SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Citrix ShareFile is a secure data sync and sharing service
that allows organizations to mobilize all enterprise data
and empower user productivity anywhere. ShareFile
enables mobile productivity with read-write access
to data and allows users to securely share files with
anyone and sync files across all of their devices. Citrix
ShareFile has a strong presence in security-conscious
verticals, including Finance, Accounting, Legal,
Insurance and Healthcare. It was important that they
provide these customers with strong access controls to
avoid a breach of their account.
Case Study
Citrix ShareFile Provides
Additional Security to
Global Users With TeleSign
Providing current and future ShareFile
customers with the capability to leverage multifactor
authentication to protect access to their sensitive data
is a best practice that is quickly becoming industry
standard and personally gives me peace of mind.
Manny Landron, CISSP, CISA, CISM, Citrix ShareFile
Industry
• Cloud Software
Profile
• Founded in 1989
• HQ Fort Lauderdale, FL
Challenge
• Adding an extra layer of
online security that didn’t
require customers to
remember additional
usernames and passwords
Benefits
• Protects user data
• Maintain brand reputation
and trust
• Prevents account compromise
• Better user experience
Product
• SMS  Voice Verification
Challenge
Citrix ShareFile was looking for a way to add an extra layer
of online security with a robust solution that wouldn’t
require customers to remember yet another series of
usernames and passwords. Looking for a globally reliable
authentication provider that not only emphasizes security
but also the nuances of an easy user experience can be
a difficult process. Citrix ShareFile needed a partner that
could work with their UI/UX team to provide best practice
recommendations and ensure that opting in and using two-
factor authentication (2FA) would be as simple as possible
while remaining extremely secure.
TeleSign checked all the necessary requirements, including
global coverage, convenient options like voice and SMS for
every type of user, experience with similar customers, as well
as an obsession with security and user experience.
After vetting providers, Citrix ShareFile realized that TeleSign
was unmatched in the industry and would be their partner
going forward.
Solution
Citrix ShareFile gave their users the option of activating
multi-factor authentication on their ShareFile account using
TeleSign’s SMS Verification. Once users choose this option,
they are required to enter a one-time PIN code, sent to their
phone number, already on record, whenever they log in
from a new device or unknown IP address. This represents
an extra layer of protection, beyond a username and
password, which effectively blocks fraudsters from gaining
access to an account, even if a fraudster has obtained the
login credentials. Once a fraudster attempts to log in, 2FA is
activated, preventing any possibility of account compromise.
Unlike standard authentication procedures, the codes that
SMS Verification uses for 2FA login are unique and generated
new every time. Were a breach to occur, and usernames
and passwords stolen, ShareFile customers could still be
certain their data was secure. Also, to allow for occasions
when a customer might not have access to their primary
phone number, Citrix ShareFile allows them to add a back-up
number. An effective fallback, because very few people, no
matter where they happen to be, will not have access to one
of their two numbers.
Using TeleSign, Citrix can provide phone-based 2FA in
more than 200 countries in 87 languages. Citrix ShareFile’s
business partners and users can be confident that SMS
Verification is fully effective everywhere they are.
In addition to SMS Verification, Citrix ShareFile also used
TeleSign’s Voice Verification for markets where SMS coverage
may be unreliable; where receiving an SMS incurs a costs for
the user, for users who cannot receive SMS (like a fixed line
phone), or for those who just preferred to be contacted by a
voice call.
Since offering ShareFile users the option of two-factor
authentication by SMS or voice call through TeleSign Verify,
Citrix enabled security conscious customers to avoid a
breach on their account with stronger access controls. Many
competitors in the file sharing market have experienced
security issues resulting in a negative image in the press. By
using TeleSign, not only has user data been protected, but
Citrix ShareFile’s brand reputation and the trust placed in it
by its customers has remained intact.
About Citrix ShareFile
Citrix is leading the transition to software-defining the
workplace, uniting virtualization, mobility management,
networking and SaaS solutions to enable new ways for
businesses and people to work better. Citrix solutions power
business mobility through secure, mobile workspaces that
provide people with instant access to apps, desktops, data
and communications on any device, over any network and
cloud. With annual revenue in 2014 of $3.14 billion, Citrix
solutions are in use at more than 330,000 organizations and
by over 100 million users globally.
TeleSign is the leader in Mobile Identity solutions, helping
customers secure more than 3.5 billion end user accounts
worldwide and prevent registration fraud, while improving
user experience and managing costs. TeleSign delivers account
security and fraud prevention with two-factor authentication
(2FA) based on each user’s Mobile Identity (phone number,
device and behavior) and driven by real-time, global
intelligence, including reputation scoring and device data.
For more information, please visit www.telesign.com | @TeleSign
© 2015 TeleSign. All rights reserved. TeleSign,
PhoneID, TeleBureau and others are trademarks
of TeleSign Corporation, Inc. The TeleSign logo and
other creative assets are owned and protected
under copyright and/or trademark law. CSCSF315

Mais conteúdo relacionado

Mais procurados

INFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - finalINFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - final
Gil Sasson
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 

Mais procurados (20)

A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
INFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - finalINFOBAY GENERAL BRSR NOV 2014 - final
INFOBAY GENERAL BRSR NOV 2014 - final
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
BlackBerry Connect
BlackBerry ConnectBlackBerry Connect
BlackBerry Connect
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
Finance
FinanceFinance
Finance
 
Ring central with okta
Ring central with oktaRing central with okta
Ring central with okta
 
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
 
E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce E commerce 2018 and history of E-commerce
E commerce 2018 and history of E-commerce
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
 

Semelhante a TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study

Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
Hai Nguyen
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_Online
Hamid Rashid
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
Hai Nguyen
 

Semelhante a TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study (20)

IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Citrix Strategy Brief
Citrix Strategy BriefCitrix Strategy Brief
Citrix Strategy Brief
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
U&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_OnlineU&ME_Plus_Corporate_Brochure_Online
U&ME_Plus_Corporate_Brochure_Online
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.pptPulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
Pulse Zero Trust Access simplifies management and mitigates cyber risks.ppt
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

TeleSign - Citrix ShareFile - Two-Factor Authentication Case Study

  • 1. Citrix ShareFile is a secure data sync and sharing service that allows organizations to mobilize all enterprise data and empower user productivity anywhere. ShareFile enables mobile productivity with read-write access to data and allows users to securely share files with anyone and sync files across all of their devices. Citrix ShareFile has a strong presence in security-conscious verticals, including Finance, Accounting, Legal, Insurance and Healthcare. It was important that they provide these customers with strong access controls to avoid a breach of their account. Case Study Citrix ShareFile Provides Additional Security to Global Users With TeleSign Providing current and future ShareFile customers with the capability to leverage multifactor authentication to protect access to their sensitive data is a best practice that is quickly becoming industry standard and personally gives me peace of mind. Manny Landron, CISSP, CISA, CISM, Citrix ShareFile Industry • Cloud Software Profile • Founded in 1989 • HQ Fort Lauderdale, FL Challenge • Adding an extra layer of online security that didn’t require customers to remember additional usernames and passwords Benefits • Protects user data • Maintain brand reputation and trust • Prevents account compromise • Better user experience Product • SMS Voice Verification
  • 2. Challenge Citrix ShareFile was looking for a way to add an extra layer of online security with a robust solution that wouldn’t require customers to remember yet another series of usernames and passwords. Looking for a globally reliable authentication provider that not only emphasizes security but also the nuances of an easy user experience can be a difficult process. Citrix ShareFile needed a partner that could work with their UI/UX team to provide best practice recommendations and ensure that opting in and using two- factor authentication (2FA) would be as simple as possible while remaining extremely secure. TeleSign checked all the necessary requirements, including global coverage, convenient options like voice and SMS for every type of user, experience with similar customers, as well as an obsession with security and user experience. After vetting providers, Citrix ShareFile realized that TeleSign was unmatched in the industry and would be their partner going forward. Solution Citrix ShareFile gave their users the option of activating multi-factor authentication on their ShareFile account using TeleSign’s SMS Verification. Once users choose this option, they are required to enter a one-time PIN code, sent to their phone number, already on record, whenever they log in from a new device or unknown IP address. This represents an extra layer of protection, beyond a username and password, which effectively blocks fraudsters from gaining access to an account, even if a fraudster has obtained the login credentials. Once a fraudster attempts to log in, 2FA is activated, preventing any possibility of account compromise. Unlike standard authentication procedures, the codes that SMS Verification uses for 2FA login are unique and generated new every time. Were a breach to occur, and usernames and passwords stolen, ShareFile customers could still be certain their data was secure. Also, to allow for occasions when a customer might not have access to their primary phone number, Citrix ShareFile allows them to add a back-up number. An effective fallback, because very few people, no matter where they happen to be, will not have access to one of their two numbers. Using TeleSign, Citrix can provide phone-based 2FA in more than 200 countries in 87 languages. Citrix ShareFile’s business partners and users can be confident that SMS Verification is fully effective everywhere they are. In addition to SMS Verification, Citrix ShareFile also used TeleSign’s Voice Verification for markets where SMS coverage may be unreliable; where receiving an SMS incurs a costs for the user, for users who cannot receive SMS (like a fixed line phone), or for those who just preferred to be contacted by a voice call. Since offering ShareFile users the option of two-factor authentication by SMS or voice call through TeleSign Verify, Citrix enabled security conscious customers to avoid a breach on their account with stronger access controls. Many competitors in the file sharing market have experienced security issues resulting in a negative image in the press. By using TeleSign, not only has user data been protected, but Citrix ShareFile’s brand reputation and the trust placed in it by its customers has remained intact. About Citrix ShareFile Citrix is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. TeleSign is the leader in Mobile Identity solutions, helping customers secure more than 3.5 billion end user accounts worldwide and prevent registration fraud, while improving user experience and managing costs. TeleSign delivers account security and fraud prevention with two-factor authentication (2FA) based on each user’s Mobile Identity (phone number, device and behavior) and driven by real-time, global intelligence, including reputation scoring and device data. For more information, please visit www.telesign.com | @TeleSign © 2015 TeleSign. All rights reserved. TeleSign, PhoneID, TeleBureau and others are trademarks of TeleSign Corporation, Inc. The TeleSign logo and other creative assets are owned and protected under copyright and/or trademark law. CSCSF315