Authentication - Identity Protection

Download Report

Transcript Authentication - Identity Protection

Data Protection Portfolio
Chris Harris
Northern European Pre-Sales Manager
SafeNet Data Protection Portfolio
Authentication Identity Protection
Hardware Security
Modules
 Offering the broadest
range of
authentication, from
HW smartcard tokens
to mobile phone auth
all managed from a
single platform
 The market leader in
certificate based token
authentication
 Industry only unified
authentication platform
offering customers the
freedom to adapt
 Unique technology
offerings with clienteles
tokens ,high assurance
offerings and more
DataSecure Encryption and Control
High Speed Encryption
 The fastest, most
secure, and easiest to
integrate application &
transaction security
solution for enterprise
and government
 World’s first and only
unified platform that
delivers intelligent
data protection and
control for ALL
information assets
 SafeNet high-speed
Encryptors combine
the highest
performance with the
easiest integration and
management.
 The market leader in
enterprise-grade HSM
 Centralized policy, key
management, logging
and auditing
 Unparalleled leverage
across classified and
COTS communication
protection (FIPS 140-2
Level 3)
 Industry Innovator in
Payment HSM
 Widest portfolio of
platforms and solutions
 SafeNet Delivered its
75,000th HSM — sets
Industry Milestone
REV 0.1
 Data centric, persistent
protection across
datacenters, endpoints
and into the cloud
 Best-in-class Security
Management Center
 Integrated perimeter
data leakage prevention
 Solutions for Ethernet,
SONET up to 10Gb
 Appliance based,
Proven scalability and
high performance
 Zero bandwidth loss,
low- latency Encryption
2
Authentication Solutions
Authentication - Identity Protection
Token Management
System
Smartcard USB
Tokens
SmartCards
SafeNet’s strong authentication
solutions help our customers meet
organizational and end user needs
enable business growth and achieve
compliance
Hybrid
(OTP/SC/Storage)
Tokens
OTP tokens
Software / mobile
Authenticators
REV 0.1
4
Strong Authentication – The Need
24x7 secure access to
sensitive business information
•Passwords are:
• Often easy to crack and easy to guess
• Easy to steal: keystroke loggers, phishing attacks
• Difficult to remember and use
• The cause of high help-desk costs
Digital signing of transactions
Secure PCs and laptops
The Authentication Portfolio
• SafeWord's seamless integration
with an Microsoft infrastructure
makes it simple to deploy twofactor authentication for VPNs,
• Token
assignment, enrollment,
Citrix applications,
Web
revocation,
applications, Webmail,
andupdate, replacement
• Access
Password reset/change
Outlook Web
• Auditing, Reporting
• Self-service options
• Integrated with AD/LDAP
The Authentication Portfolio
Certificate- CertificateBased (PKI) based
USB devices Smartcards
Hybrid
OTP
Software
Mobile
eToken PRO
eToken NG-OTP
eToken PASS
eToken Virtual
MobilePASS:
iPhone,
BlackBerry,
JAVA capable
Phones, SMS
eToken PRO
Anywhere
eToken PRO
Smartcard
Smartcard 400
iKey 4000
Smartcard 330
iKey 1000
Smartcard
330M
eToken Flash
Hardware Security Modules
HSM - Transaction & Identity Protection
Luna SA / SP
ProtectHost EFT
Luna XML
Luna SX
SafeNet’s Hardware Security
Modules are the fastest, most
secure, and easiest to integrate
solution for protecting identities,
applications and transactions
CA4
Luna PCM
ProtectServer Gold
Luna PCI
REV 0.1
9
What is a HSM, Why use one?
 Security
 Sensitive cryptographic keys and processes are stored, managed and
protected by dedicated hardware
 Performance
 Processing bottlenecks are eliminated with hardware cryptographic
acceleration
 Auditability
 Dedicated hardware provides a clear audit trail for all key materials
Introducing the Product Line
•SafeNet brings together the HSM technology of three leading
companies to deliver an array of customer choice with regard to
features, certifications, performance and connectivity.
HSM Product Portfolio
Luna SA
 High assurance
enterprise-grade HSM
Luna PCI
Luna CA4
 Fast, high-assurance
PCI HSM card for
hardware key management
and
crypto acceleration
 Root key HSM for
true hardware key
management
• 7,000 ops/s
• FIPS 140-2 Level 3
• Extensive algorithm
support
• 10/100 Ethernet interface
• Supports two-factor
trusted path
authentication
• Supports two-factor
trusted path
authentication
• Extensive algorithm
support
• Extensive Algorithm
support
• Supports common
certificate authorities
(Microsoft, Entrust,
Verisign, RSA, etc.)
• 5,500+ ops/s
• Certifications: FIPS
140-2 Level 3, CC EAL 4+
• Full platform support
• Secure remote
administration
• Supports partitioning
• Hardware secured remote
administration
• FIPS 140-2 Level 3
certified
Luna PCM
 Portable, cost-effective
PCMCIA HSM card for
hardware key management
and
crypto acceleration
• Versions for document
signing, key export for
registration of tokens,
and signing and back up
of key material to a token
• FIPS 140-2 Level 2
• Extensive algorithm
support
HSM Product Portfolio
ProtectServer Gold
 Cost-effective highassurance PCI HSM
card for customizable
hardware key
management
• Up to 600 ops/s
• Easy GUI-based
administration
• Customizable interface
• FIPS 140-2 Level 3
• Extensive algorithm
support
• Secure remote
administration
Luna SP
 Protected Application
Execution Environment
• 5,500+ ops/s
• Certifications: FIPS
140-2 Level 3
• Executes sensitive
application processing tasks.
• Web service interface to
application clients.
• Signed code prevents
unauthorised execution
• Leverages tried and
trusted Java security model
• Hardware secured remote
administration
Luna XML
ProtectHost EFT
 High assurance
enterprise-grade HSM for
XML environments
 High assurance
HSM for financial
payment systems
• XML interface (WSDL)
encapsulates crypto
functions, enabling rapid
integration development
• PIN generation &
verification
• FIPS 140-2 Level 3
• Extensive algorithm
support
• No client required
• 2,200 ops/sec
• OS independent
• Secure remote
administration
• 10/100/1000 Ethernet
interface
• Supports global
payment processing,
EMV, and Card
Issuance APIs
• 1,200 Visa PIN Verify
operations / sec
• Certifications: FIPS
140-2 Level 3, CC
• Easy GUI-based
administration
SafeNet HSM Product Range Overview
Server
CCEAL
4+ (CA3)
Network
Network
CCEAL 4+
4500+/sec
Embedded
Embedded
Embedded
FIPS 140 Level 2 and Level 3
PKCS 11, Java, CAPI
27/sec
Network
PPO
4500+/sec
450/sec
PPO
27/sec
600/sec
Server/
Network
CCEAL
4+
PPO
7000/sec
1200/sec
Symmetric and Asymmetric
20 x
partitions,
SSL acceleration
EFT Command
Sets
Principles of Best Practice
http://www.safenet-inc.com/library/
DataSecure Platform
File, Folder & Field Encryption
DataSecure – Data Encryption & Control
DataSecure
i450 and i150
Application/dB
Connector Software
DataSecure is the industry’s
most trusted platform to
provide intelligent data
protection for ALL information
assets—both structured and
unstructured from the
Datacenter to the endpoint and
into the cloud
Centralized Policy and
Key Management
Full Disk Encryption
File/Folder Protection
REV 0.1
18
DataSecure – Data Encryption & Control
Web/App
Servers
File Servers
REV 0.1
Mainframes
Endpoint
Devices
19
DataSecure Application Integration
E-Commerce
Application
Reporting
Application
Customer
Database
• Software Libraries
• Microsoft .NET, CAPI
• JCE (Java)
• PKCS#11 (C/C++)
• SafeNet ICAPI (C/C++)
• z/OS (Cobol, Assembler, etc.)
• XML
• Support for virtually all application and web
server environments
DataSecure Database Integration
• Database Connectors
• Oracle 8i, 9i, 10g, 11g
• IBM DB2 version 8, 9
• IBM UDB version 8, 9
• Microsoft SQL Server 2000, 2005, 2008
• Teradata 12
• Application changes not required
• Batch processing tools for managing large
data sets
Customer Database
• Vendor Transparent Database Integration
• SQL Server 2008
• Oracle 11g
DataSecure Tokenization
• DataSecure—acts as the “vault” for sensitive data
DataSecure
Token Manager
values and token by protecting with strong encryption
Secure
Message Layer
and key management
• Token Manager—replaces sensitive data with
DataSecure
format-preserving tokenization via:
• Secure Message Layer - SOA-based interface, callable
from anywhere
• Protected Zone - host of the Secure Message Layer,
Protected
Zone
handles calling DataSecure and generating tokens
Tokenization: Store Sensitive Value
protected zone
datasecure
token service
ProtectApp Connector
ssl
token manager
SQL SERVER
SSL
JDBC
vault
SSL
token generator
ORACLE
SOA
client application
JVM
Tokenization: Retrieve Sensitive Value
protected zone
datasecure
token service
ProtectApp Connector
ssl
token manager
SQL SERVER
SSL
JDBC
vault
SSL
token generator
ORACLE
SOA
client application
JVM
SafeNet DataSecure Interface
SafeNet DataSecure Interface
DataSecure – Data Encryption & Control
Web/App
Servers
File Servers
REV 0.1
Mainframes
Endpoint
Devices
27
ProtectFile Architecture
Endpoint Protection with Centralized Key & Policy Management
ProtectFile PC
ProtectFile Server
• Granular folder and file-level
encryption
• Granular folder- and
file-level encryption
• Independent, passwordbased or token-based user
access control
•Client users use
Native windows
access control
• Key and policy mgmt
on DataSecure for end user
transparency
Corporate
File Server
End User
Laptop
Network Shares
• Key and policy management
on DataSecure for end-user
transparency
• Encrypted files stored locally
or on shared file servers
DataSecure Platform
• Centralized key and policy management
• Comprehensive logging and reporting
• Enterprise scalability and redundancy
• FIPS and CC certified
ProtectFile Sample Policies
• Create policies that align to lines of business
• Granular policies can be defined to control access to
authorized users
Finance Managers – gets full access
to confidential financial spreadsheets
Call center reps can encrypt credit
card numbers for phone orders
Outside Auditors – get access to
sensitive files remotely and offline,
but need to get re-authorized by IT
every 30 days to regain access.
(Policy can be configured based on
any set amount of time.)
Customer contracts sent to the call
center are saved to a shared file
server by the Call Center reps where
they are automatically encrypted and
strict access control is applied.
IT Administrators – they get access
to perform routine maintenance,
but cannot see any files that have
been encrypted (IT sees only cipher
text).
Market analysts are able to access
and share their competitive analysis
on seasonal opportunities in the
Finance folder, but only see cipher
text if they try to click on the
spreadsheet with analyst salary
information.
ProtectFile Features and Benefits
Features
Benefits
Full data lifecycle protection
Encryption of files on servers, laptops, removable media,
email, mobile handsets, and virtually anywhere it travels
Auditor-approved, compliance
ready solution
Centralized auditing and logging capabilities to monitor
attempted access and changes to your keys, users and
authorization policies.
Data-centric data protection
Secures the data itself, versus the perimeter or devices.
Compatibility with cloud computing environments due to
the data-centric approach of the solution
Highly scalable and redundant
Designed for and proven within large enterprises
Standards-based security
FIPS and CC certification for the DataSecure key manager
Flexible integration options
Password and PKI multi-factor authentication
Endpoint security including
mobile data protection
Protects mobile devices using ProtectFile Mobile
DataSecure – Data Encryption & Control
Web/App
Servers
File Servers
REV 0.1
Mainframes
Endpoint
Devices
31
SafeNet ProtectDrive
The world’s highest rated and most cost-effective full disk and
removable media encryption solution. Protects sensitive data and
ensures compliance with the lowest operating costs.
Protect Drive
Perfect 5 Star Review
From SC Magazine
 Full disk and removable storage media encryption
 Pre-boot authentication; two-factor authentication support
Security
 FIPS 140-2 validated; Common Criteria EAL4
 Robust encryption (up to AES-256)
 Strong key management, optionally in hardware
Ease of Use
Ease of
Management
 High performance - transparent to end user
 Single sign-on for pre-boot and Windows logon
 Central management via Active Directory or ADAM
 Large scale network installation using pre-set policies
 Reporting for compliance and security auditing
Pre-boot Authentication
If smart card and password logon
has been enabled user inserts smart
card or presses Enter.
After inserting his smart card the user
only needs to enter his PIN.
For password logon the user enters
his Windows user credentials.
Broad Platform Support
• ProtectDrive: The only disk encryption
solution with a track record of
successfully protecting servers, including
RAID arrays, as well as laptops and
workstations.
• Smart Phone Support – ProtectMobile
supports Windows Mobile today, with 1H
2010 additional support of Apple iPhone,
Symbian, Palm
AD/ADAM Management
Leverage what your organization
already knows — Active Directory — to
speed-up deployments and reduce
ongoing management costs.
Other solutions merely link to AD,
whereas ProtectDrive integrates with
AD/ADAM.
Token / Smart Card Support
• Tokens:
•
• SafeNet eToken Pro
• eToken Pro Anywhere
• NG-FLASH
• NG-OTP
• SafeNet iKey 2032
• SafeNet iKey 1000
• SafeNet iKey 4000
• RSA SID800
Cards:
• SafeNet
• CAC/PIVII
• ActivIdentity
• CardOs cards
• Schlumberger
• Cyberflex
• SafeNet SC330; SC 400
• And MANY others
SafeNet is the only vendor
providing tokens/smart cards
and disk/file encryption,
ensuring long term support
and compatibility.
 No integration worries; no vendor
finger-pointing over issues; one contact
point for ongoing support
 Passwords are less secure than twofactor authentication
 At pre-boot, token/smart card
credentials provide authentication for OS
log in
 Certificate-based authentication
provides non repudiation and other
forensic capabilities
Biometric/Smartcard Authentication
ProtectDrive also supports match-on-card
biometric authentication
SafeNet ProtectDrive
• Seamless integration with Active Directory or ADAM
• Immediate familiarity
• No additional servers/applications to install and manage
• 100% hard drive encryption by partition or full disk
• All data encrypted, registry, temp files, master file table, partition boot record, ...
• Wide operating system support
• Windows XP, 2000, 2003, 2008 R2, Windows Vista, Windows 7
• Rapid Recovery
• A suite of recovery tools which enable the safe recovery of a ProtectDrive system in as little as
three minutes
• Token Support
• Support a wide range of PKI tokens, including the eToken Pro, eToken Pro Anywhere, NG-FLASH
and NG-OTP
Network & WAN Encryption
SafeNet WAN Encryption
• SafeNet offers Layer 2
encryption solutions
• Layer 3 solutions
(IPSec) are now
absorbed into routers
• Why layer 2? …
Why Layer 2?
Lowest Cost of Ownership
• Better Bandwidth Efficiency (up to 50%)
• Minimal Ongoing Maintenance - Routing Updates Transparent to Encryption
• Lowest Cost Solution for Aggregation of Many Sites
Maximum Performance
• Low Protocol Overhead
• Low Latency
• Eliminates Complex QoS Schemes
Enterprise Scalability
• Fast Reliable Network Integration
• Simple Architecture Scales to 1000’s of Devices
• Layer 3 Transparent –All L3 Protocols Supported (IPv4, IPv6 and Legacy)
Layer 3 Competition
Improved Performance
With The Typical Traffic Profile More
Than 50% of Bandwidth Can Be Lost
Source: Rochester Institute of Technology
Simplified Management
Operations
Center
This creates the
potential for network
outages and security
vulnerabilities
Disaster
Recovery
Location
and here!!!
Transport
Carrier Edge Router
Security Policy has
to be updated
here…
IPSec Encryptor
Router
Every time
something
changes
here…
LAN
Operations
Center
and here…
Simplified Management – Layer 2
No administrative
burden, no outages and
no security policy
changes
Operations
Center
Disaster
Recovery
Location
or here!!!
Transport
or here…
Carrier Switch
nothing
changes
here…
Layer 2 Encryptor
Customer Premise Router
When
something
changes
here…
LAN
Company Confidential
Operations
Center
Best Fit for Layer 2 Encryption
 Ethernet Encryption
 SONET Encryption
10/1G
 Ethernet Encryption
100/10M
Security Management Center II
Lowest Cost of Ownership
• Easy Installation and Simple Ongoing Management
• Intuitive web-based GUI
• Virtualization Support with VMWare and Solaris Zones
Secure Operations
• Full Audit and Event logging and Reporting
• Secure Remote Management and Encrypted Communications
• Integrated Key Manager with Optional Hardware-Security
Scalability / Reliability
• Simple Management Design for Thousands of Encryptors
• Rapid Deployment Tools for Large Installations
• Enterprise Class High-Availability Features
SMC II Is The Only Truly Enterprise Class Encryptor
Management Platform
SafeNet Ethernet Encryptor
Lowest Cost of Ownership
FIPS 140-2
Level 3
Certified
• Simply Deployment and Low Maintenance
• Compatible With All Ethernet Topologies
• Remote Configuration and Monitoring
Maximum Performance
• Line Rate AES-256 Encryption Up To 10Gbps
• No Protocol Overhead and Low latency (< 5 μs)
• Hitless 2048-bit Key Exchange
Enterprise Scalability
• Full-Mesh Connections Up To 512 Devices
• Available Line Rates Include 10M, 100M, 1G and 10G
The Only Complete Family of Ethernet Encryptors for All
Performance Levels to Secure Ethernet Networks
SafeNet SONET Encryptor
Lowest Cost of Ownership
FIPS 140-2
Level 3
Certified
• Simply Deployment and Low Maintenance
• Line and Path Modes of Operation
• Remote Configuration and Monitoring
Maximum Performance
• Line Rate AES-256 Encryption Up To 10Gbps
• No Protocol Overhead and Low latency (< 5 μs)
• Hitless 2048-bit Key Exchange
Enterprise Scalability
• Full-Mesh Connections Up To 512 Devices
• OC3, OC12, OC48, OC192 Interfaces Available
The SafeNet SONET Encryptor is the Worlds Most Widely Deployed Solution for
Protecting SONET and SDH Networks
Content Security
The need for Content Security
Content Security controls what enters
Solution
Evolution
URL Filter
Threat
Evolution
Amateur
fame driven
Internet
Evolution
Web 0.1
Web 1.0
Web 2.0
1995-2001
2002-2006
2007-2010
• Static content
• Limited bandwidth
Web (Spyware, Malware,
Inappropriate
Tunnelling, Scalable
Web/Mail
AVbrowsing, IM, P2P,Intelligent,
Information loss) & Email (Spam, Phishing, Viruses, Malware)
Firewalls and VPNs control
Secure GW
Professional
Spammers, Fraudsters
• Dynamic HTML
applications
who•• Web-based
enters bandwidth
Increased
Organized eCrime
• User-generated content
• Evasive web applications
• Unlimited bandwidth
The need for Content Security
eSafe Product Family
eSafe Web Security Gateway
Includes Anti-malware, Anti-virus and Application Filtering. Inspects HTTP and FTP traffic.
• Performs real-time deep content analysis of Web 2.0 content
•
•
•
Proactively identifies all malicious scripts and malware
Strips only the threats, keeps the rest of the web content intact
Zero impact on user experience
• Control Internet traffic, over 500 apps, e.g. web 2.0, P2P, IM, etc.
•
•
•
•
Enforce application usage policies & control malicious communications
Detects application protocols on any port
Prevents Remote Control
Prevents Protocol Tunnelling
• Blocks all known and unknown anonymous proxies
eSafe Product Family
eSafe Web Security Gateway Plus
Includes Anti-malware, Anti-virus, Application Filtering and Web Filtering (URL Filter). Inspects HTTP
and FTP traffic.
PLUS
• Controls access to inappropriate, non-productive, and potentially
malicious sites
• Effectively enforce acceptable web use policy
•
•
•
70 different categories
More than 100 million categorized sites
Up to 150,000 new or revised daily updates
eSafe Product Family
eSafe Web Security Gateway SSL
Inspection of encrypted HTTPS/SSL web traffic.
• Scanning of incoming and outgoing SSL encrypted traffic
• Ensure policy enforcement and protection on SSL encrypted traffic
• Decrypts/encrypts HTTPS/SSL traffic on the fly
• Validates certificate policies, issuers, revocations
eSafe Product Family
eSafe Mail Security Gateway
Includes Anti-malware, Anti-virus and Anti-spam. Installed as SMTP relay in DMZ.
• Dual anti-spam engine blocks 99% of spam
• Proactively blocks malware and zero-hour outbreaks
• Strips phishing elements from email messages
• Self Management SPAM Quarantine, dramatically reduces administration
overhead
eSafe Product Family
eSafe Reporter
Extended Reporting tools with detailed and analytical enterprise-class reports with 240 pre-defined
reports
• Centralized Dashboards
• Centralized Configuration
• Centralized Analysis
eSafe Product Family
Data Loss Prevention:
Classification, Enforcement & Monitoring
• Classification
•
•
•
•
•
20 out-of-the-box DLP libraries
Coverage for over 150 file types including:
All MS Office, Open Office, and PDF files
HTML, email, and source code files
Archived files
• Enforcement
•
•
•
•
•
Log only
Block attachments or file upload
Archive for later investigation
Alert notification to administrator
Send email with attachment to administrator
Flexible & Scalable Deployment
• Flexible Deployment Options
• Inline, Bridge, Router and
Proxy deployment modes
• Multiple Form Factors
• Virtual appliance
• VMWare
• Purpose-built appliances
• Reliability & High Availability
• Cluster solutions for high availability and redundancy
• Integrations with 3rd party Load Balancers
• Redundant components on eSafe appliances