Protegiendo el acceso y transacciones de su organización. Jorge Carbón

Slides:



Advertisements
Presentaciones similares
Spokesperson will be Jay Schaudies, Vice President, Global eCommerce.
Advertisements

Cable & Wireless Panamá. Entrar a Inicio, Programas y buscar Windows Live.
Software Expo 2005 INTRODUCCION A ITIL Mayo 2005 Title slide.
You need to improve the way you write and think in Spanish - Time This is an interactive presentation. You need your work sheet, your pencil, and your.
How to Conjugate… SPANISH VERBS.
El pretérito The Preterite
Youth training and employment in the knowledge society ILO International Training Centre Alessandra Molz Employment and Skills Development Programme.
Noviembre– La lección tres. cgaisar arcasigaasar carga caracasagasasaca caigaarcascasarsacargracias.
WB XBRL VIDEO CONFERENCE Nelson Carvalho – XBRL I. I. Board Member XBRL: A TOOL FOR WHAT? BUSINESSES NEED FUNDING RISKS CONTAMINATE PRICES - MAKE FUNDING.
Como Configurar el Internet
PLEASE READ (hidden slide) This template uses Microsofts corporate font, Segoe Segoe is not a standard font included with Windows, so if you have not.
Productividad personal Estar al día Colaboración Limitada.
The Plurals of adjectives
Grupos de Trabajo 6 - Informe Working Group 6 – Report Transparency.
Grupos de Trabajo # 7 - Informe Working Group # 7 – Report General Business and Operational Risks.
Empresa y Sociedad Tema 1. Teoría de la Empresa y de la Sociedad Dr. Antonio Lloret 17 de Enero de 2011.
USING THE INTERNET. 2 Concept 6.1 What Is the Internet? The Internet is millions of computers from all parts of the world connected so that they can communicate.
Game Cluedo: How to Play 1.Your group should have the 21 cards containing 6 cards of suspects, 9 rooms and 6 weapons, a tally card for each member and.
TechBA: Modelo de Aceleración en Silicon Valley Jorge Zavala CEO TechBA Silicon Valley TechBA: Mexicos Premier Source for Innovative.
Description Digital school is an educational movement that use technology to learn and transform the educational practice to promote the students integral.
Time Expression with Hacer
Java WebServices Security Ing. Lennon Shimokawa Miyashiro
más con la ropa y tener que el tiempo de la playa y de las montañas
Los Verbos Capítulo 1 Parte 2.
Departamento Administrativo de Ciencia, Tecnología e innovación Colciencias República de Colombia VII Ordinary Meeting of the COMCYT Working Group Technological.
¿ Que día es hoy? Hoy es lunes ¿ Cual es la fecha de hoy? Hoy es el 26 de septiembre ¿ Cual es tu clase favorita? Mi clase favorita es… BELL RINGER.
1. My dad likes Match of the Day because he loves football. 2. My older sister loves X Factor because she likes singing. 3. My mum likes Come Dine with.
Español 1 18 y 19 de septiembre de Escribe los meses que combinan con las estaciónes. (Write the months that match with the seasons.) El otoño-
Budapest, WE ARE MOTHERS Because we want to be. Because nobody can love our kids more than what we do
Fundada en 1998 y adquirida por EMC en 2004, VMware fue pionero de la tecnología de virtualización En 2009 tuvo ventas por $2 billones de USD, más.
Spanish Ia (Final Exam) Crossfire Initial Activity 1. Brief notes on tener... (or review if you have received them already!) Tener---formas Tener.
ExpoForo 2008 "Políticas Públicas em la era digital" Camillo Speroni VP & GM Novell Latin America
Cloud Computing y Data Centers ¿Por qué tanto interés de tanta gente? Costo en DC pequeño (1000 servers) Costo en DC grande ( servers) Ratio RedUSD.
(por favor) By emory gibson Para describir how long ago en español, presta attencion.
Antonio Gámir TSP – Windows Client Microsoft Ibérica.
Su Negocio Conectado. VisibilidadVisibilidad ColaboraciónColaboración PlanificaciónPlanificación EjecuciónEjecución Build Connections.
Clustered Hard Disk Drives Cold data.
para desarrolladores Minimizar el cambio Concentrarse en estabilidad, confiabilidad y rendimiento. Ayudar a mejorar la productividad Reducir la curva.
Bienvenido a Technet Summit Forefront Client Security.
LA SOCIEDAD CONECTADA EL lugar de trabajo del futuro.
Que tiempo hace 2? ?.
¿Qué hora es? (What time is it?)
La Lección del Repaso Antes de entrar en la clase de Español IV, necesita saber esta información.
1 USMP PhD in Information Systems Engineering INFRASTRUCTURE MANAGEMENT - IM The Information and Communications Technology Infrastructure Management (ICT-IM)
& Password Security Computer TrainingComputer Training.
 Making complete sentences How to make complete sentences in Spanish. The following presentation is designed to help you learn how to do the following:
Porque nos importa la seguridad
Seguridad en sistemas de Información verano 2004 Francisco Rodríguez Henríquez Security Services in Information Systems.
THOMSON SCIENTIFIC Updates for April Copyright 2006 Thomson Corporation 2 2 Actualizaciones Actualizaciones a las herramientas Refine y Analyze.
Subject Pronouns and “Ser”.  What word do you use to talk about yourself?  What word do you use to talk about yourself and someone else?  What word.
 1. Why should a person learn Spanish? Give at least 3 reasons in your explanation.  2. What Spanish experiences have you had? (None is not an option.
Derechos de Autor©2008.SUAGM.Derechos Reservados Sistema Universitario Ana G. Méndez División de Capacitación Basic Quality Tools CQIA Primer Section VII.
Stations Homework Remember that we need to make sentences in Spanish, we are growing and the way we use our knowledge should grow with you. We need to.
ESPERANZA ~ HOPE Y el Dios de esperanza os llene de todo gozo y paz en el creer, para que abundéis en esperanza por el poder del Espíritu Santo. May the.
E-Clouds: A Platform and Marketplace to Access and Publish Scientific Applications as a Service 1er Foro Internacional de Bioinformática Ciencia y Tecnología.
Santiago de Chile January 2012 Roundtable 6: Lobby regulation János Bertók Head of Public Sector Integrity Division Organización para la cooperación.
Haga clic para modificar el estilo de título del patrón Mark Monday VP of Avaya's SME and collaboration platforms.
Sembrando confianza en el CLOUD Oscar López Área I+D+i XV Jornadas de Seguridad NEXTEL S.A. 27/06/2013.
Preparación/ Review Hoy es miércoles el 23 de septiembre de 2015 Today is day, September 23, 2015 ¿Te gusta o no te gusta? What do you like and what you.
Objective Students will learn to tell time and be able to use the numbers from last lesson as a review.
Para conectarse a Internet
First Grade Dual High Frequency Words
Page 1 CITS Active Directory Implementation UMass Dartmouth.
Introducción a las finanzas de los sistemas de agua potables
Recetas 3 Objetivo: Hacer preguntas Hablar sobre la comida
Directions (The directions are based on the fact that you would delete this slide before you save it to the student directory. Therefore slide 2 will become.
Development of the concert programme
Welcome to PowerPoint gdskcgdskfcbskjc. Designer helps you get your point across PowerPoint Designer suggests professional designs for your presentation,
Integrated Management System
Watch the video and work with a partner  Write down the 2 facts you considered the most interesting.  Share them with your partner. Were they the same?
Transcripción de la presentación:

Protegiendo el acceso y transacciones de su organización. Jorge Carbón

Quienes somos Líder mundial de la industria de E-security. Creador de los mejore y mas utilizados algoritmos de encriptación utilizada alrededor del mundo. SSL, WAP, Certificado Digital y etc... Mas de 1 billón de software distribuidos con tecnología RSA. Empresa americana publica y estable durante mas de 2 décadas. Mas de clientes alrededor del mundo. 87% de la lista das 100 empresas grandes del mundo. 88% de la lista dos 50 mayores bancos mundiales. Presencia en América del Sur desde hace más de 8 años. Mas de 1,200 clientes en América del Sur.

Dificultades de las organizaciones. Popularización de la Internet. Prevención de acceso remoto a usuarios, clientes, aliados. Facilidad de hackers obtener credenciales: - Phishing attack - Social Hackers. - Contraseñas estáticas. Dificultad de proveer y administrar una solución de identidad y controle de acceso ¿Quién está al otro lado de la línea?

What is Identity?

Need to access information Need to protect corporate resources The Business Problem

The Business Problem Passwords = poor security Difficult to remember Often shared and written down Easily cracked with freely available tools

Password Levels of Authentication Relative Strength Weaker Stronger No PolicyPolicy Maximize security & maintain cost flexibility by matching level of authentication to value of service

Levels of Authorization Less Granular More Granular Security Policy: Time of Day Security Domain Group / Role Authentication Strength System SAP Oracle Domino Applications Add Delete Modify Application Functions Network Fields Data Stores Risk mitigation with fine-grained protection of your existing web-based resources

Solución de identidad y control de acceso Autenticación de dos factores para el acceso a: PC, Web, VPNs, Firewall, Wireless land, Windows…. El autenticador más utilizado al mundial con mas de 72% del mercado mundial

Two-factor Authentication Something you have, e.g. token, combined with something you know, e.g., a PIN Simple for users Zero footprint Non-repudiation; auditing capability No need to remember multiple passwords

Time Synchronous Two-factor Authentication RSA ACE/Server RAS, VPN, SSL-VPN WLAN web, more… RSA ACE/Agent or embedded APIs SeedTime Same Seed Same Time Same Algorithm userid: asmith PIN: 98mypin Tokencode: userid: asmith PIN: 98mypin Tokencode: Algorithm

Enterprise Authentication: Make Life Secure and Simple Simple Same authentication whether inside or outside the perimeter … online or offline Secure Single auditable log for all authentication Strong authentication from anywhere to anything No complex, costly password change policies

RSA SecurID Environments VPNs Windows Wireless Web portal Applications Federated Identity Trusted Websites Enterprise SSO

RSA SecurID for Microsoft Windows Online and offline authentication to Microsoft Windows

SecurID para Windows Pin + Conectado o no a la red Log de acceso Pin +

How It Works User on-line (Network Connected) RSA ACE/Server 2. UserID, passcode sent to RSA ACE/Server 5. UserID, Windows password supplied to AD Domain Controller 6. Kerberos Ticket supplied to desktop 1. UserID and passcode 3. RSA ACE/Server verifies authentication and tells RSA ACE/Agent to grant or deny access 4. RSA ACE/Server decrypts Windows password and passes it into Windows logon process 7. RSA ACE/Server prepares end user laptop to be able to perform offline authentication. RSA ACE/Agent

RSA offline module How It Works User off-line (Network disconnected) RSA ACE/Server 2. UserID, passcode Microsofts cached credentials 3. Authentication successful Laptop 1. UserID and passcode 5. UserID, Windows password supplied to cached credentials 6. Offline Kerberos ticket supplied to desktop 4. RSA offline module decrypts Windows password and passes it into Windows logon process

Control de acceso en su red. Single Sign On en su red Centralizacion de autenticacion Cliente servidor Variedad de autenticadores ***** ®

Password Problem Exists and is Worsening Systems/Application Access is not secure, because there are too many applications, so users write down passwords ! Changing Passwords more frequently makes it worse ! Streamlining authenticators leverages investment and tightens security Source: IDC / Deutsche Bank Alex. Brown ~75% of all Enterprise applications are not yet Web-based!

RSA SecurID Passage 4.0 RSA SecurID Passage 4.next + PIN, or + BIO, or + PIN + BIO SSO Credentials SID SW Token Seed Smartchip PWDs Emergency Access Password Web User Authentication Windows PC & Nework Application or Platform Client/Server Citrix Mainframe VPN/Dial-up Desktop Windows Authentication Policy Applications Authentication Policy RSA SecurID for Windows + PIN RSA Authentication Client RSA Authentication Agent SSO Credentials RSA Passage Client Summary

Enhance Security Integrates with RSA Securitys strong two-factor authenticators Automates rigorous password policies transparently ***** ®

Enhance Security Innovative IntelliAccess technology Secure emergency access Self-service for forgotten passwords or lost authenticators Patent-pending security technology from RSA Labs Mothers birthdate (MM/DD/YY): Mothers Maiden Name: Fathers Middle Name:

Controle de acceso en su Web IntranetExtranet Password Identificación del perfil del usuario Autorización Single Sign On F.I.M

Problem How do you manage the identity of a growing number of users… Partners Customers Employees

Access Channels: Intranet, Extranet, Portal, Wireless Problem Silo Access Mgmt. Silo Access Mgmt. Silo Access Mgmt. Silo Access Mgmt. Silo Access Mgmt. EmployeesCustomersPartners HR, Financial Mgmt. e-CRM Supply Chain Mgmt. Industry Specific e-Commerce …and their secure access to enterprise Web resources in a scalable, cost-efficient manner ….

Problem …across a heterogeneous IT infrastructure? Databases Mainframe Security Systems Directories Other Systems (Legacy, etc.)

Enforcing Business Policy Web Access Management IntranetExtranet Data Stores Enterprise Apps. App. ServersWeb Servers

Access Channels: Intranet, Extranet, Portal, Wireless The Access Control Challenge Silo Access Mgmt. Silo Access Mgmt. Silo Access Mgmt. Silo Access Mgmt. Silo Access Mgmt. EmployeesCustomersPartners HR, Financial Mgmt. e-CRM Supply Chain Mgmt. Industry Specific e-Commerce

Access Channels: Intranet, Extranet, Portal, Wireless Web Single Sign-on Web Access Management Solution EmployeesCustomersPartners HR, Financial Mgmt. e-CRM Supply Chain Mgmt. Industry Specific e-Commerce SSO

Certificado digital User RSA Keon Certificate Authority RSA Keon Key Recovery Module Web Server RSA Keon Root Signing Service RSA Keon Web PassPort & Validation Clients RSA Validation Manager RSA Keon Web PassPort Server RSA Keon Registration Authority - Infraestructura de emisión, registro y revocación de certificados. - Certificados internos, publico o SSL. - Escalable.