0% found this document useful (0 votes)
23 views

SafeNet Trusted Access Customer Facing Presentation March2022

SafeNet Trusted Access provides secure access to applications through comprehensive authentication solutions, addressing the increasing complexity and risk organizations face. It emphasizes the importance of protecting user identities against cyber threats, with a focus on modern authentication methods and real-time risk assessment. The solution aims to simplify access management while enhancing security for diverse user needs across various environments.

Uploaded by

elpistonino11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

SafeNet Trusted Access Customer Facing Presentation March2022

SafeNet Trusted Access provides secure access to applications through comprehensive authentication solutions, addressing the increasing complexity and risk organizations face. It emphasizes the importance of protecting user identities against cyber threats, with a focus on modern authentication methods and real-time risk assessment. The solution aims to simplify access management while enhancing security for diverse user needs across various environments.

Uploaded by

elpistonino11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

SafeNet Trusted Access

Enable your organization to thrive with simple, secure


access to all your apps, with authentication everywhere

1
Organizations are facing
INCREASED COMPLEXITY &
RISK

01 02 03 04
More users Diverse user More apps More end
USERS
to protect types to protect points to
support

USER
CONTEXT

APPS

2
80%
Of all hacks started with

>
compromised identity

2021 VERIZON DBIR WHEN



7 out of
10
Users are all still
making up passwords

IDC

3
Today, all users are targets

Credential
Data scraping
Harvesting

Phishing

4
The cybercriminal credential laundering business chain

Credential
Spray

Credential Dark web


Harvesting Marketplace

Access
Broker

5
Bad guys don’t break in, they log in.

Elevate Deliver
Login
Privileges payload
J. Doe

6
IT
DIFFERENT USERS
H AV E D I F F E R E N T
NEEDS AND
E X P E C TAT I O N S

SALES OFFICE FRONTLINE


EXECUTIVE WORKER WORKER
Field based worker
Office worker
Administrator Looking at Checking her Submitting a PTO Accessing his paystub
sales figures schedule from her request from his once every two weeks
Supervisor from her smart home home computer from a shared terminal
laptop display
User with own device
Physically disabled
Customer
Answering emails Logging into his
while commuting from desktop at the start of
Delivery driver his mobile device the day in the office
Zero hours worker
Internship worker
Returning worker
Off sick worker
Worker on holiday
Third party supplier

7
M FA i s a c r i t i c a l s e c u r i t y m e c h a n i s m b u t n o t a l l
M FA i s c r e a t e d e q u a l

Authenticator apps have Limited mobile connectivity


limitations

SMS is deprecated, OTP Operate in hands-free environment


soon to be

Hardware can be
Frontline workers
difficult to manage

Users without corporate issued devices

Users on shared workstations


8
R E D E F I N E A C C E SS S E C U R I T Y

9
How can you
Q U I C K LY C L O S E
A U T H E N T I C AT I O N G A P S

across complex environments without


overburdening IT and users?

10
Secure access with
A U T H E N T I C AT I O N
E V E RY W H E R E

Protect more apps


quickly and simply

Extend secure access to


more user constituencies

Leverage existing investments

11
The
THALES
A P P R OA C H

12
Discover

Find & classify your data wherever it resides

UN C OV E R W H O YO UR
USERS ARE, AND THE
SPECIFIC NEEDS OF
T H E I R A U T H E N T I C AT I O N
JOURNEYS

IAM workshop
Secure sensitive data against increasing threats

Protect P R O T E C T M O R E U S E R S BY
I M P L E M E N T I N G A C C E SS
POLICIES AND
A U T H E N T I C AT I O N A C R O S S
YO UR I T E N V I R O N M E N T

STA policy and risk engine


Control

Simplify & automate access to sensitive data

MONITOR AND CONTROL


R I S K W I T H R E A L -T I M E
CONTINUOUS POLICY
ENFORCEMENT

Policy enforcement and monitoring


SAFENET TRUSTED
A
WeChelp
C Eyou
S Sprotect
: MORE
USERS and MORE APPS
with powerful
authentication and AM MULTIFACTOR AUTHENTICATION
capabilities

3 0 9 7 4
0 4 6 9 6
7 2 0 8 2

Tokens 1 5 5 5 8
3 2 8 1 1
Pattern-
FIDO OTP Push PKI CBA based

Credentials

OTP
Passwordless Biometric Hardwar 3rd Party
e

SMS Voice eMail

16
SAFENET TRUSTED
A
WeChelp
C Eyou
S Sprotect
: MORE
USERS and MORE APPS
with powerful
authentication and AM MODERN AUTHENTICATION
capabilities

Adaptive
Modern federation and authentication protocols that Policies

establish trust between parties


Passwordless
The ability to make continuous risk assessments and
enforce access policies
Continuous & intelligent
Signals
Reliance on new authentication methods such Analytics/UEBA
Risk assessments
passwordless, FIDO and biometrics, and adaptive Identity validation

authentication

17
SAFENET TRUSTED
A
WeChelp
C Eyou
S Sprotect
: MORE
USERS and MORE APPS
with powerful
authentication and AM ACCESS MANAGEMENT AND AUTHENTICATION,
capabilities DELIVERED AS A SERVICE

Multifactor
Modern authentication Access management
authentication

Tokens Adaptive Single sign on


Policies

Make effective choices for Credentials Passwordless Authorization


MFA by focusing on risk-
appropriate options, rather Continuous & intelligent
than check-box compliance, Signals
Analytics/UEBA
Risk assessments
and encompassing Identity validation

diverse UX needs
Gartner

18
REDUCE RISK ACROSS YOUR ENVIRONMENT
W I T H A U T H E N T I C AT I O N E V E RY W H E R E
SaaS,
multi cloud
SAML,
C OIDC
Suite HTTP standard
web apps

On premises/
App
Knowledge workers legacy web apps
Gateway
ERP, HRMS, Intranet

Agents Network domain logon


IT
Admins
RADIUS,
Network infra
SAML
(VPN, WAF, WAM)
Firstline workers SAFENET TRUSTED ACCESS
3rd
Authentication Access policies SSO MFA
party
provider
IAM

PROTECT ALL ENVIRONMENTS


PROTECT ALL USERS CONTROL RISKS IN R E A L -T I M E
& LOCATIONS

Expand user coverage


Real-time, continuous risk Expand all environments & locations
Deliver modern passwordless authn
Assessments & remediation Complement 3rd party IAM tools
Reduce management overheads
19
IT

D E P L O Y S E C U R E A C C E S S Q U I C K LY &
E F F I C I E N T LY

According to McKinsey, Plugs into your


environment
75%
of cloud transformation Complements existing IDPs
projects run over budget, and

Enables remote IT operations


38%
go beyond schedule
Protects all users, apps, OS and endpoints

20
IT
S P E E D U P I M P L E M E N TAT I O N W I T H
S M O O T H P O L I C Y C O N F I G U R AT I O N

01 I D E N T I F Y TA R G E T
APPS AND USERS 02 DEFINE POLICIES 03 MONITOR RISK

IT Admins Standard C-Suite


04 ADJUST

Users
Scenario- Compliance- Based on Set Auth rules
driven focused context & risk by policy

21
Deploy and implement flexibly

Native cloud Hybrid


delivery deployment

22
Secure access with
A U T H E N T I C AT I O N
E V E RY W H E R E

Protect more apps


quickly and simply

Extend secure access to


more user constituencies

Leverage existing investments

23
Adaptive /
Multiple MFA contextual Conditional Unlimited app
methods authentication access federation

W H AT ’ S
IN THE
B OX ? S TA N D A R D S U B S C R I P T I O N I N C LU D E S
All-inclusive subscription -
No hidden fees!

Policy-based Multiple tokens – Customer 100% cloud solution


configuration hardware and support that installs with
and risk scoring software – per your current
users infrastructure
(Hybrid option available)

24
NEXT STEPS

25
M A P Y O U R A U T H E N T I C AT I O N N E E D S
IAM DEMO
WORKSHOP

Proof of
concept
Immediate set up Flexible duration Test any tokens Protect any app

26
WE SERVE THE WORLD’S LEADING
O R G A N I Z AT I O N S

30 years in Identity More than 25,000 IAM Pioneer in cloud-based PKI authentication leader
& Access Management customers and more than authentication, with more than
30 million users 4.5 million paying subscribers

27
SECURING YOUR
D I G I TA L
T R A N S F O R M AT I
ON
S O T H AT YO U R
BUSINESS CAN

THRIVE
WITH
A U T H E N T I C AT I O
Imagine N E V E RY W H E R E

28
THANK YOU
Comparison between hybrid and SaaS delivery in terms of operational
investments

Hybrid Approach Native Cloud


Combined deployment -SAS PCE – SafeNet Trusted Access Migration to SafeNet Trusted Access
 Infrastructure licenses and operational cost (Virtual Machines, Windows  NO Infrastructure licenses and operational cost.
licenses, Database licenses, Administration cost etc.)

 Setting up DR environment for SAS-PCE cost gets double as well as  NO DR setup, High Availability is managed via cloud provider
integrations effort. availability zones

 Additional SAS-PCE Windows and DB Servers licenses for DR site  NO Windows System or DB Licenses

 SAS-PCE Primary Site and DR Site Database synchronization operational  NO DR Site database synchronization operational cost.
cost.

 SAS-PCE regular software updates for bug fixing and new features.  Handled by Thales Cloud operation team.

 SAS-PCE infrastructure and Windows operating system regular updates and  Handled by Thales Cloud operation team.
downtimes.
 STA is more feature reach providing SSO, Adaptive
 SAS-PCE limited feature set for adaptive and contextual authentication.
authentication, CBA and much more.

 MobilePass+ software token enrollment/activation via public network setup  MobilePass+ enrollment and Push-OTP features are ready to
challenges, LB, WAF, Firewalls. use.

 OTP, CBA and Kerberos (Windows) password based SSO with


 Limited SSO via third party.
adaptive contextual authentication.

29

You might also like