Docstoc

Bionetrix - PowerPoint

Document Sample
Bionetrix - PowerPoint Powered By Docstoc
					         Unified Authentication Management
         For Enterprise and Internet Security




Aubrey Mansfield
amansfield@bionetrix.com
www.bionetrix.com
703-734-9200
            Company Profile

Authentication management software
product company
Award-winning technology
Named Computerworld’s “100 Emerging
Companies to Watch” in 2001
Product in Version 4.1
Founded 1997
55 employees
                   Vision


Strong Authentication will be
pervasive and BioNetrix will
provide the enabling technology
                               The Problem

Most current IT authentication efforts are:
–   Inconclusive
     •   Based on passwords
     •   Doesn’t authenticate end users
–   Cumbersome process
     •   Complex to deploy
     •   Difficult to manage
     •   Doesn’t scale
–   Costly
     •   High Administrative/Help Desk costs
     •   Reduced End-user productivity
     •   Losses due to fraud
           Authentication Today
                          Provides conclusive user
                          authentication:
                             Enables machine-machine
                               Secures a
                             trusted authorized access
                            Controls communication
                            to communication channel
                                applications after user
                             Validates the authenticity
                                   Before
                               Depends onproviding secured
                            authenticationpassword to
                             of the certificate not user
                                   communication
                               identifyDistributed channel (VPN,
                                        the Applications
                            Primarily Web user
                             Depends on password to
                                   Firewall)
                                       Legacy
                            Depends on password (and
                             identify the user
                                       Client-Server
                            PKI) for user authentication
                                         Before presenting a
                                       Web-based
          VPN                            digital certificate
       Firewalls
                                           Before providing
                                           granular authorized
         PKI                               access to critical
                                           applications
Authorization Solutions
                                                For legacy,
      (PMI/SSO)                                 client-server
                                                and web
                                                applications
 Applications & Data
                                    Problem: Trust at
                                    the Network’s
                                    Edge Relies on
                                    Passwords
Enterprise                    High Trust              Remote/
Users Rely on                                         Internet Users
Passwords                                             Rely on
                Firewalls   VPN   PKI   PMI     SSO   Passwords

                        Core Security Methods
                          Rely on Passwords
                       Authentication Today
                             - Strong Authentication


Advanced forms of strong authentication
–   Biometrics
–   Smart cards
–   Tokens

Extends security to the network’s edge
–   Supplements and strengthens
     •   PKI, SSO, VPM, PMI, etc.
                                 Why BioNetrix

Authentication Management Infrastructure
Context-based policy engine
–   “Sophisticated and flexible” (Gartner)

Wide support for devices (20+ and growing)
–   Device agnostic; Vendor independent deployments

Support for heterogeneous applications – web,
client server, legacy
Scalable architecture
Seamless integration with other security
infrastructures (VPN, PKI, PMI or EAM)
                                                              Authentication
                                                              Management
                                                              Infrastructure
                                  VPN




                                                  Authentication Suite

                                                                                         Network
                                                                                          Login
                 Passwords
                                                                                          E-Sign
                Smart Cards
                                                                                           PKI
                                          Dynamic Policy Engine                            PMI
                                                                           Unified         SSO
                  Tokens                                                   Application     VPN
                              Unified        Authentication                Interface
                              Device
                              Interface         Manager                                  APPLICATIONS
                Biometrics
Single Global
  Identifier                                       Events Logs & Reports




                 Designed to interoperate with Enterprise security solutions
                        Supports heterogeneous enterprise applications
                                     How it works
                             Web
                       Application
                         Adapter
 Web Client

                                             Policy
                                         Authenticated



Access Channels


                                         Authen. Server      Authen. Mgr


                                                   NT/2000

   Enterprise Client
   Enterprise Application
   Adapter
                                                BioNetrix
                                                Authentication Suite
                                                - Components

                                 ADMIN. MGR
AUTHENTICATION SERVER




                                              Enterprise
                                                client

                        INTRAnet




                                                                       Web
                                                                      client
                                                           INTERnet
                   Application
                    Adapters
                                            Privacy,Confidentiality
                                            and Security

                                         Web        Database Encryption
      Web Client                   Application
                   (Secure HTTP
                   128 bit SSL)
                                     Adapter
                                                    Encrypted Communications
                                                    Client Integrity Verification
                                                       (Blowfish & 3DES encryption)
                                                        (Client Component Integrity)




Access Channels




        Enterprise Client
        Enterprise Application                     Authen. Server                 Authen. Mgr
        Adapter

        ( Diffie-Hellman Key Exchange)
                                                              NT/2000
                                 Dynamic Policy
                                 Management
Dynamic
 Policy
 Engine


   Policy
  Assigned                                                           +
                               Standard Desktop Access
                Remote
  Application   Access                                   High Trust
      or                                                 Transaction
                                                         i.e. System Admin
 Environment



      Flexible dynamic policy engine (patented technology)
      Implement enterprise-wide policies
      Automatically enforce policies
                            Why BioNetrix

Security and Integrity of BAS
 –   Passed third party tests (Predictive Report)
Flexibility
 –   Evaluated and selected for geographically distributed
     enterprise-wide deployments
Scalability
 –   Largest biometric deployments in CONUS
Implementation
 –   Demonstrated rapid set-up and deployment
 –   Easy to learn, use and administer
                                                   Authentication
                                                   Deployment
                                                   Criteria...
Reduce costs and improve of
IT productivity through
centralized administration
Provide scalability, resiliency
and performance for
enterprise-wide deployment             Increase     Augment or mitigate
                                     Convenience    passwords with choice of
                                                    methods
               Reduce
                                                    Be Convenient to deploy and
                Costs
                                                    use
                                                    Implement and enforce
 Support heterogeneous                              flexible policies
 environments                     Increase          Protect confidentiality and
 Deter fraud with robust          Security          privacy
 auditing and reporting
Authentication Management

				
DOCUMENT INFO
Description: Bionetrix document sample