Authshield
Uploaded by
33 SLIDES
364 VUES
330LIKES

Authshield- Intigration with mail-Microsoft Exchange

DESCRIPTION

AuthShield for ActiveSync is a user friendly multi-factor authentication solution for mobile users. ActiveSync allows users to synchronize their inbox, subfolders, calendar, contacts etc. with their mobile device like smart phones and tablets.

1 / 33

Télécharger la présentation

Authshield- Intigration with mail-Microsoft Exchange

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AuthShield Security for Mails Private and Confidential

  2. “If you were a hacker trying to hack into an organization – what will be your attack methodology? • Attack the perimeter (IP Range), scan it for vulnerabilities, try and find a way behind the firewall, IPS, IDS and then find a vulnerability in the router to sniff traffic. (P.S – CISCO spends up to $ 50 Mn every year to scan their routers for vulnerabilities). You will also have to hide your traces during this entire exercise to prevent from getting caught • Go on Social media. Identify employees working in the organization. Chat up with them, and carry out a phishing scam to get access to their credentials. Use the same credentials to log into the critical IT assets of the organization” Private and Confidential

  3. Vulnerabilities in E-mails Private and Confidential

  4. Most vulnerable Point of Attack Credential Access Granted Server Private and Confidential

  5. Mails – Warehouse of Information on the Go! • E-mails are an integral part of our communication mechanisms • Can be accessed anywhere in the world on almost every device • Considered as written proof of communication in many countries • Can be used to steal information or to impersonate senior members of an organization As per Internet Crime Complaint Center (IC3) in the past fourteen months there have 1200 US and over 900 non US victims where business mails have been compromised Private and Confidential

  6. Microsoft Exchange • Microsoft Exchange had an installed base of 470 million in 2014 • Microsoft Exchange uses a propriety RPC protocol, MAPI / RPC that was designed to be used by Microsoft Outlook • Emails hosted on exchange can also be accessed using SMTP, POP3 and IMAP4 protocols • Many Android, iOS and Windows Mobile phones now support Exchange ActiveSync Push Email Private and Confidential

  7. Why AuthShield 2FA • Most Cyber attacks are Phishing related scams and effective in majority of cases • A non aware user is the weakest link in the Cyber Security Chain • Every organization needs to protect their mails as they are one of the most critical assets of an organization Private and Confidential

  8. Only Protection against User Level Attacks • Identify the user based on – • Something he knows (User Name / Password) • Something in the user’s possession • Something the user is Tackling Identity Theft Private and Confidential

  9. Username + Password Username, Password + Second Factor of Authentication ACCESS DENIED Access Granted Server Hacker may have access to the Password but he cannot have access to the “Second Factor of Authentication” Private and Confidential

  10. How is AuthShield different?? AuthShield Patented Protocol Decoding Engine ensures that Authentication Security is implemented at a Protocol level rather than Application layer Authentication Security has been limited to applications which provide inherent support for 2FA Private and Confidential

  11. Architecture Private and Confidential

  12. Solution Components Private and Confidential

  13. AuthShield Tokens for OWA Hard Token Android / iOS / Windows /BB Linux / Mac / Windows Private and Confidential

  14. Hard Token • Security device (Hard Token) given to authorized users • The token generates a new password after every 90 seconds • Each token is unique to the user and synchronized with the server based on time • The password is based on a pre defined unbreakable randomized algorithm. Hard Token Private and Confidential

  15. Mobile Token for Smart Phones • Application installed on smart Phones • User identity is mapped to his smartphone • User has to enter PIN to generate the One Time Password • Available for all smart phones Android / iOS / Windows /BB Private and Confidential

  16. Soft Token for Desktops • Application installed on Desktop • User identity is mapped to his desktop • User has to enter PIN to generate the token • Available for all OS Linux / Mac / Windows Private and Confidential

  17. AuthShield Tokens for OWA / ActiveSync / Outlook Anywhere One Touch Authentication for Windows / Linux / Mac Systems OS One Touch Authentication for Android / iOS / Windows Phones Private and Confidential

  18. Mobile One Touch Authentication • Maps users identity to his registered mobile phones • Anytime a user wishes to login, a ‘PUSH’ notification is sent with details on – • IP • Location • TimeStamp • User has to ‘Approve’ the request to login Private and Confidential

  19. System One Touch Authentication • Maps users identity to his registered Desktop / Laptop • Anytime a user wishes to login, a ‘PUSH’ notification is sent with details on – • IP • Location • TimeStamp • User has to ‘Approve’ the request to login Private and Confidential

  20. AuthShield Integration with Microsoft Exchange • AuthShield Protocol Decoding Engine receives Authentication request from User • Server validates the User name and Password from AD / LDAP • Request is forwarded to the Authentication Server for the second factor authentication check Private and Confidential

  21. Private and Confidential

  22. Process Flow Private and Confidential

  23. Process Flow Private and Confidential

  24. About Us • About the Company • Research Oriented Information Security Organization • All technologies are indigenous - Evaluated and approved by multiple Government Agencies • Empanelled with DRDO • More than six years of experience in Cyber Security • Served key clients in Private and Public sector Private and Confidential

  25. Contd. • Features • Patents on 2FA with Protocol level decoding • Direct integration of 2FA with – • SAP / ERP • Mail servers – Microsoft Exchange, OCMS, IBM Lotus Nodes, Zimbraetc • VPN • Database Queries • Web Applications etc • Customized products focused on technology immersion in clients Private and Confidential

  26. Contd. Private and Confidential

  27. In the Press “Rated 9/10 by PC Quest Magazine” “DRDO Implements AuthShield Authentication Security” “Mindteck has appointed AuthShield for MFA” “AuthShield launches Zero cost Biometrics” Private and Confidential

  28. Our Success Stories!!! • Empanelled with DRDO for Multi-factor Authentication • Only Indian Company to have developed an indigenous Multi-factor Authentication at Protocol Level. • Only Indian Company to have developed and deployed an independent Internet Monitoring System across an entire region. • Multiple Patent Pending Technologies including Cyber Café Surveillance, Tactical Internet Monitoring System and Multifactor Authentication. Private and Confidential

  29. AuthShield Integrations Private and Confidential

  30. Support • 24 * 7 Support center • Dedicated Helpline and Ticketing portal with monthly reports (on support as well as application performance) submitted to client • SLA with inbuilt penalty clauses - Timeframes defined for critical, priority and non-critical support • Optional - Dedicated Team deployed for client (for Priority support) Private and Confidential

  31. Some of our Government Clients Ministry of Home Affairs Indian Army JK Police Ministry of Defense Delhi Police Chandigarh Police UP Police National Technical Research Organization National Investigation Agency AP Police Private and Confidential

  32. Some of our other clients Private and Confidential

  33. Contact Us GET IN TOUCH WITH US. WE’D BE HAPPY TO HELP @ authshield2FA +91-11-47065866/ 45272272 info@innefu.com www.auth-shield.com / www.innefu.com 876, 8th Floor, Aggarwal Cyber Plaza II,Netaji Subhash Place, New Delhi, India Private and Confidential

More Related