SlideShare una empresa de Scribd logo
1 de 16
ID-SEC SOLUTIONS LTD Identity and Access Management Solutions
4SO S mart,  S imple,  S ingle  S ign- O n Solution for  Lotus Notes
CURRENT SITUATION  ,[object Object],[object Object],[object Object],[object Object]
4SO – THE PROBLEM IN HELPDESK ,[object Object],[object Object],[object Object]
4SO – SECURITY PROBLEMS ,[object Object],[object Object],[object Object]
ORDINARY LOTUS NOTES LOGIN ID File ******* User Start the Notes client User prompt to enter his password Password uses to open ID file Notes client establish encrypted session
4SO LOGIN PROCESS ID File 4 S O *************************  User Start the Notes client Notes ask 4SO to supply password 4SO user details and provide Notes it long password Password uses to open ID file Notes client establish encrypted session 4SO validate Active Directory login ticket
4SO SOLUTION ADVANTAGES ,[object Object],[object Object],[object Object],[object Object],[object Object]
TECHNOLOGY EDGE ,[object Object],[object Object],[object Object]
SUPPORT ,[object Object],[object Object],[object Object],[object Object],[object Object]
COMPOTITORS ,[object Object],[object Object],[object Object],[object Object]
NOTES SHARED LOGIN (NSL) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],4SO support it all
4SO NSL General SSO Pistolstar Smart Cards ✓ ✗ ✗ ✓ Notes versions All 8.5 All All Active Directory Multiple passwords ✓ ✗ ✓ ✗ Citrix ✓ ✗ ✓ ✓ Password strength 512 Bits Medium 6-10 Chars (Human base) 6-10 Chars (Human Base)
PISTOLSTAR ,[object Object],[object Object],[object Object]
ID VAULT AND SSO SOLUTIONS ,[object Object],[object Object]
SUCCESS STORIES ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Destacado (6)

4SO customer presentation
4SO  customer presentation4SO  customer presentation
4SO customer presentation
 
Ceedo Sales training
Ceedo Sales trainingCeedo Sales training
Ceedo Sales training
 
The Interweaved Fabrics of Reality: Material, Social and Intentional
The Interweaved Fabrics of Reality: Material, Social and IntentionalThe Interweaved Fabrics of Reality: Material, Social and Intentional
The Interweaved Fabrics of Reality: Material, Social and Intentional
 
20111024_EDeVoogd_SocialMediaOpportunities
20111024_EDeVoogd_SocialMediaOpportunities20111024_EDeVoogd_SocialMediaOpportunities
20111024_EDeVoogd_SocialMediaOpportunities
 
Melbourne
MelbourneMelbourne
Melbourne
 
GuidanceFest 2011
GuidanceFest 2011GuidanceFest 2011
GuidanceFest 2011
 

Similar a 4 so customer presentation

Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2
Sarwar Javaid
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
webhostingguy
 
Deploying DAOS and ID Vault
Deploying DAOS and ID VaultDeploying DAOS and ID Vault
Deploying DAOS and ID Vault
Luis Guirigay
 

Similar a 4 so customer presentation (20)

Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2Lotus Notes And Domino 8.5 Security Comparison 2
Lotus Notes And Domino 8.5 Security Comparison 2
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Domino 8.5 Presentation for ATLUG
Domino 8.5 Presentation for ATLUGDomino 8.5 Presentation for ATLUG
Domino 8.5 Presentation for ATLUG
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Sachin Resume Updated
Sachin Resume UpdatedSachin Resume Updated
Sachin Resume Updated
 
Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1Sami laiho - What's new in windows 8.1
Sami laiho - What's new in windows 8.1
 
CV_FINAL
CV_FINALCV_FINAL
CV_FINAL
 
Deploying DAOS and ID Vault
Deploying DAOS and ID VaultDeploying DAOS and ID Vault
Deploying DAOS and ID Vault
 
Our take on Domino 10 - a Ytria webinar
Our take on Domino 10 - a Ytria webinarOur take on Domino 10 - a Ytria webinar
Our take on Domino 10 - a Ytria webinar
 
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows DesktopCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop
 
LastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to rememberLastPass Password Manager - the last password you'll ever have to remember
LastPass Password Manager - the last password you'll ever have to remember
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
SHIELDEX EnCrypto
SHIELDEX EnCryptoSHIELDEX EnCrypto
SHIELDEX EnCrypto
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
DDive11 - IBM Lotus Notes Traveler
DDive11 - IBM Lotus Notes TravelerDDive11 - IBM Lotus Notes Traveler
DDive11 - IBM Lotus Notes Traveler
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

4 so customer presentation

  • 1. ID-SEC SOLUTIONS LTD Identity and Access Management Solutions
  • 2. 4SO S mart, S imple, S ingle S ign- O n Solution for Lotus Notes
  • 3.
  • 4.
  • 5.
  • 6. ORDINARY LOTUS NOTES LOGIN ID File ******* User Start the Notes client User prompt to enter his password Password uses to open ID file Notes client establish encrypted session
  • 7. 4SO LOGIN PROCESS ID File 4 S O *************************  User Start the Notes client Notes ask 4SO to supply password 4SO user details and provide Notes it long password Password uses to open ID file Notes client establish encrypted session 4SO validate Active Directory login ticket
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. 4SO NSL General SSO Pistolstar Smart Cards ✓ ✗ ✗ ✓ Notes versions All 8.5 All All Active Directory Multiple passwords ✓ ✗ ✓ ✗ Citrix ✓ ✗ ✓ ✓ Password strength 512 Bits Medium 6-10 Chars (Human base) 6-10 Chars (Human Base)
  • 14.
  • 15.
  • 16.