12.5.2

    --32/6432/64643232IBM DB2 8.x

    ----------32/64SQL Server 2005

    ----------32SQL Server 2000

    --32/6432/64643232/64**Oracle 10g v10.1.0.2.0

    --32/6432/64643232/64**Oracle 10g v10.1.0.1.0

    --32/6432/64643232/64**Oracle 9i v9.2.0.1.0

    --32/6432/64643232Oracle 8i

    MP-RASIBM AIX v5.xSolaris 8, 9, 10 SPARC

    HP-UX 11.11RHEL 3.0, 4.0Windows 2000 and 2003

    Operating System

    Database

    32 : 32-bit 64 : 64-bit32/64 : 32 & 64-bit X : Not supported-- : Not Applicable ** : Q2 Delivery

  • 18

    RSA File Security ManagerWhat is our File Security Management Solution?

    Adapters: Installed and co-located along with protected hosts

    Adapter Manager Central GUI based management console

    Manages host security from a central location

    Audit Services System Captures, stores and secures access to activity logs

    Accessible as raw audit data files or GUI based view

  • 19

    RSA File Security ManagerPlatform & Support Matrix

    Windows (32-bit) Windows 2000

    Windows XP

    Windows 2003

    Red Hat Enterprise Linux (32-bit) RHEL 3.0 (kernel 2.4.2)

    RHEL 4.0 (kernel 2.6)

  • RSA enVision

  • 21

    The Enterprise TodayMountains of data, many stakeholders

    How do you collect & protect all the data necessary to secure

    your network and comply with critical regulations?

    Router logs

    IDS/IDP logs

    VPN logs

    Firewall logs

    Switch logs

    Windows logs

    Client & file server logs

    Wireless access

    logs

    Windows domain logins

    Oracle Financial Logs

    San File Access Logs

    VLAN Access & Control logs

    DHCP logs

    Linux, Unix, Windows OS

    logs

    Mainframe logs

    Database Logs

    Web server activity logs

    Content management logs

    Web cache & proxy logs

    VA Scan logs

    UnauthorizedService Detection

    IP Leakage

    Configuration ControlLockdown enforcement

    False Positive Reduction

    Access Control EnforcementPrivileged User Management

    Malicious Code DetectionSpyware detection

    Real-Time MonitoringTroubleshooting

    User Monitoring

    SLA Monitoring

  • 22

    What is enVision?

    enVision is a network based technology platform that helps you

    See into

    Understand

    Protect data and assets

    Report on

    Store records of

    what happened within the network and at its edges

  • 23

    What is enVision?

  • 24

    RSA enVisionAn Information Management Platform