SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Protects Your Perimeter with Two-factor Authentication
Today, compliance and security demands are moving organizations to levels of security
beyond the traditional username and password. Two-factor authentication — combining
“something you have”, for example a token, with the “something you know”of usernames
and passwords — has quickly moved to the forefront of most organizations’security
and compliance initiatives.
Traditionally two-factor authentication solutions have been costly to deploy and based on
proprietary interfaces and directories. However, Quest Defender is entirely standards-based
(OATH, RADIUS, LDAP, PAM, etc.), and utilizes the security and scalability of Active Directory
for administration and identity management. This also enables customers to utilize existing
personnel and skill sets to manage Defender.
In addition, Defender enables users to easily request and self-register hardware and software
tokens, reducing the costs and time involved in rolling out two-factor authentication. Defender
supports any OATH-compliant hardware token and offers numerous software and Web-based
tokens as well. By using organizations' existing infrastructure investments, providing user
self-registration and supporting multiple token types, Defender enables organizations to
increase security and compliance measures in a flexible, cost-effective manner.
Features
Active Directory-centric – Use the scalability, security and compliance of Active Directory to
provide a two-factor authentication to any system, application or resource taking advantage of
the corporate directory already in place, instead of creating an additional proprietary one. User
token assignment is simply an additional attribute to a user’s properties within Active Directory.
Web-based Administration – Provide Defender administrators, help desk administrators and
end users options for token management, token deployment, real-time log viewing, help desk
troubleshooting and access to reports using the Web-based Defender Management Portal.
Token Self-Registration – Enable users to request and/or receive a hard or soft token based
upon pre-defined administrator policy. Then quickly and easily assign that token to their account
through a unique, secure mechanism. The Token Deployment System removes the entire
administrative burden and associated costs of conventional manual token assignment.
•	Heightens security through strong
authentication for virtually any access
need on any system or application
•	Provides convenient administrator and
end user access to token management,
logs and reports via Web-based portal
•	Enables rapid help desk response to
diagnose and resolve user authentication
issues from any Web browser
•	Scales to fit your business needs
•	Delivers the highest levels of
performance and availability
•	Positions your company in a forensics-
ready stance by maintaining logs of all
authentication activity and providing a
comprehensive audit trail
•	Provides authentication where it’s
required — whether local, remote or
mobile
•	Enables you to“prove”compliance for
access control and strong authentication
while providing required data to auditors
•	Removes the administrative burden of
and associated costs of conventional
token assignment through user token
self-registration
BENEFITS
Apps
User enters one-time password (OTP)
(PIN/AD Password + token code)
****330265 ****330265
Defender
validates the OTP
User authenticated
& gains access to
protected resources
DATASHEET
“BAA will save money because Defender tokens last
at least 67 percent longer than our previous solution,
and last for the life of the battery rather than having
a vendor defined lifespan of three years. We can renew
users’ tokens when they expire, as a help desk business-
as-usual process, instead of issuing 7,500 tokens in one
go and incurring the costs associated with running
such a project.”
—	 Fiona Hayward
	 IT Programme Manager
	BAA
Help Desk Troubleshooter – Enable Defender and help desk administrators to troubleshoot,
diagnose and resolve user-authentication-related problems with just a couple of mouse clicks
from any Web browser. View a current list of authentication attempts and routes, with associated
results, possible reasons for failures and one-click resolution steps. In addition, user account
details and assigned tokens are also displayed with the ability to quickly test, reset the pin or
provide a temporary token response, as well as reset or unlock the account.
Token Flexibility – Take the simple path to two-factor authentication regardless of the
preferred token vendor or mobile device. Defender supports any OATH-compliant hardware
token and has relationships with several major token vendors, enabling you to choose the best
token for your organization. Defender also offers a wide range of software tokens for the most
popular and widely deployed mobile platforms. And by offering a universal software token
license, the administrator can easily reissue the appropriate device license when a user decides
to switch mobile platforms.
Secure Webmail Access – Enable secure Web-based access to your corporate email system
from any Web browser, anytime, anywhere with Quest Webthority, a reverse proxy solution
included with Defender. In addition you can require Defender token use for access to ensure
appropriate authentication regardless of access point.
ZeroIMPACT Migration – Undertake a gradual migration to Defender from an incumbent
legacy authentication solution with ZeroIMPACT. With Defender and the legacy system
running side-by-side, all user authentication requests are directed to Defender. If the user is
not yet defined within Defender the authentication request is transparently passed, via the
proxy feature, to the incumbent authentication solution. This allows administrators to migrate
users to Defender as and when their legacy tokens expire with virtually no overhead from an
administrator or end-user perspective.
Centralized Administration – Integrate Defender with Active Directory and fully utilize all
the advantages of the centralized management of directory information, through a common,
familiar user interface. User token assignment is simply an additional attribute to a user’s
properties within the directory, which makes the security administration more efficient.
Encryption – Secure communications by associating a Management DES (Data Encryption
Standard) with Defender Security Server. Defender supports AES, DES or Triple DES encryption.
Pluggable Authentication Module (PAM) – Specify that services and users defined on your
Unix/Linux systems will be authenticated by Defender with Quest’s Defender module for PAM.
About Quest Software, Inc.
Established in 1987, Quest Software (Nasdaq: QSFT) provides simple and innovative IT
management solutions that enable more than 100,000 global customers to save time and
money across physical and virtual environments. Quest products solve complex IT challenges
ranging from database management, data protection, identity and access management,
monitoring, and user workspace management to Windows management. For more information,
visit www.quest.com.
DATASHEET
5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | EMAIL sales@quest.com
If you are located outside North America, you can find local office information on our Web site.
© 2012 Quest Software, Inc.
ALL RIGHTS RESERVED.
Quest, Quest Software, the Quest Software logo and QuestDefender are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of
their respective owners. DSW-QuestDefender-US-SW-04242011
Defender Hardware Tokens
Defender supports any OATH-compliant
token and distributes the following token
types:
•	Vasco DIGIPASS GO 6
•	Vasco DIGIPASS GO 7
•	Yubico YubiKey
•	SurePass Display Card
Defender Software Tokens
•	Defender Soft Token for BlackBerry
•	Defender Soft Token for iPhone
•	Defender Soft Token for Android
•	Defender Soft Token for Windows Mobile
•	Defender Soft Token for Java
•	Defender Soft Token for SMS
•	Defender Soft Token for Email
•	Defender Soft Token for Windows Desktop
•	Defender GrIDsure Web-based token
•	Defender Soft Token for Palm

Mais conteúdo relacionado

Mais de Hai Nguyen

Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013Hai Nguyen
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808Hai Nguyen
 
2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authentication2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authenticationHai Nguyen
 

Mais de Hai Nguyen (20)

Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
 
2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authentication2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authentication
 

Questdefenderdatasheetfinal 1

  • 1. Protects Your Perimeter with Two-factor Authentication Today, compliance and security demands are moving organizations to levels of security beyond the traditional username and password. Two-factor authentication — combining “something you have”, for example a token, with the “something you know”of usernames and passwords — has quickly moved to the forefront of most organizations’security and compliance initiatives. Traditionally two-factor authentication solutions have been costly to deploy and based on proprietary interfaces and directories. However, Quest Defender is entirely standards-based (OATH, RADIUS, LDAP, PAM, etc.), and utilizes the security and scalability of Active Directory for administration and identity management. This also enables customers to utilize existing personnel and skill sets to manage Defender. In addition, Defender enables users to easily request and self-register hardware and software tokens, reducing the costs and time involved in rolling out two-factor authentication. Defender supports any OATH-compliant hardware token and offers numerous software and Web-based tokens as well. By using organizations' existing infrastructure investments, providing user self-registration and supporting multiple token types, Defender enables organizations to increase security and compliance measures in a flexible, cost-effective manner. Features Active Directory-centric – Use the scalability, security and compliance of Active Directory to provide a two-factor authentication to any system, application or resource taking advantage of the corporate directory already in place, instead of creating an additional proprietary one. User token assignment is simply an additional attribute to a user’s properties within Active Directory. Web-based Administration – Provide Defender administrators, help desk administrators and end users options for token management, token deployment, real-time log viewing, help desk troubleshooting and access to reports using the Web-based Defender Management Portal. Token Self-Registration – Enable users to request and/or receive a hard or soft token based upon pre-defined administrator policy. Then quickly and easily assign that token to their account through a unique, secure mechanism. The Token Deployment System removes the entire administrative burden and associated costs of conventional manual token assignment. • Heightens security through strong authentication for virtually any access need on any system or application • Provides convenient administrator and end user access to token management, logs and reports via Web-based portal • Enables rapid help desk response to diagnose and resolve user authentication issues from any Web browser • Scales to fit your business needs • Delivers the highest levels of performance and availability • Positions your company in a forensics- ready stance by maintaining logs of all authentication activity and providing a comprehensive audit trail • Provides authentication where it’s required — whether local, remote or mobile • Enables you to“prove”compliance for access control and strong authentication while providing required data to auditors • Removes the administrative burden of and associated costs of conventional token assignment through user token self-registration BENEFITS Apps User enters one-time password (OTP) (PIN/AD Password + token code) ****330265 ****330265 Defender validates the OTP User authenticated & gains access to protected resources DATASHEET “BAA will save money because Defender tokens last at least 67 percent longer than our previous solution, and last for the life of the battery rather than having a vendor defined lifespan of three years. We can renew users’ tokens when they expire, as a help desk business- as-usual process, instead of issuing 7,500 tokens in one go and incurring the costs associated with running such a project.” — Fiona Hayward IT Programme Manager BAA
  • 2. Help Desk Troubleshooter – Enable Defender and help desk administrators to troubleshoot, diagnose and resolve user-authentication-related problems with just a couple of mouse clicks from any Web browser. View a current list of authentication attempts and routes, with associated results, possible reasons for failures and one-click resolution steps. In addition, user account details and assigned tokens are also displayed with the ability to quickly test, reset the pin or provide a temporary token response, as well as reset or unlock the account. Token Flexibility – Take the simple path to two-factor authentication regardless of the preferred token vendor or mobile device. Defender supports any OATH-compliant hardware token and has relationships with several major token vendors, enabling you to choose the best token for your organization. Defender also offers a wide range of software tokens for the most popular and widely deployed mobile platforms. And by offering a universal software token license, the administrator can easily reissue the appropriate device license when a user decides to switch mobile platforms. Secure Webmail Access – Enable secure Web-based access to your corporate email system from any Web browser, anytime, anywhere with Quest Webthority, a reverse proxy solution included with Defender. In addition you can require Defender token use for access to ensure appropriate authentication regardless of access point. ZeroIMPACT Migration – Undertake a gradual migration to Defender from an incumbent legacy authentication solution with ZeroIMPACT. With Defender and the legacy system running side-by-side, all user authentication requests are directed to Defender. If the user is not yet defined within Defender the authentication request is transparently passed, via the proxy feature, to the incumbent authentication solution. This allows administrators to migrate users to Defender as and when their legacy tokens expire with virtually no overhead from an administrator or end-user perspective. Centralized Administration – Integrate Defender with Active Directory and fully utilize all the advantages of the centralized management of directory information, through a common, familiar user interface. User token assignment is simply an additional attribute to a user’s properties within the directory, which makes the security administration more efficient. Encryption – Secure communications by associating a Management DES (Data Encryption Standard) with Defender Security Server. Defender supports AES, DES or Triple DES encryption. Pluggable Authentication Module (PAM) – Specify that services and users defined on your Unix/Linux systems will be authenticated by Defender with Quest’s Defender module for PAM. About Quest Software, Inc. Established in 1987, Quest Software (Nasdaq: QSFT) provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, and user workspace management to Windows management. For more information, visit www.quest.com. DATASHEET 5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | EMAIL sales@quest.com If you are located outside North America, you can find local office information on our Web site. © 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo and QuestDefender are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. DSW-QuestDefender-US-SW-04242011 Defender Hardware Tokens Defender supports any OATH-compliant token and distributes the following token types: • Vasco DIGIPASS GO 6 • Vasco DIGIPASS GO 7 • Yubico YubiKey • SurePass Display Card Defender Software Tokens • Defender Soft Token for BlackBerry • Defender Soft Token for iPhone • Defender Soft Token for Android • Defender Soft Token for Windows Mobile • Defender Soft Token for Java • Defender Soft Token for SMS • Defender Soft Token for Email • Defender Soft Token for Windows Desktop • Defender GrIDsure Web-based token • Defender Soft Token for Palm