SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
1 Hitachi ID Password Manager



                                                       Managing the User Lifecycle
                                                       Across On-Premises and
                                                       Cloud-Hosted Applications




Integrated credential management for users:
passwords, encryption keys, tokens, smart cards and more.




                                         © 2012 Hitachi ID Systems, Inc.. All rights reserved.   1
Slide Presentation




2 HiPM Animated Demonstration
The following animations illustrate core Hitachi ID Password Manager user interfaces and processes:



       • Security question enrollment:                   • SSPR with GINA Extension:
           – A user authenticates and                         – A locked out user resolves his own
             completes his personal profile of                   problem, from the login prompt,
             questions and answers.                             using a GINA extension.
       • Alias enrollment:                               • SSPR with Vista credential provider:

           – A user attaches non-standard login               – A locked out user resolves his own
             IDs to his profile.                                 problem, from the login prompt,
       • Password expiration:                                   using a Windows Vista credential
                                                                provider.
           – A user is invited, via e-mail, to           • Assisted password reset:
             change soon-to-expire passwords.
       • Self-service password reset (SSPR)                   – A help desk analyst signs in with an
         using Secure Kiosk Account:                            RSA SecurID token and resets a
                                                                caller’s password.
           – A locked out user resolves his own          • PIN Reset for an RSA SecurID token:
             problem, from the login prompt,
             without client software deployment.              – A user resets his RSA SecurID
                                                                token PIN with HiPM.




3 Locked out Windows 7 user resets own password


Animation: ../pics/camtasia/psynch-2/win7-credential-provider.cam




4 Locked out Windows XP user resets own password


Animation: ../pics/camtasia/psynch-2/5-password-reset-gina.cam




                                              © 2012 Hitachi ID Systems, Inc.. All rights reserved.       2
Slide Presentation




5 Locked out Windows user resets own password (no software foot-
  print)


Animation: ../pics/camtasia/psynch-2/4-password-reset-ska.cam4




6 Enrollment of security questions


Animation: ../pics/camtasia/psynch-2/1-qa-enrollment.cam




7 Enrollment of non-standard login IDs


Animation: ../pics/camtasia/psynch-2/2-alias-enrollment.cam




8 RSA SecurID Self Service Token Support


Animation: ../pics/camtasia/psynch-2/8-rsa-token-reset.cam




9 Reminder to change passwords


Animation: ../pics/camtasia/psynch-2/3-password-expired-email.cam




                                             © 2012 Hitachi ID Systems, Inc.. All rights reserved.       3
Slide Presentation




10 Assisted Password Reset


Animation: ../pics/camtasia/psynch-2/7-password-reset.cam




11 Unlocking Windows Users

  Approach                        Pros                                Cons
  Do nothing (call help desk).    Zero setup.                         Zero benefit.
  Domain secure kiosk account.    Easy setup. No client               Generic, no password domain
                                  software.                           account.
  Personalized SKA accounts.      No "guest" domain account.          Lots of specialized domain
                                                                      accounts.
  Local secure kiosk account.     No "guest" domain account.          Client software deployment.
  GINA wrapper DLL; Vista         More user friendly.                 Risk of workstation damage if
  Credential Provider                                                 improperly installed.
  Local software + dedicated      Enables password reset for          Client package, at least to
  VPN.                            mobile or at-home users who         mobile.
                                  are locked out.
  IVR access.                     Simple setup, no client             Cannot manage local
                                  software.                           passwords. Users don’t want
                                                                      to talk to a machine.




                                            © 2012 Hitachi ID Systems, Inc.. All rights reserved.       4
Slide Presentation




               12 HiPM Benefits
                    Cost Savings                                                  Improved Security


                       Synchronization:            Eliminates 60% to                 Policy:                     Enforce 50+
                                                   90% of password                                               password rules,
                                                   problems.                                                     globally.
                       Self service reset:         When adopted by                   Synchronization:            Fewer written
                                                   40% to 70% of                                                 passwords.
                                                   users, diverts                    Authentication:             Block social
                                                   problem resolution                                            engineering attacks
                                                   away from the help                                            on the help desk.
                                                   desk.                             Delegation:                 Eliminate admin
                       Assisted reset:             Shortens remaining                                            passwords at help
                                                   password reset HD                                             desk.
                                                   calls by 50% or                   Accountability:             Log all
                                                   more, to about 1                                              authentications,
                                                   minute/call.                                                  password changes.
                       PIN reset:                  Users can resolve                 Encryption:                 Protect sensitive
                                                   their own SecurID                                             data on disk and
                                                   problems.                                                     network.




               13 Summary
                 An integrated solution for managing credentials:
                      • Immediate security benefit: password policy, help desk caller authentication.
                      • Low deployment cost, minimal ongoing investment, significant IT support savings.
                      • Always accessible:

                           –   Web browser on PC, phone or tablet.
                           –   Windows login prompt.
                           –   Pre-boot encryption password prompt.
                           –   Phone call / IVR.
                           –   Available at work and while off-site.
                      • 110+ connectors included.



                 Learn more at Hitachi-ID.com/Password-Manager




500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com


                                                                                               File: PRCS:pres
www.Hitachi-ID.com                                                                             Date: March 1, 2012

Mais conteúdo relacionado

Mais procurados

Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Systems, Inc.
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Systems, Inc.
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Systems, Inc.
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 

Mais procurados (17)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentation
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX Compliance
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
test
testtest
test
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB Compliance
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 

Destaque

ekonomista 2.0 - N.º 4
ekonomista 2.0 - N.º 4ekonomista 2.0 - N.º 4
ekonomista 2.0 - N.º 4ekonomistak
 
Dossier juana geyser y la imaginaria banda musical
Dossier juana geyser y la imaginaria banda musicalDossier juana geyser y la imaginaria banda musical
Dossier juana geyser y la imaginaria banda musicalJuanaGeyser
 
Comparaciones | Sociedad y Tecnologia
Comparaciones | Sociedad y TecnologiaComparaciones | Sociedad y Tecnologia
Comparaciones | Sociedad y TecnologiaLucasM1996
 
Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients
 Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients
Marketing, imagen y comunicación en establecimientos hosteleros #LoveClientsErika Sofía Silva Aguilera
 
Arklay mountains masivo airsoft 2011 actualizado
Arklay mountains masivo airsoft 2011 actualizadoArklay mountains masivo airsoft 2011 actualizado
Arklay mountains masivo airsoft 2011 actualizadoJulio Carte
 
Analisis rating-river-en-la-b
Analisis rating-river-en-la-bAnalisis rating-river-en-la-b
Analisis rating-river-en-la-bOMD Argentina
 
La importancia del email marketing en los negocios por Internet
La importancia del email marketing en los negocios por InternetLa importancia del email marketing en los negocios por Internet
La importancia del email marketing en los negocios por InternetGustavo Boyne
 
Unidad 6 Diseño de Páginas Web
Unidad 6 Diseño de Páginas WebUnidad 6 Diseño de Páginas Web
Unidad 6 Diseño de Páginas WebNadia Gonzalez
 
Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...
Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...
Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...the Hartsook Letter
 
Psicología de la emergencia y autocontrol
Psicología de la emergencia y autocontrolPsicología de la emergencia y autocontrol
Psicología de la emergencia y autocontrolcorcioneandres
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Power System
Power SystemPower System
Power SystemAFATous
 
Präsentation Energiefachstelle Liechtenstein
Präsentation Energiefachstelle LiechtensteinPräsentation Energiefachstelle Liechtenstein
Präsentation Energiefachstelle LiechtensteinVorname Nachname
 

Destaque (16)

ekonomista 2.0 - N.º 4
ekonomista 2.0 - N.º 4ekonomista 2.0 - N.º 4
ekonomista 2.0 - N.º 4
 
Dossier juana geyser y la imaginaria banda musical
Dossier juana geyser y la imaginaria banda musicalDossier juana geyser y la imaginaria banda musical
Dossier juana geyser y la imaginaria banda musical
 
Comparaciones | Sociedad y Tecnologia
Comparaciones | Sociedad y TecnologiaComparaciones | Sociedad y Tecnologia
Comparaciones | Sociedad y Tecnologia
 
Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients
 Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients
Marketing, imagen y comunicación en establecimientos hosteleros #LoveClients
 
GPI PPT v3
GPI PPT v3GPI PPT v3
GPI PPT v3
 
Arklay mountains masivo airsoft 2011 actualizado
Arklay mountains masivo airsoft 2011 actualizadoArklay mountains masivo airsoft 2011 actualizado
Arklay mountains masivo airsoft 2011 actualizado
 
Guia # 7
Guia # 7Guia # 7
Guia # 7
 
Analisis rating-river-en-la-b
Analisis rating-river-en-la-bAnalisis rating-river-en-la-b
Analisis rating-river-en-la-b
 
La importancia del email marketing en los negocios por Internet
La importancia del email marketing en los negocios por InternetLa importancia del email marketing en los negocios por Internet
La importancia del email marketing en los negocios por Internet
 
Unidad 6 Diseño de Páginas Web
Unidad 6 Diseño de Páginas WebUnidad 6 Diseño de Páginas Web
Unidad 6 Diseño de Páginas Web
 
Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...
Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...
Wine Club Satisfaction and Segmentation Study - Presentation by Merrill Resea...
 
Ensayo sistema monetario europeo
Ensayo sistema monetario europeoEnsayo sistema monetario europeo
Ensayo sistema monetario europeo
 
Psicología de la emergencia y autocontrol
Psicología de la emergencia y autocontrolPsicología de la emergencia y autocontrol
Psicología de la emergencia y autocontrol
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Power System
Power SystemPower System
Power System
 
Präsentation Energiefachstelle Liechtenstein
Präsentation Energiefachstelle LiechtensteinPräsentation Energiefachstelle Liechtenstein
Präsentation Energiefachstelle Liechtenstein
 

Semelhante a Hitachi ID Password Manager: Enrollment, password reset and password synchronization

Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...
Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...
Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...Hitachi ID Systems, Inc.
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorunNimrod Levy
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copyNimrod Levy
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...NetwayClub
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windowsarpit06055
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceAmazon Web Services
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
 

Semelhante a Hitachi ID Password Manager: Enrollment, password reset and password synchronization (20)

Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...
Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...
Using Hitachi ID Password Manager to Reduce Password Reset Calls at an Intern...
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
BIOMETRYsso
BIOMETRYssoBIOMETRYsso
BIOMETRYsso
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Self-service Password Reset
Self-service Password ResetSelf-service Password Reset
Self-service Password Reset
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to Maintenance
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 

Mais de Hitachi ID Systems, Inc.

Mais de Hitachi ID Systems, Inc. (15)

Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Hitachi ID Password Manager: Enrollment, password reset and password synchronization

  • 1. 1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated credential management for users: passwords, encryption keys, tokens, smart cards and more. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 2. Slide Presentation 2 HiPM Animated Demonstration The following animations illustrate core Hitachi ID Password Manager user interfaces and processes: • Security question enrollment: • SSPR with GINA Extension: – A user authenticates and – A locked out user resolves his own completes his personal profile of problem, from the login prompt, questions and answers. using a GINA extension. • Alias enrollment: • SSPR with Vista credential provider: – A user attaches non-standard login – A locked out user resolves his own IDs to his profile. problem, from the login prompt, • Password expiration: using a Windows Vista credential provider. – A user is invited, via e-mail, to • Assisted password reset: change soon-to-expire passwords. • Self-service password reset (SSPR) – A help desk analyst signs in with an using Secure Kiosk Account: RSA SecurID token and resets a caller’s password. – A locked out user resolves his own • PIN Reset for an RSA SecurID token: problem, from the login prompt, without client software deployment. – A user resets his RSA SecurID token PIN with HiPM. 3 Locked out Windows 7 user resets own password Animation: ../pics/camtasia/psynch-2/win7-credential-provider.cam 4 Locked out Windows XP user resets own password Animation: ../pics/camtasia/psynch-2/5-password-reset-gina.cam © 2012 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 3. Slide Presentation 5 Locked out Windows user resets own password (no software foot- print) Animation: ../pics/camtasia/psynch-2/4-password-reset-ska.cam4 6 Enrollment of security questions Animation: ../pics/camtasia/psynch-2/1-qa-enrollment.cam 7 Enrollment of non-standard login IDs Animation: ../pics/camtasia/psynch-2/2-alias-enrollment.cam 8 RSA SecurID Self Service Token Support Animation: ../pics/camtasia/psynch-2/8-rsa-token-reset.cam 9 Reminder to change passwords Animation: ../pics/camtasia/psynch-2/3-password-expired-email.cam © 2012 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 4. Slide Presentation 10 Assisted Password Reset Animation: ../pics/camtasia/psynch-2/7-password-reset.cam 11 Unlocking Windows Users Approach Pros Cons Do nothing (call help desk). Zero setup. Zero benefit. Domain secure kiosk account. Easy setup. No client Generic, no password domain software. account. Personalized SKA accounts. No "guest" domain account. Lots of specialized domain accounts. Local secure kiosk account. No "guest" domain account. Client software deployment. GINA wrapper DLL; Vista More user friendly. Risk of workstation damage if Credential Provider improperly installed. Local software + dedicated Enables password reset for Client package, at least to VPN. mobile or at-home users who mobile. are locked out. IVR access. Simple setup, no client Cannot manage local software. passwords. Users don’t want to talk to a machine. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 5. Slide Presentation 12 HiPM Benefits Cost Savings Improved Security Synchronization: Eliminates 60% to Policy: Enforce 50+ 90% of password password rules, problems. globally. Self service reset: When adopted by Synchronization: Fewer written 40% to 70% of passwords. users, diverts Authentication: Block social problem resolution engineering attacks away from the help on the help desk. desk. Delegation: Eliminate admin Assisted reset: Shortens remaining passwords at help password reset HD desk. calls by 50% or Accountability: Log all more, to about 1 authentications, minute/call. password changes. PIN reset: Users can resolve Encryption: Protect sensitive their own SecurID data on disk and problems. network. 13 Summary An integrated solution for managing credentials: • Immediate security benefit: password policy, help desk caller authentication. • Low deployment cost, minimal ongoing investment, significant IT support savings. • Always accessible: – Web browser on PC, phone or tablet. – Windows login prompt. – Pre-boot encryption password prompt. – Phone call / IVR. – Available at work and while off-site. • 110+ connectors included. Learn more at Hitachi-ID.com/Password-Manager 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: PRCS:pres www.Hitachi-ID.com Date: March 1, 2012