12
Insert Your Name Insert Your Title Insert Date Building a Fully Trusted Authentication Environment Microsoft-SafeNet Joint Solutions Strong Authentication for MS Office 365 1 Overview, 2014

Building a Fully Trusted Authentication Environment

Embed Size (px)

DESCRIPTION

Building a Fully Trusted Authentication Environment. Microsoft-SafeNet Joint Solutions Strong Authentication for MS Office 365. Overview, 2014. Agenda. About SafeNet Today’s Enterprise IT Challenges How SafeNet addresses these Challenges SafeNet Solutions for Microsoft Environments - PowerPoint PPT Presentation

Citation preview

Page 1: Building a Fully Trusted  Authentication Environment

Insert Your Name

Insert Your Title

Insert Date

Building a Fully Trusted Authentication Environment

Microsoft-SafeNet Joint SolutionsStrong Authentication for MS Office 365

1

Overview, 2014

Page 2: Building a Fully Trusted  Authentication Environment

Agenda

About SafeNet Today’s Enterprise IT Challenges How SafeNet addresses these Challenges SafeNet Solutions for Microsoft Environments Key Benefits of the Joint Solutions Why SafeNet

2

Page 3: Building a Fully Trusted  Authentication Environment

Who We Are

FOUNDED

1983Baltimore, MD

REVENUE

~330m

EMPLOYEES

+1,400In 25 countries

OWNERSHIP

Private

GLOBAL FOOTPRINT

+25,000Customers in100 countries

ACCREDITED

Products certifiedto the highest security standard

Trusted to protect the world’s most sensitive data

We control access to the most sensitive corporate information– more than 35 million identities protected via tokens, smartcards, and mobile devices managed on-premise and in the cloud.

We protect the most money that moves–over 80% of the world’s intra-bank fund transfers and nearly $1 trillion per day.

We monetize the most high-value software–more than 100 million license keys protect and manage on-premise, embedded, and cloud applications globally.

We are the de facto root of trust–deploying more than 86,000 key managers and protecting up to 750,000,000 encryption keys.

Page 4: Building a Fully Trusted  Authentication Environment

Gartner Magic Quadrant for User Authentication 2014

4

The most highly ranked vendor

Considered the most visionary

Cited for the best execution

Recognized as having:

Very sound market understanding

Very strong product strategy

Innovation

The competitor others need to beat!

Page 5: Building a Fully Trusted  Authentication Environment

Today’s Enterprise IT Challenges

5

Web

Mobile / PCNetwork

IT SECURITY BOUNDARIES CHANGING

PASSWORDS EASILY COMPROMISED

COMPLIANCE WITH REGULATIONS REQUIRED

POLICIES

Cloud-based SaaS Apps Virtual Infrastructure Workforce Mobility Personal Devices

Phishing Social Engineering Database Hacks

Industry Regulations Corporate Regulations International Standards

Page 6: Building a Fully Trusted  Authentication Environment

Today’s Enterprise IT Challenges Addressed by SafeNet

66

Web

Mobile / PCNetwork

IT BOUNDARIES – SECURED

PASSWORDS – ELIMINATED OR USED WITH 2FA

COMPLIANCE – MET AND SIMPLIFIED

IT ADMINS Provide a single point of management

for all apps and resources Enable consistent access policies

across ecosystem (on-prem, cloud, VDI, etc.)

Identity Federation reduces provisioning needs

Support secure mobility

USERS Can use one strong authentication

token to log on to all MS and non-MS resources

Need to remember fewer passwords Enjoy Web SSO (Single Sign On) to

multiple cloud-based apps

CSO + CIO + IT ADMINS Facilitate security compliance and

audits through centrally managed strong authentication scheme

Offer wide range of reporting options

POLICIES

USERS Enable users secure access to

resources from any endpoint - tablet, smartphone, workstation

IT ADMINS Mitigate risks stemming from

password vulnerability with MFA Authentication methods

optimized per use case

Page 7: Building a Fully Trusted  Authentication Environment

Key Benefits of SafeNet Authentication

7

Office 365 Microsoft clients and browser-based applications Dozens of web applications that support SAML Offer Federated Web Single-Sign On

Enables your organization to apply strong, multi-factor authentication to:

Page 8: Building a Fully Trusted  Authentication Environment

The SafeNet Advantages

Flexibility with choice of implementation methods• Using SafeNet ADFS agent• Using ADFS and SafeNet SAML Identity Provider

Central management of entire authentication environment • Secure whole ecosystem: cloud, on-premises or hybrid• Single identity provider• Single authentication backend• Single security audit trail

Broadest range of authentication methods• Context-based• OOB• OTP• PKI certificate-based authentication

Broadest use-case coverageDozens of out-of-the-box integrations, prevalidated by leading technology providers for:

• Network logon• VPN• SaaS• Web-based portals• VDI 8

Page 9: Building a Fully Trusted  Authentication Environment

Office 365 with ADFS and SAML

9

User opens Office 365 login page and is redirected to ADFS

1

User is redirected back to ADFS which grants access to the account based on the response provided by SafeNet Authentication Service

ADFS 2.0 or later

Active Directory

User’s browser accesses ADFS and is redirected to SafeNet Authentication Service using SAML 2

User is authenticated by SafeNet Authentication Service as a SAML identity provider

3

4

User is redirected back to Office 365 5

Page 10: Building a Fully Trusted  Authentication Environment

Office 365 with SafeNet ADFS Agent

SafeNet ADFS Agent

ADFS validates the user’s Active Directory password

SafeNet ADFS Agent prompts the user for second factor credentials

ADFS grants the user access based on the SafeNet Authentication Service verification response

3

SafeNet Authentication Service validates the user’s second factor credentials

4

2

User is redirected back to Office 365

6

User opens Office 365 login page and is redirected to ADFS

1

Active Directory with

ADFS 3.0

5

Page 11: Building a Fully Trusted  Authentication Environment

Why SafeNet?SafeNet’s Next Generation Authentication offers:

Frictionless Authentication

• Choice of delivery platforms• Automated administration, user & token management• Broadest range of authentication methods• Broad use case support

Security and Trust

• Use of industry standards• Hardware-based root of trust• Control over authentication data• Certified products

Transparency

• Extensive reporting and auditing

11

Page 12: Building a Fully Trusted  Authentication Environment

Insert Your Name

Insert Your Title

Insert Date

Thank You

Questions?

1212