SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
ENTERPRISE SECURE IDENTITY IN 
THE CLOUD WITH SINGLE SIGN-ON 
AND STRONG AUTHENTICATION 
MAKING THE CLOUD A SAFER SPACE 
Giuseppe Paternò, Director of GARL 
@gpaterno | www.gpaterno.com
ABOUT ME 
IT Architect and Security Expert with 20+ 
years background in Open Source and Cloud 
(OpenStack, OpenNebula, ...). Former Network 
and Security architect for Canonical, RedHat, 
Wind/Infostrada, Sun Microsystems and IBM 
and Visiting Researcher at the University of Dublin 
Trinity College. 
Past projects: standard for J2ME Over-The-Air 
(OTA) provisioning along with Vodafone, the study 
of architecture and standards for the delivery of 
MHP applications for the digital terrestrial 
television (DTT) on behalf of DTT Lab (Telecom 
Italia/LA7) and implementation of HLR for 
Vodafone landline services. 
Lot of writings, mainly on computer security. 
CTO and Director of GARL, a multinational 
company based in Switzerland and UK, owner of 
SecurePass and SecureAudit.
IT security products and virtualization services focused 
on identity protection on the Cloud. 
Born from Symantec, conducting pentest and vulnerability 
assessment on their behalf in EMEA 
Extensive OpenSource experience and large-scale Open 
Source projects such OpenStack, OpenNebula, .... 
Most of the customers in finance and telco operators 
HQ based in Switzerland (Lugano and Zurich) and office in 
London. 
User privacy is protected by strict Swiss privacy 
regulations, no UE or US exceptions allowed. 
MAKING THE CLOUD A SAFER SPACE
THE CLOUD IN THE ENTERPRISE 
It’s easy to span new instances 
(often) it takes less time than 
internal IT to have a virtual machine 
Great for prototyping and then 
they bring it into production 
Might have discounts from HW/SW 
vendor (especially HP Cloud, 
Azure, ....) 
Some applications are 
outsourced (eg: SalesForce, ...) 
Small software suppliers prefer to 
sell software-as-a-service
WHAT HAPPENS IN REALITY 
Applications 
and instances 
are out of 
control 
Not always 
possible to 
enforce IT 
security 
policies 
Each 
application 
have its own 
username/ 
password 
Prone to 
identity frauds 
and 
bruteforce 
attacks 
Can’t have a 
central point of 
control
62% Increase breaches in 
2013(1) 
TOO MANY THREATS 
1 in 5 rganizations have 
experienced an APT attack (4) 3 Trillion$ total global impact 
of cybercrime(3) 
2,5 billion exposed records 
as results of a data breach in 
the past 5 years(5) 
8 months Is the average time 
an advanced threat goes 
unnoticed on victim’s 
network(2) 
1,3,5: Increased cyber security can save global economy trillions, McKinsey/World Economic Forum, January 2014 2: M-Trends 2013: attack the security gap, Mandiant, 
March 2013 4: ISACA’s 2014 APT study, ISACA, April 2014. Source: ISACA Cyber Security Nexus
Hosted Apps 
THE CLOUD CONTROL 
Cloud Orchestrator 2FA/SSO 
Single point of control
345227 
One Time 
Password 
345227 
345227 Identity 
Management 
Single 
Sign-On 
SECUREPASS FEATURES 3-in-1 identity management for maximum 
security in cloud and internet services: 
Strong authentication: 
no more passwords to remember but “one time password” generated by a 
token. 
Identity management: 
manage users and group lifecycles from a control panel 
Single Sign-On: 
SecurePass recognize users for every application or network integrated
CENTRAL IDENTITY MANAGEMENT SERVICE 
FOR ALL DISTRIBUTED APPLICATIONS AND 
FIREWALLS 
OTP is built-in and mandatory, the way around of “standard” services 
- OTP generated on mobile and hardware tokens 
- Ensure the protection against brute force password attacks 
Works out of the box with all VPN/SSL VPN software 
Works with Web applications with little or no effort 
Works with corporate SaaS applications like SalesForce and Google Apps 
Works with virtualization software such as Citrix XenApp, VMWare Horizon/vCloud & more...
SECUREPASS 
IS OPEN 
Open protocols: RADIUS, LDAP, CAS and 
SAML 
Seamless integration: works out of the box 
with more than 98% of the software 
Clients and APIs available on GitHub 
Python, Java, PHP, C# 
NSS Plugin for Linux 
Apache Plugin 
Plugin for popular CMS Wordpress, Joomla 
& Drupal
Python modules available in the 
Python Installer (PIP) 
GARL WORKS 
UPSTREAM TO 
ENSURE MAXIMUM 
COMPATIBILITY 
Modules are now “upstream” in the main Linux 
distributions: 
- Debian “Jessie” 
- Ubuntu 15.04 “Vivid Vervet” 
- Builds tested & available for Fedora and 
RHEL/CentOS
WHY SECUREPASS IS SECURE 
3 high-secure high-speed datacenters with business 
continuity in different networks. 
High-encryption and best practices as deployed in 
standardmilitary environments. 
Core keys in a secret location, former Swiss military 
premise, resistant up to 10 megatons nuclear attack. 
Only few people has keys to access the data in the 
production environments and their identities is secret 
also to any member of GARL staff, including the board 
itself. 
Processes to revoke the above keys if one of the 
administrator is leaving the company or under any 
personal threat. 
Emergency procedures and legal coverage against 
attack targeted to GARL. 
PCI-DSS and ISO 17799 compliant. 
SecurePass do not deal with your data 
In no case we will be handling your application data 
and we won’t be even able to understand what kind of 
application or device is behind the login process. 
All GARL services are covered with an insurance policy 
with a premier Swiss-based multinational that will be 
able to refund up to 250’000 CHF per incident. With 
special agreements, GARL is able to cover up to 5 Million 
CHF per incident (ask for update).
CASE STUDY WITH ING DIRECT 
100 
75 
50 
25 
0 
RSA VS. SECUREPASS 
TIME COST MTN 
% difference 
RSA SecurePass 
Financial advisors access to European leasing system 
Replacement of RSA 2 factor solution, more than 
70% of savings 
IBM labs created plugin for IBM Websphere portal
GARL IS NOT ONLY SECUREPASS 
Strong authentication and 
identity management for 
cloud and internet services 
Password manager for 
teams with delegation 
Network security assessment 
up to 8 public IP 
Build a virtualization 
service on standard 
hardware without licence 
Secure storage for 
backup to comply to 
industry’s regulations 
Tailored security audit for 
web app, network, VPN 
and devices 
Secure data collection app 
to your centralized server 
BANK OF 
PASSWORDS 
Secure 
Data 
VULNERABILITY 
ASSESSMENT
CUSTOMERS PARTNERS
Q&A

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration Press
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 

Similar a Enterprise secure identity in the cloud with Single Sign On and Strong Authentication

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
Ozgur Gercek
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 

Similar a Enterprise secure identity in the cloud with Single Sign On and Strong Authentication (20)

Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Sophos
SophosSophos
Sophos
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Information Security
Information SecurityInformation Security
Information Security
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Enterprise secure identity in the cloud with Single Sign On and Strong Authentication

  • 1. ENTERPRISE SECURE IDENTITY IN THE CLOUD WITH SINGLE SIGN-ON AND STRONG AUTHENTICATION MAKING THE CLOUD A SAFER SPACE Giuseppe Paternò, Director of GARL @gpaterno | www.gpaterno.com
  • 2. ABOUT ME IT Architect and Security Expert with 20+ years background in Open Source and Cloud (OpenStack, OpenNebula, ...). Former Network and Security architect for Canonical, RedHat, Wind/Infostrada, Sun Microsystems and IBM and Visiting Researcher at the University of Dublin Trinity College. Past projects: standard for J2ME Over-The-Air (OTA) provisioning along with Vodafone, the study of architecture and standards for the delivery of MHP applications for the digital terrestrial television (DTT) on behalf of DTT Lab (Telecom Italia/LA7) and implementation of HLR for Vodafone landline services. Lot of writings, mainly on computer security. CTO and Director of GARL, a multinational company based in Switzerland and UK, owner of SecurePass and SecureAudit.
  • 3. IT security products and virtualization services focused on identity protection on the Cloud. Born from Symantec, conducting pentest and vulnerability assessment on their behalf in EMEA Extensive OpenSource experience and large-scale Open Source projects such OpenStack, OpenNebula, .... Most of the customers in finance and telco operators HQ based in Switzerland (Lugano and Zurich) and office in London. User privacy is protected by strict Swiss privacy regulations, no UE or US exceptions allowed. MAKING THE CLOUD A SAFER SPACE
  • 4. THE CLOUD IN THE ENTERPRISE It’s easy to span new instances (often) it takes less time than internal IT to have a virtual machine Great for prototyping and then they bring it into production Might have discounts from HW/SW vendor (especially HP Cloud, Azure, ....) Some applications are outsourced (eg: SalesForce, ...) Small software suppliers prefer to sell software-as-a-service
  • 5. WHAT HAPPENS IN REALITY Applications and instances are out of control Not always possible to enforce IT security policies Each application have its own username/ password Prone to identity frauds and bruteforce attacks Can’t have a central point of control
  • 6. 62% Increase breaches in 2013(1) TOO MANY THREATS 1 in 5 rganizations have experienced an APT attack (4) 3 Trillion$ total global impact of cybercrime(3) 2,5 billion exposed records as results of a data breach in the past 5 years(5) 8 months Is the average time an advanced threat goes unnoticed on victim’s network(2) 1,3,5: Increased cyber security can save global economy trillions, McKinsey/World Economic Forum, January 2014 2: M-Trends 2013: attack the security gap, Mandiant, March 2013 4: ISACA’s 2014 APT study, ISACA, April 2014. Source: ISACA Cyber Security Nexus
  • 7. Hosted Apps THE CLOUD CONTROL Cloud Orchestrator 2FA/SSO Single point of control
  • 8. 345227 One Time Password 345227 345227 Identity Management Single Sign-On SECUREPASS FEATURES 3-in-1 identity management for maximum security in cloud and internet services: Strong authentication: no more passwords to remember but “one time password” generated by a token. Identity management: manage users and group lifecycles from a control panel Single Sign-On: SecurePass recognize users for every application or network integrated
  • 9. CENTRAL IDENTITY MANAGEMENT SERVICE FOR ALL DISTRIBUTED APPLICATIONS AND FIREWALLS OTP is built-in and mandatory, the way around of “standard” services - OTP generated on mobile and hardware tokens - Ensure the protection against brute force password attacks Works out of the box with all VPN/SSL VPN software Works with Web applications with little or no effort Works with corporate SaaS applications like SalesForce and Google Apps Works with virtualization software such as Citrix XenApp, VMWare Horizon/vCloud & more...
  • 10. SECUREPASS IS OPEN Open protocols: RADIUS, LDAP, CAS and SAML Seamless integration: works out of the box with more than 98% of the software Clients and APIs available on GitHub Python, Java, PHP, C# NSS Plugin for Linux Apache Plugin Plugin for popular CMS Wordpress, Joomla & Drupal
  • 11. Python modules available in the Python Installer (PIP) GARL WORKS UPSTREAM TO ENSURE MAXIMUM COMPATIBILITY Modules are now “upstream” in the main Linux distributions: - Debian “Jessie” - Ubuntu 15.04 “Vivid Vervet” - Builds tested & available for Fedora and RHEL/CentOS
  • 12. WHY SECUREPASS IS SECURE 3 high-secure high-speed datacenters with business continuity in different networks. High-encryption and best practices as deployed in standardmilitary environments. Core keys in a secret location, former Swiss military premise, resistant up to 10 megatons nuclear attack. Only few people has keys to access the data in the production environments and their identities is secret also to any member of GARL staff, including the board itself. Processes to revoke the above keys if one of the administrator is leaving the company or under any personal threat. Emergency procedures and legal coverage against attack targeted to GARL. PCI-DSS and ISO 17799 compliant. SecurePass do not deal with your data In no case we will be handling your application data and we won’t be even able to understand what kind of application or device is behind the login process. All GARL services are covered with an insurance policy with a premier Swiss-based multinational that will be able to refund up to 250’000 CHF per incident. With special agreements, GARL is able to cover up to 5 Million CHF per incident (ask for update).
  • 13. CASE STUDY WITH ING DIRECT 100 75 50 25 0 RSA VS. SECUREPASS TIME COST MTN % difference RSA SecurePass Financial advisors access to European leasing system Replacement of RSA 2 factor solution, more than 70% of savings IBM labs created plugin for IBM Websphere portal
  • 14. GARL IS NOT ONLY SECUREPASS Strong authentication and identity management for cloud and internet services Password manager for teams with delegation Network security assessment up to 8 public IP Build a virtualization service on standard hardware without licence Secure storage for backup to comply to industry’s regulations Tailored security audit for web app, network, VPN and devices Secure data collection app to your centralized server BANK OF PASSWORDS Secure Data VULNERABILITY ASSESSMENT
  • 16. Q&A