Soft-Tronik - Partner Security Konferencia
Bezpenostn rieenia pre BusinessakcelerciuKarol Piling [email protected] +421905856352
SE C&EE
2
IT Customer Landscape
3
secure datasecure access
Introducing Information-centric Security
customers
partners
employees
security information management
secure enterprise dataPreserve the confidentiality and integrity of critical data wherever it resides
secure employee accessEnable secure, anytime, anywhere access to corporate resources
secure partner accessOpen internal systems to trusted partners
secure customer accessOffer self-service channels, prevent fraud, and enhance consumer confidence
manage security informationComply with security policy and regulations
RSA SecurID update
5
Corporate Office
From inside the organization:Secure Enterprise Access
Growing Need for Secure Information AccessFrom Outside and Within the Organization
Web and
Browser
Apps
EnterpriseSSO
MicrosoftLogon
WirelessNetwork
Desktop
Apps
IT Infra-
structure
TerminalServices
From outside the organization:Secure Remote Access
Corporate Office
Web Apps Terminal Services
E-mail
VPN
6
RSA SecurIDTime Synchronous Two-Factor Authentication
RSAAuthentication
Manager
RAS,VPN,
Web Server,
WAP
etc.
RSA Authentication
Agent
SeedTime
Algorithm
SeedTime
032848032848
Algorithm
Same SeedSame Seed
Same TimeSame Time
7
RSA SecurID a broad range of form factors today
RSA SecurID Hardware Tokens SID700,
SID900 Transaction signing token
- Classic SecurID
SID800 as a smart card and SecurID token
Two factor with windows credential or certificate
Key for unlocking Hard Disk Encryption solution s
Access to Digital Certificates for secure e-mail, signing, and file encryption needs
Boot and HDD encryption
Pointsec, Safeboot, Ultimaco, Winmagic ... www.rsasecured.com
8
Boot Process
Secures OSbefore it starts
User found in Disk Encryption Vendor Database
End-user certificate
cross-referenced
Operating System
Secure Data
System Files
Windows Windows WebHost Citrix
Windows Java
Replacing user names and passwords with strong authentication when logging into disk encryption solution ensures greater desktop and laptop security
Hard Disk Encryption Solution
RSA SecurID authentication for Secure Remote AccessSecuring the Remote Desktop and Laptop
9
PartnerDescription
Biometrics
Who are our SecurID Ready Authenticator Partners?
Converged PDA & Phone Use as standalone SID token
or for mobile VPNs
Processor for secure key generation and management
Flash Drives
Smart Phones
Trusted Platform Modules
SIM
USB Memory Stick withSecure Storage
Potential for additional applications
Fingerprint reader embedded in laptop, PC, mobile phone.
Used for 2 or 3 factor ID
UPEK
AuthenTec
Privaris
Broadcom
SanDiskRedCannon
MXIIronKey
Vodafone Smart card for mobile devices.
RIMMotorola
NokiaSony Ericsson
.
10
What is our Software Token offering?
Desktop Software Token
SecurID Toolbar Token
Mobile Software Tokens RIM Blackberry
Microsoft PocketPC
Palm OS
Java Phone
Windows Mobile 5.0
11
0 1 2 3 4 5 6 7 8 9
RSA Flexible OTP Authenticators
Features Integrate OTP technology into an ISO compliant plastic
card
Enabling OTPs to be displayed on the physical card surface
Standard OTP tokens OTP on a bank or payment card
Premium OTP tokens Combines OTP with technologies such as smart chip,
physical access, RFID, etc.
Online BankingPayment/ATM
Credit Card Trx
Corp ID BadgeNetwork Access
Building AccessPayment & Vending
Trx Signing
Smart Chip
12
Secure Remote and Enterprise Access
Federated Identity Management
Web SSO
RSA Authentication
Manager
Web Access
Citrix
Desktop/Laptop Security
WAP/802.11Wireless
Enterprise SSO
Web Host Citrix
Windows Java
Microsoft Windows Login
Lo
ca
l au
then
tica
tio
n,
Wir
ele
ss,
VP
N
RSA SecurID
for Microsoft Windows
Administrative Access
OS/Network Devices
RSA CertificateManager
OR
VPN Gateway
13
Interoperable with over 300 solutions
Web applications and servers Oracle
EMC Documentum
Sun Microsystems
Apache
BEA
IBM
Microsoft
Provisioning Computer Associates
IBM
Thor Technologies
BMC
Sun Microsystems
Email, workflow and office automation Microsoft
Novell
Adobe
IBM
Remote Access iPass
Citrix
Nortel
Symantec
Wireless
Cisco
Microsoft
Nokia
Perimeter defense (Firewalls, VPNs and Intrusion Detection)
Aventail
Check Point Software
Cisco
Citrix
Juniper
Nortel
Nokia
Microsoft
Network and communications Lucent
Cisco
Radius 3COM
Funk Software
Cisco
Lucent
Customer Benefit: Reduced time to market and lower deployment costs
www.rsasecured.com
RSA Database Security ManagerRSA File Security Manager
15
Product Portfolio
RSA Database Security Manager High-performance, enterprise-class security for sensitive data in
databases
RSA File Security Manager Transparent and easy-to-administer security for sensitive data in
files and folders
Central Management Console
Automated installation, deployment
System dashboard to Define security policy,
Manage encryption & access control services
Manage reporting/ auditing services
Deployment Options
Software-only; Hardware/software (via HSMs)
16
RSA Database Security ManagerWhat is our Database Security Management Solution?
Adapters: Installed and co-located along with protected database systems
Adapter Manager Central GUI based management console
Manages database security from a central location
Audit Services System Captures, stores and secures access to activity logs
Accessible as raw audit data files or GUI based view
Tools & Utilities Enables business processes such as secure data import/export operations
17
RSA Database Security ManagerSupport Matrix
32--------32Teradata v606.01.00.03
--X32/64XX32Sybase 15.0
--X32/64XX32Sybase 12.5.2
--32/6432/64643232IBM DB2 8.x
----------32/64SQL Server 2005
----------32SQL Server 2000
--32/6432/64643232/64**Oracle 10g v10.1.0.2.0
--32/6432/64643232/64**Oracle 10g v10.1.0.1.0
--32/6432/64643232/64**Oracle 9i v9.2.0.1.0
--32/6432/64643232Oracle 8i
MP-RASIBM AIX v5.xSolaris 8, 9, 10 SPARC
HP-UX 11.11RHEL 3.0, 4.0Windows 2000 and 2003
Operating System
Database
32 : 32-bit 64 : 64-bit32/64 : 32 & 64-bit X : Not supported-- : Not Applicable ** : Q2 Delivery
18
RSA File Security ManagerWhat is our File Security Management Solution?
Adapters: Installed and co-located along with protected hosts
Adapter Manager Central GUI based management console
Manages host security from a central location
Audit Services System Captures, stores and secures access to activity logs
Accessible as raw audit data files or GUI based view
19
RSA File Security ManagerPlatform & Support Matrix
Windows (32-bit) Windows 2000
Windows XP
Windows 2003
Red Hat Enterprise Linux (32-bit) RHEL 3.0 (kernel 2.4.2)
RHEL 4.0 (kernel 2.6)
RSA enVision
21
The Enterprise TodayMountains of data, many stakeholders
How do you collect & protect all the data necessary to secure
your network and comply with critical regulations?
Router logs
IDS/IDP logs
VPN logs
Firewall logs
Switch logs
Windows logs
Client & file server logs
Wireless access
logs
Windows domain logins
Oracle Financial Logs
San File Access Logs
VLAN Access & Control logs
DHCP logs
Linux, Unix, Windows OS
logs
Mainframe logs
Database Logs
Web server activity logs
Content management logs
Web cache & proxy logs
VA Scan logs
UnauthorizedService Detection
IP Leakage
Configuration ControlLockdown enforcement
False Positive Reduction
Access Control EnforcementPrivileged User Management
Malicious Code DetectionSpyware detection
Real-Time MonitoringTroubleshooting
User Monitoring
SLA Monitoring
22
What is enVision?
enVision is a network based technology platform that helps you
See into
Understand
Protect data and assets
Report on
Store records of
what happened within the network and at its edges
23
What is enVision?
24
RSA enVisionAn Information Management Platform