SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
LLEVANDO LA AUTENTICACION
DE SUS CLIENTES A UN
SIGUIENTE NIVEL
Sonia Cordova - Territory Account Manager
Gabriela Valdiva – SecurID Account Manager
Cloud, mobile, social son tecnologìas que expanden la superficie de ataque
Identidad es ahora el vector màs importante de
ataque
Ataques en
aplicaciones web
fueron con
credenciales
robadas
81%
2
*Verizon Data Breach Investigations Report
 Passwords pueden ser capturados fàcilmente por phishing y otros mecanimos.
 Usuarios escriben y comparten passwords
 El punto de la cadena es el usuario
 Los passwords son tan dèbiles que pueden ser adivinados fàcilmente
PASSWORDS ESTÀN EN CRISIS
123123123
789789789
456456456
VPN
!
!
!
DESAFIOS DE
ACCESOS
REMOTOS
Remote Access (VPN)
 Critical for today’s distributed
and mobile workforce
 Passwords are easily
compromised



2FA for VPN
 IT administrators, road warriors,
remote employees
 ~ 20% of employees
Remote Access (VPN)
 Critical for today’s distributed
and mobile workforce
 Passwords are easily
compromised
VPN
OTP Tokens
 High-level of security
 Always on and available
 Broadest number of use scenarios
Autenticaciòn hoy
La Era Digital trae una
inmensa Oportunidad Digital
(Pero ...)
NUEVOS DESAFIOS DE
IDENTIDAD
Islas de Identidad”
MODERNIZATION
Ataques màs sofisticados y
frecuentes
MALICE
NUEVAS
CAPACIDADES CON
NECESARIAS
8
C ON VEN IEN T & SEC U R E A C C ESS IN A W OR LD W ITH OU T B OU N D A R IES
RSA
EVOLVE FROM STRONG
AUTHENTICATION
TRANSFORM TO IDENTITY
ASSURANCE
• Trusted by 25,000+ Enterprises
• More than 50 million active users
• 500+ certified technology partners
• More than 50% market share
• The undisputed leader in multi-factor auth
• Any application: on-premises or in the cloud
• Mobile MFA: Push, OTP, biometrics & more
• Risk-based Identity Assurance
Risk-based Authentication
Access in context
RISK RISKYPASS DENY
Device AppRole Location Behavior
MACHINE
LEARNING
Pervasive MFA
Certified and supported
CRITICAL SECURE ACCESS CAPABILITIES
Modern MFA Methods - SSO
Easy & convenient
Push Mobile OTP Biometrics Text Msg Voice Call
ProximityHW Token WearablesSW Token FIDO
Assurance Levels
Challenge according to the level of risk
Security
Risk
RISK-BASED IDENTITY ASSURANCE
PASS
Desktop or mobile
(web browser)
NetworkSession
Device Location
AppRole
RSA SecurID token
Mobile OTP
Push (Approve)
Fingerprint
FaceID
Apple Watch
FIDO
Step-Up
Authentication
RISKY Identity Assurance
Service
THE REQUIRED CAPABILITIES FOR
SECURE ACCESS
user experience that’s easy
to deploy and manage
C ON VEN IEN T
authentication that adapts to
risk and grows with you
IN TELLIGEN T
access control from
ground to cloud
PERVASIVE
CASOS DE USO
13
APP PERSONALIZADA - ICONO & APLICACIÓN
ICONO
App Móvil
Finance
APLICACION
SDK for Mobile
APP PERSONALIZADA EMBEBIDA EN LA APP
ICONO
Personnalité
Finance
APLICACION
RSA
SecurID
Token
Embebido,
utilizando el
SDK for
Mobile
CASO DE USO – ECUADOR (FINANCIERO)
 IMPLEMENTACION DE TOKEN DIGITAL
PARA SUS CLIENTES
 INTEGRACION DE SDK EN SU PROPIO
APP
 PROCESO AUTOMATIZADO DE
ACTIVACION DE TOKEN
 MONITOREO DE AUTENTICACIÒN DE
CLIENTES Y GESTION DE USUARIOS A
TRAVES DEL SERVICIO DE CYBERSOC DE
SECURESFOT
MUCHAS GRACIAS!
Sonia.cordova@rsa.com
Territory Account Manager
Gabriela.Valdivia@rsa.com
Sr SecurID Account Manager

Más contenido relacionado

La actualidad más candente

cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
PRIYANKA944
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
STO STRATEGY
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
STO STRATEGY
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
STO STRATEGY
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
STO STRATEGY
 

La actualidad más candente (20)

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Cyber security
Cyber securityCyber security
Cyber security
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Plurilock Zero Trust One Page Quick Overview
Plurilock Zero Trust One Page Quick OverviewPlurilock Zero Trust One Page Quick Overview
Plurilock Zero Trust One Page Quick Overview
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Intro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor AuthenticationIntro to Smart Cards & Multi-Factor Authentication
Intro to Smart Cards & Multi-Factor Authentication
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Mobile device management GFE
Mobile device management GFEMobile device management GFE
Mobile device management GFE
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
Mobile security
Mobile securityMobile security
Mobile security
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 

Similar a Llevando la autenticación de sus clientes a un siguiente nivel

Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
Ben Massey
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 

Similar a Llevando la autenticación de sus clientes a un siguiente nivel (20)

Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Easy Solutions Product Brochure
Easy Solutions Product BrochureEasy Solutions Product Brochure
Easy Solutions Product Brochure
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authentication
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightMahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptx
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 

Más de Cristian Garcia G.

Más de Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Llevando la autenticación de sus clientes a un siguiente nivel

  • 1. LLEVANDO LA AUTENTICACION DE SUS CLIENTES A UN SIGUIENTE NIVEL Sonia Cordova - Territory Account Manager Gabriela Valdiva – SecurID Account Manager
  • 2. Cloud, mobile, social son tecnologìas que expanden la superficie de ataque Identidad es ahora el vector màs importante de ataque Ataques en aplicaciones web fueron con credenciales robadas 81% 2 *Verizon Data Breach Investigations Report
  • 3.  Passwords pueden ser capturados fàcilmente por phishing y otros mecanimos.  Usuarios escriben y comparten passwords  El punto de la cadena es el usuario  Los passwords son tan dèbiles que pueden ser adivinados fàcilmente PASSWORDS ESTÀN EN CRISIS
  • 4. 123123123 789789789 456456456 VPN ! ! ! DESAFIOS DE ACCESOS REMOTOS Remote Access (VPN)  Critical for today’s distributed and mobile workforce  Passwords are easily compromised
  • 5.    2FA for VPN  IT administrators, road warriors, remote employees  ~ 20% of employees Remote Access (VPN)  Critical for today’s distributed and mobile workforce  Passwords are easily compromised VPN OTP Tokens  High-level of security  Always on and available  Broadest number of use scenarios Autenticaciòn hoy
  • 6. La Era Digital trae una inmensa Oportunidad Digital (Pero ...)
  • 7. NUEVOS DESAFIOS DE IDENTIDAD Islas de Identidad” MODERNIZATION Ataques màs sofisticados y frecuentes MALICE
  • 9. C ON VEN IEN T & SEC U R E A C C ESS IN A W OR LD W ITH OU T B OU N D A R IES RSA EVOLVE FROM STRONG AUTHENTICATION TRANSFORM TO IDENTITY ASSURANCE • Trusted by 25,000+ Enterprises • More than 50 million active users • 500+ certified technology partners • More than 50% market share • The undisputed leader in multi-factor auth • Any application: on-premises or in the cloud • Mobile MFA: Push, OTP, biometrics & more • Risk-based Identity Assurance
  • 10. Risk-based Authentication Access in context RISK RISKYPASS DENY Device AppRole Location Behavior MACHINE LEARNING Pervasive MFA Certified and supported CRITICAL SECURE ACCESS CAPABILITIES Modern MFA Methods - SSO Easy & convenient Push Mobile OTP Biometrics Text Msg Voice Call ProximityHW Token WearablesSW Token FIDO Assurance Levels Challenge according to the level of risk Security Risk
  • 11. RISK-BASED IDENTITY ASSURANCE PASS Desktop or mobile (web browser) NetworkSession Device Location AppRole RSA SecurID token Mobile OTP Push (Approve) Fingerprint FaceID Apple Watch FIDO Step-Up Authentication RISKY Identity Assurance Service
  • 12. THE REQUIRED CAPABILITIES FOR SECURE ACCESS user experience that’s easy to deploy and manage C ON VEN IEN T authentication that adapts to risk and grows with you IN TELLIGEN T access control from ground to cloud PERVASIVE
  • 14. APP PERSONALIZADA - ICONO & APLICACIÓN ICONO App Móvil Finance APLICACION SDK for Mobile
  • 15. APP PERSONALIZADA EMBEBIDA EN LA APP ICONO Personnalité Finance APLICACION RSA SecurID Token Embebido, utilizando el SDK for Mobile
  • 16. CASO DE USO – ECUADOR (FINANCIERO)  IMPLEMENTACION DE TOKEN DIGITAL PARA SUS CLIENTES  INTEGRACION DE SDK EN SU PROPIO APP  PROCESO AUTOMATIZADO DE ACTIVACION DE TOKEN  MONITOREO DE AUTENTICACIÒN DE CLIENTES Y GESTION DE USUARIOS A TRAVES DEL SERVICIO DE CYBERSOC DE SECURESFOT
  • 17. MUCHAS GRACIAS! Sonia.cordova@rsa.com Territory Account Manager Gabriela.Valdivia@rsa.com Sr SecurID Account Manager