Authshield- Intigration with mail-Microsoft Exchange
AuthShield for ActiveSync is a user friendly multi-factor authentication solution for mobile users. ActiveSync allows users to synchronize their inbox, subfolders, calendar, contacts etc. with their mobile device like smart phones and tablets.
Authshield- Intigration with mail-Microsoft Exchange
E N D
Presentation Transcript
AuthShield Security for Mails Private and Confidential
“If you were a hacker trying to hack into an organization – what will be your attack methodology? • Attack the perimeter (IP Range), scan it for vulnerabilities, try and find a way behind the firewall, IPS, IDS and then find a vulnerability in the router to sniff traffic. (P.S – CISCO spends up to $ 50 Mn every year to scan their routers for vulnerabilities). You will also have to hide your traces during this entire exercise to prevent from getting caught • Go on Social media. Identify employees working in the organization. Chat up with them, and carry out a phishing scam to get access to their credentials. Use the same credentials to log into the critical IT assets of the organization” Private and Confidential
Vulnerabilities in E-mails Private and Confidential
Most vulnerable Point of Attack Credential Access Granted Server Private and Confidential
Mails – Warehouse of Information on the Go! • E-mails are an integral part of our communication mechanisms • Can be accessed anywhere in the world on almost every device • Considered as written proof of communication in many countries • Can be used to steal information or to impersonate senior members of an organization As per Internet Crime Complaint Center (IC3) in the past fourteen months there have 1200 US and over 900 non US victims where business mails have been compromised Private and Confidential
Microsoft Exchange • Microsoft Exchange had an installed base of 470 million in 2014 • Microsoft Exchange uses a propriety RPC protocol, MAPI / RPC that was designed to be used by Microsoft Outlook • Emails hosted on exchange can also be accessed using SMTP, POP3 and IMAP4 protocols • Many Android, iOS and Windows Mobile phones now support Exchange ActiveSync Push Email Private and Confidential
Why AuthShield 2FA • Most Cyber attacks are Phishing related scams and effective in majority of cases • A non aware user is the weakest link in the Cyber Security Chain • Every organization needs to protect their mails as they are one of the most critical assets of an organization Private and Confidential
Only Protection against User Level Attacks • Identify the user based on – • Something he knows (User Name / Password) • Something in the user’s possession • Something the user is Tackling Identity Theft Private and Confidential
Username + Password Username, Password + Second Factor of Authentication ACCESS DENIED Access Granted Server Hacker may have access to the Password but he cannot have access to the “Second Factor of Authentication” Private and Confidential
How is AuthShield different?? AuthShield Patented Protocol Decoding Engine ensures that Authentication Security is implemented at a Protocol level rather than Application layer Authentication Security has been limited to applications which provide inherent support for 2FA Private and Confidential
Architecture Private and Confidential
Solution Components Private and Confidential
AuthShield Tokens for OWA Hard Token Android / iOS / Windows /BB Linux / Mac / Windows Private and Confidential
Hard Token • Security device (Hard Token) given to authorized users • The token generates a new password after every 90 seconds • Each token is unique to the user and synchronized with the server based on time • The password is based on a pre defined unbreakable randomized algorithm. Hard Token Private and Confidential
Mobile Token for Smart Phones • Application installed on smart Phones • User identity is mapped to his smartphone • User has to enter PIN to generate the One Time Password • Available for all smart phones Android / iOS / Windows /BB Private and Confidential
Soft Token for Desktops • Application installed on Desktop • User identity is mapped to his desktop • User has to enter PIN to generate the token • Available for all OS Linux / Mac / Windows Private and Confidential
AuthShield Tokens for OWA / ActiveSync / Outlook Anywhere One Touch Authentication for Windows / Linux / Mac Systems OS One Touch Authentication for Android / iOS / Windows Phones Private and Confidential
Mobile One Touch Authentication • Maps users identity to his registered mobile phones • Anytime a user wishes to login, a ‘PUSH’ notification is sent with details on – • IP • Location • TimeStamp • User has to ‘Approve’ the request to login Private and Confidential
System One Touch Authentication • Maps users identity to his registered Desktop / Laptop • Anytime a user wishes to login, a ‘PUSH’ notification is sent with details on – • IP • Location • TimeStamp • User has to ‘Approve’ the request to login Private and Confidential
AuthShield Integration with Microsoft Exchange • AuthShield Protocol Decoding Engine receives Authentication request from User • Server validates the User name and Password from AD / LDAP • Request is forwarded to the Authentication Server for the second factor authentication check Private and Confidential
Process Flow Private and Confidential
Process Flow Private and Confidential
About Us • About the Company • Research Oriented Information Security Organization • All technologies are indigenous - Evaluated and approved by multiple Government Agencies • Empanelled with DRDO • More than six years of experience in Cyber Security • Served key clients in Private and Public sector Private and Confidential
Contd. • Features • Patents on 2FA with Protocol level decoding • Direct integration of 2FA with – • SAP / ERP • Mail servers – Microsoft Exchange, OCMS, IBM Lotus Nodes, Zimbraetc • VPN • Database Queries • Web Applications etc • Customized products focused on technology immersion in clients Private and Confidential
Contd. Private and Confidential
In the Press “Rated 9/10 by PC Quest Magazine” “DRDO Implements AuthShield Authentication Security” “Mindteck has appointed AuthShield for MFA” “AuthShield launches Zero cost Biometrics” Private and Confidential
Our Success Stories!!! • Empanelled with DRDO for Multi-factor Authentication • Only Indian Company to have developed an indigenous Multi-factor Authentication at Protocol Level. • Only Indian Company to have developed and deployed an independent Internet Monitoring System across an entire region. • Multiple Patent Pending Technologies including Cyber Café Surveillance, Tactical Internet Monitoring System and Multifactor Authentication. Private and Confidential
AuthShield Integrations Private and Confidential
Support • 24 * 7 Support center • Dedicated Helpline and Ticketing portal with monthly reports (on support as well as application performance) submitted to client • SLA with inbuilt penalty clauses - Timeframes defined for critical, priority and non-critical support • Optional - Dedicated Team deployed for client (for Priority support) Private and Confidential
Some of our Government Clients Ministry of Home Affairs Indian Army JK Police Ministry of Defense Delhi Police Chandigarh Police UP Police National Technical Research Organization National Investigation Agency AP Police Private and Confidential
Some of our other clients Private and Confidential
Contact Us GET IN TOUCH WITH US. WE’D BE HAPPY TO HELP @ authshield2FA +91-11-47065866/ 45272272 info@innefu.com www.auth-shield.com / www.innefu.com 876, 8th Floor, Aggarwal Cyber Plaza II,Netaji Subhash Place, New Delhi, India Private and Confidential