The Challenge: Going Beyond the Limitations and …...people securely use kiosk-style shared...

4
PROX Passwords Fingerprints Cards PINs Bluetooth Phones Facial Recognition DigitalPersona ® Pro Enterprise Multi-Factor Authentication & Access Management for Active Directory Multi-Factor Authentication – Knowing Who Does What Enterprise security starts with being able to accurately identify who is actually using your business systems. Industry best practices say that you should combine: • What Users Know – passwords or PINs • What Users Are – biometrics • What Users Have – proximity cards, smart cards, Bluetooth phones, etc. The key is to tailor the right mix of authentication techniques to the needs of each group of users in your business without adding IT complexity. Securing Application Access from the Desktop to the Cloud While securing access to your computers is a good start, your data and the applications that reside on them are also critical to control. From legacy desktop programs and Citrix or VMware applications to cloud-based apps, access has to be secure and practical for your users. In addition, many companies want to be sure that their most critical apps in the cloud can only be accessed from IT-controlled computers. The key is to tailor the right mix of authentication techniques to the needs of each group of users in your business without adding IT complexity. Access Recovery is the Key to Preventing Lockouts Authentication isn’t just about how users identify themselves during their normal day-to- day activities. It’s also about how you handle forgotten passwords, lost proximity cards and people who have left the company abruptly. In such emergencies, your IT managers must be able to help users get back in – or unlock a machine if the user is no longer around. The Challenge: Going Beyond the Limitations and Costs of Passwords It starts simply enough. New security or compliance rules require that you accurately track who is accessing critical data. First you try turning on “complex” password policies for logging into Windows and your network. But, your helpdesk starts getting more calls about forgotten passwords. Next, auditors ask how you manage access to applications, forcing you to turn on complex passwords for them as well. Toss in the growing fears about how you can maintain control over cloud-based apps and the pressure begins to rise. IT costs escalate and user productivity drops as people spend more and more time wrestling with security. But, it doesn’t stop there. As passwords get more complex, people start sharing them and writing them on sticky notes attached to computer screens, causing grief for IT and your auditors. Regulations get even stricter, requiring that you go beyond passwords and use multiple factors of identification. Which ones do you use? How can you manage them together without creating a patchwork of systems that’s prone to breaking each time one of the pieces changes?

Transcript of The Challenge: Going Beyond the Limitations and …...people securely use kiosk-style shared...

Page 1: The Challenge: Going Beyond the Limitations and …...people securely use kiosk-style shared workstations. On thin clients, users can log onto their virtualized desktop in a snap and

PROX

Passwords

Fingerprints

Cards

PINs

Bluetooth Phones

Facial Recognition

DigitalPersona® Pro EnterpriseMulti-Factor Authentication & Access Management for Active Directory

Multi-Factor Authentication – Knowing Who Does What

Enterprise security starts with being able to accurately identify who is actually using your business systems. Industry best practices say that you should combine:

• What Users Know – passwords or PINs • What Users Are – biometrics • What Users Have – proximity cards, smart cards, Bluetooth phones, etc.

The key is to tailor the right mix of authentication techniques to the needs of each group of users in your business without adding IT complexity.

Securing Application Access from the Desktop to the Cloud

While securing access to your computers is a good start, your data and the applications that reside on them are also critical to control. From legacy desktop programs and Citrix or VMware applications to cloud-based apps, access has to be secure and practical for your users. In addition, many companies want to be sure that their most critical apps in the cloud can only be accessed from IT-controlled computers. The key is to tailor the right mix of authentication techniques to the needs of each group of users in your business without adding IT complexity.

Access Recovery is the Key to Preventing Lockouts

Authentication isn’t just about how users identify themselves during their normal day-to-day activities. It’s also about how you handle forgotten passwords, lost proximity cards and people who have left the company abruptly. In such emergencies, your IT managers must be able to help users get back in – or unlock a machine if the user is no longer around.

The Challenge: Going Beyond the Limitations and Costs of PasswordsIt starts simply enough. New security or compliance rules require that you accurately track who is accessing critical data. First you try turning on “complex” password policies for logging into Windows and your network. But, your helpdesk starts getting more calls about forgotten passwords. Next, auditors ask how you manage access to applications, forcing you to turn on complex passwords for them as well. Toss in the growing fears about how you can maintain control over cloud-based apps and the pressure begins to rise. IT costs escalate and user productivity drops as people spend more and more time wrestling with security.

But, it doesn’t stop there. As passwords get more complex, people start sharing them and writing them on sticky notes attached to computer screens, causing grief for IT and your auditors. Regulations get even stricter, requiring that you go beyond passwords and use multiple factors of identification. Which ones do you use? How can you manage them together without creating a patchwork of systems that’s prone to breaking each time one of the pieces changes?

Page 2: The Challenge: Going Beyond the Limitations and …...people securely use kiosk-style shared workstations. On thin clients, users can log onto their virtualized desktop in a snap and

EnterpriseApps

Email

Custom Apps

DigitalPersona ProManagement Software

on Active Directory

DigitalPersona ProClient Software

Kiosks

Laptops

Mobile Laptops

Desktops

IntranetPortals

Web

VPNs

Password

PIN

Something You Know

FingerprintFace

Something You Are

Smart Card Contactless Card

Proximity Card Bluetooth Phone

Something You Have

DigitalPersona Pro Enterprise is a multi-factor authentication and access management solution that secures and controls access to PCs, applications and networks. Managed via Active Directory, it combines Strong Authentication, Single Sign-On (SSO) and Access Recovery into a single console. DigitalPersona Pro Enterprise is the choice of leading businesses and government agencies around the world, enabling them to increase security and simplify compliance while reducing operating costs.

Multi-Factor AuthenticationFrom biometrics to cards and PINs, DigitalPersona Pro makes strong authentication simple and affordable for PC login, Enterprise applications (on the desktop

or in the cloud) and VPN access.

Active DirectoryDigitalPersona Pro Enterprise snaps into Active Directory for maximum scalability and reliability and

doesn’t require special server hardware.

Citrix, VMware, RDPDigitalPersona Pro Enterprise lets multiple people securely use kiosk-style shared workstations. On thin clients, users can log onto their virtualized desktop in a snap and keep working as they move from PC to PC.

Centralized Auditing and ReportingAbility to aggregate and report on DigitalPersona Pro Enterprise events such as identity and access management data to ensure that only authorized users and systems gain access to sensitive information. Logging and monitoring to capture, review and analyze

client activities.

“Token-less” VPN LogonAdd one-time password security to RADIUS apps such as VPNs, Citrix, and OWA. Users can use fingerprints, cards or other authentication factors to generate the OTP automatically.

Single Sign-On (SSO)Enable Single Sign-On into any enterprise application, including Web apps, Windows applications, Citrix, A/S400, and more – without

modifying the application.

Emergency Access RecoveryPrevent lockouts when people forget their password, lose a proximity card

or leave the company.

Cloud App Access ControlPrevent access to Web apps from

uncontrolled devices.

DigitalPersona Pro EnterpriseStrong Authentication, SSO and Access Recovery

Page 3: The Challenge: Going Beyond the Limitations and …...people securely use kiosk-style shared workstations. On thin clients, users can log onto their virtualized desktop in a snap and

Around the world, people rely upon DigitalPersona for securing access to data and applications. Doctors, bank employees, law enforcement officers and many others are able to do their jobs more effectively because DigitalPersona Pro eliminates the hassles of dealing with impossible-to-remember passwords. It brings together biometrics, proximity cards and other modern authentication technologies, giving IT organizations the ability to quickly address growing security and compliance needs – all while reducing helpdesk calls. Here’s how DigitalPersona Pro has helped some of our customers and can help you:

Secure and speed up access to Electronic Health Records

• Doctors and nurses in exam rooms with shared-user kiosks log onto clinical applications securely and quickly using biometrics or proximity cards. DigitalPersona Pro eliminates the need to log in and out of Windows, providing access to critical data in seconds instead of minutes.

• Staff working remotely can securely log onto the VPN with two-factor RADIUS authentication.

Secure financial transactions and payment data

• Bank tellers log onto their stations using strong authentication, enabling the bank to know who is doing what.

• Tellers quickly log onto the many different applications needed to serve customers – without having to juggle dozens of passwords.

• Institutions secure bank-to-bank cash transactions and communications with biometrics to tie actions to individuals.

Protect access to Criminal Justice Information Systems data

• Law enforcement officers securely access CJIS data from police cars using two-factor authentication and RADIUS one-time passwords.

• Firefighters and other public safety personnel streamline the use of shared computers while maintaining security.

• Local government agencies protect operations by improving user accountability when processing tax payments.

Solutions to Make Your Business Faster and Safer

Page 4: The Challenge: Going Beyond the Limitations and …...people securely use kiosk-style shared workstations. On thin clients, users can log onto their virtualized desktop in a snap and

 

© 2012 DigitalPersona, Inc. All rights reserved. DigitalPersona, is a trademark of DigitalPersona, Inc. registered in the U.S. and other countries. All other brand and product names are trademarks or registered trademarks of their respective owners. MC-087-052912

DigitalPersona, Inc. 720 Bay RoadRedwood City, CA 94063 USAwww.digitalpersona.com+1 650.474.4000

Use your Active Directory – no special server hardware requiredDigitalPersona Pro Enterprise takes advantage of your

existing Active Directory infrastructure for high scalability

and fault tolerance without requiring any special server

hardware. Using familiar Group Policy tools, DigitalPersona

Pro Enterprise lets you quickly create, deploy, enforce and

monitor security policies across your network.

Making Security Simple to Manage and Easy to UseDigitalPersona Pro Enterprise fits into your existing environment, allowing you to add security and efficiency as needed.

Access Recovery: IT-Assisted and Self-ServiceWith DigitalPersona Pro Enterprise, you can dramatically

reduce the need for password resets. If a password is

forgotten, a proximity card is lost, or an employee leaves the

company, IT managers can securely provide one-time access

codes that get users back into their Windows account, even

when they’re on the road without a network connection. You

can even allow users to get back into their PCs by answering

questions that IT controls.

Add Strong Authentication on top of Existing Applications in MinutesDigitalPersona Pro Enterprise provides a powerful, consistent

platform for securing access to applications throughout your

business. With it, you can add strong authentication on top

of password-based applications as needed, without having

to modify the apps. With DigitalPersona Pro Enterprise, you

can address today’s pressing needs and seamlessly scale

up to handle more users and more applications as your

requirements grow.