




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Identity, Credential, Access Management and Versatile Authentication Solutionsi-Sprint Product OverviewDESIGNED, ARCHITECTED AND BUILT BY GLOBAL BANKING PROFESSIONALSTrust without Boundariesi-Sprint introduction and technical overviewi-Sprint Products OverviewUser Administration and Provisioning(UIM
2、)Versatile Authentication System (UAS)Unified SSO Platform(USSO)Unified Access Control and Authorization(UAM)Password Management for Shared & Privileged Accounts(UCM)YESSafe SolutionsSummaryTopicsTechnology Overviewi-Sprint ProductsAccessMatrixYESsafeSummaryWe design and build niche enterprise class
3、 Credential Management & Versatile Authentication products to secure access to private and confidential informationAbout i-Sprinti-SprintInnovationsIAMSolutionsClients Technology OverviewWorld Class Identity and Security Management Solution ProviderMobile Authentication & AuthorizationData Protectio
4、nCloud ProtectionMobile ProtectionIdentity ProtectionOnly Asian ICAM Vendor featured in Gartner Reports 30 millionEnterprise UsersProtecting over US$10 Trillionof total asset valueProven Technology successful implementations in 150 customers including world leading financial institutions100% owned I
5、Pswith patented technologyComplete suite of ICAM/IDM on-premises & cloud offeringsTo prevent frauds in cloud, mobile &enterprise environment Enterprise Identity & Security Management Software & ServicesMobile Identity &Security SolutionsMobile IdentityCounterfeit DetectionWorld Class Identity and Se
6、curity Management Solution ProviderOur Security Technology Focus & FutureA-B-C-D-EAuthenticationTo positively verify users claimed identity BiometricsTo achieve higher identity assuranceCloud To enforce the same security standards to cloud as in the internal corporate environmentDevice for MobilityT
7、o provide the security for users to access the corporate information via their mobile devices convenientlyEnd to End Encryption End to End Encryption for credential and data protection to prevent internal frauds and data leakingTechnology DevelopmentMobileCustomersEmployeesPartnersVisitorsConsumersT
8、abletSOAPSAMLOAuthWebServices100% Standard BasedOpenIDConnectNext Generation Identity and Access Management InfrastructureUsing any Identity Authority and Authentication MethodsOn Any DeviceAccessing any Network, Apps or Physical ResourcesAccount AccessProvisioning for any userNext Generation Identi
9、ty & Access ManagementInfrastructureThe only truly integrated IAM solutions to save at least 50% of project implementation timeBuilt-in Fine Grain and Customizable Administration Delegation Model for large enterprises and organizations with complex administration structure, SaaS & Cloud services pro
10、vidersEmbed Best Security Practices to avoid the internal threats associated with the Super User and do away with the cumbersome compensating controlsOut-of-the-box Integration with FIPS certified Hardware Security Module (HSM) as standard product features to support secure key management and end to
11、 end confidentiality protectioni-Sprints Overall Differentiators (1/2)Bank Graded Security design with many successful deployments in over 50 reference-able world class ranking global and regional financial institutions including:3 out of the top 10 banks in the World3 out of the top 5 Chinese banks
12、Our own unique IP extensible and future proof Pluggable Authentication Module (PAM) to support all authentication methods in the marketProven Compliance track records with financial regulatory agencies in last 10 years with 100% success rate for all our clientsi-Sprints Overall Differentiators (2/2)
13、Flexible Administration ModelAdministrators and Security policy can be defined at any level of the hierarchy using inheritance. Benefits: Allows both centralized and decentralized control and allow changes of model easily.Segmented Hierarchy-based Policy-driven Model with Granular delegationPluggabl
14、e Authentication (PAM) & Authentication RealmAxMx Engine supports multiple directories, multiple factor and multiple steps authentication methodsActive DirectoryLDAPRADIUSKerberosNTLME2EEAWeb tokenPluggable Authentication ModuleOne TimePasswordIDPasswordPKIDigital CertOpenInterfaceKnowledgeBasedOut
15、of BandAuthentication Realm (Multi-Step Authentication Flow)Questions & AnswersPicturesMatrix CardEMV-CAPIntegrationAccess ManagerBiometricsProducts & Solutions OfferingsIdentity ProtectionData ProtectionCloud ProtectionMobile Protectioni-Sprint introduction and technical overviewi-Sprint Products O
16、verviewUser Administration and Provisioning(UIM)Versatile Authentication System (UAS)Unified SSO Platform(USSO)Unified Access Control and Authorization(UAM)Password Management for Shared & Privileged Accounts(UCM)YESSafe SolutionsSummaryTopicsAccessMatrix & YESsafe Product SuiteIdentity, Credential
17、Management and Versatile Authentication Solutions for End to End Protection of Identity and Critical DataEnterprise, Cloud and Mobile Applications Mobile Security Value PropositionsUser Administration and ProvisioningVersatile Authentication System Unified SSO PlatformUnified Access Control and Auth
18、orizationCommon Application Security PlatformCentralized IAM & IDM Platformi-Sprint introduction and technical overviewi-Sprint Products OverviewUser Administration and Provisioning(UIM)Versatile Authentication System (UAS)Unified SSO Platform(USSO)Unified Access Control and Authorization(UAM)Passwo
19、rd Management for Shared & Privileged Accounts(UCM)YESSafe SolutionsSummaryAccessMatrix Universal Identity Manager (AxMxUIM)Comprehensive enterprise identity management and access control administration system for various applications, operating systems, databases and security registries based on Ac
20、cessMatrix technology for both on-premises and cloud based environmentsUse a policy-driven approach to manage default access to various companies IT resources based on users organizational role as well as allow users to submit ad-hoc access requests subject to management approval.Offer self service,
21、 customizable workflow, automated user provisioning, automatic role management, automated access certification, and automated password reset tools mean dramatic reductions in IT operating cost and implementationUser Life Cycle ManagementUIM Logical ComponentsTarget SystemsOTB Connectors & Connector
22、FrameworkIDM ServicesAudit & ComplianceProvisioningReconciliationRole ManagementResourceManagementAdministrationDelegationSelf ServiceRequest ManagementUIM PlatformEntitlement Policy MgtSOD PolicyManagementWorkflowManagementBusiness role based policy management, simplifying the (complex) management
23、of access for personnel and system resource Expanding multi-dimension role modelling and enhancing business friendliness Comprehensive user lifecycle management , automated provisioning and access removal Auto detection and data-mining for ghost account thereby increasing compliance and lower risk o
24、f intrusion. Provide time-sliced multi-dimensional , real time auditing and compliance control with ability to do self rectification. Well designed self service and delegation function, lowering management cost.UIM Basic Operation ModelUserTarget Resource and accessBusiness RoleConcepts of UIMCore I
25、dentity Management ProcessesProvisioning ProcessRequest-basedRole-basedRequest Approval Workflow ProcessReconciliation ProcessAttestation/Recertification Process Provisioning ProcessRequest Approval ProcessReconciliation ProcessAttestation ProcessProvisioningTarget ResourceUIM Global UserERP SystemA
26、ccount + Role+ AccessEntitlement PolicyConditionList of resourcesDirectory SystemAccount + User groupTrusted SourceAutomatic Provisioning based on Entitlement PolicyAutomatic Provisioning When a global user account is being created or edited, according to the entitlement policy, an account and its a
27、ccess to the target resource will either be created or revised.Manual Provisioning System Admin can directly assign access right the target resource to the UIM user.Synchronization with on user, access right and other info in data warehouse of target resource, data mining for ghost account. Synchron
28、ization with trusted source, mainly used for automatic access to user date and changes in its identity lifecycle. Target ResourceTrusted SourceUIM Global UserReconciliationHR SystemFull Time Employee InformationERP SystemAccount + Role+ AccessPermissionResource 1Resource 2Directory SystemAccount + U
29、ser groupCRM SystemBusiness Partner User InformationScheduled TaskConnectorAttestationSystem AdminAuditorAudit PlanTarget ResourceScope of userReviewerExecution time and frequencyScheduleTaskCreateschedule taskor execute immediately GenerateAnd sendproof of execution to reviewerWorkflowDetail record
30、on access allocationReviewercheckdetailAutomated rectification or adjustment of business system accessGenerate compliance audit reportPass auditFail auditChina Centralization Authentication for VPNAccessMatrix Software has been deployed in China to provide user provisioning to AD system for 700,000
31、of their employees globallyCentralized User Provisioning and Administration SystemAccessMatrix UIM Software has been deployed in Bank of China Insurance to support their centralized user management activities for all applications in their organizationReference Casesi-Sprint introduction and technica
32、l overviewi-Sprint Products OverviewUser Administration and Provisioning(UIM)Versatile Authentication System (UAS)Unified SSO Platform(USSO)Unified Access Control and Authorization(UAM)Password Management for Shared & Privileged Accounts(UCM)YESSafe SolutionsSummaryTopicsAccessMatrix Universal Authe
33、ntication Server (AxMxUAS)A versatile authentication server enables organizations to unify multiple authentication mechanisms and simplify integration complexitiesUse a Pluggable Authentication Module (PAM) approach to support a wide range of authentication methods and new authentication methods can
34、 be easily added to cater for new authentication methods The out-of the-box end-to-end token life-cycle management module greatly streamlines the administration and management of token logistics UAS provides fine grained and configurable authentication policyLogin Policy, Password Expiry Policy and
35、Password Quality Policy Multi-tier Java based architecture to offer wide range of server platforms and scalability HSM Integration to provide strong key management and efficient encryption and decryption of user credentialsVersatile Authentication ServersA versatile authentication server (VAS) is a
36、single server (software, or a software or hardware appliance) that supports multiple open and proprietary authentication methods in multiplatform environments.Gartner sees more enterprises adopting multiple authentication methods that best suit multiple use cases. For such an enterprise, a VAS is th
37、e strategically important piece of an authentication solution. A VAS allows the enterprise to avoid having to implement and support multiple parallel infrastructures. Furthermore, a VAS gives an enterprise a simple means of migrating to new authentication methods as its needs change and new methods
38、emerge each needs only to be plugged in to the VAS, rather than stripping out the old authentication infrastructure and plumbing in the new. Although a VAS is most suited to an enterprise looking to adopt multiple authentication methods, any enterprise should, given a choice between two vendors with
39、 otherwise similar offerings, favor the authentication vendor offering a VAS. Looking to a third-party VAS vendor is also a viable option. Source Gartner: Dr. Ant AllanPluggable Authentication (PAM) & Authentication RealmAxMx Engine supports multiple directories, multiple factor and multiple steps a
40、uthentication methodsActive DirectoryLDAPRADIUSKerberosNTLME2EEAWeb tokenPluggable Authentication ModuleOne TimePasswordIDPasswordPKIDigital CertOpenInterfaceKnowledgeBasedOut of BandAuthentication Realm (Multi-Step Authentication Flow)Questions & AnswersPicturesMatrix CardEMV-CAPExternalAuthenticat
41、ionIntegrationAccess ManagerBiometricsAccessMatrix UAS Ready IntegrationEnterprise 2FA ModulesStrong Authentication & Token Management2FA forMicrosoftTerminal Server Microsoft OfficeSharePoint Server(MOSS2007)SharePoint ServerOutlook forWeb Access (OWA)2FA forUNIX OSLogin WebApplications2FA Desktop
42、Login (Credential Provider)RAS / VPN GatewayRadius enabled Devices/ApplsReadyIntegratedModulesRadiusReadyModulesAxMxUAS SDKfor ApplicationIntegrationVersatile authentication platform to incorporate the support for Biometric Authentication and Management featuresBiometrics Authentication and Authoriz
43、ationBank of China (HK): Internet BankingCentralized Authentication PlatformAccessMatrix UAS Software has been deployed in Bank of China (HK) to provide a Centralized 2FA Authentication Platform for their internet Banking ApplicationsCitic Bank International: Centralized Authentication PlatformAcces
44、sMatrix UAS Software has been deployed in Citic Bank International to provide a Centralized Authentication Platform for their internet Banking Applications to meet the 2FA and E2EEA requirements mandated by HKMA & MASReference CasesChina Centralization Authentication for VPNAccessMatrix UAS Software
45、 has been deployed in China to provide Centralized Authentication for Remote Access using OTP via SMS for more than 700,000 employees and partnersPSA Corporation Centralization Authentication for VPNAccessMatrix UAS Software has been deployed in PSA Corporation (the largest Port in the world) to pro
46、vide Centralized Authentication for Remote Access using OTP via SMS and RSA tokens for more than 20,000 employeesReference CasesCiti Private BankingClient Web SiteAccessMatrix UAS Software has been deployed in Citi Private Banking Global Client Website and iOS App to secure their clients login using
47、 E2E Encryption Authentication UBS Wealth Management Client PortalAccessMatrix UAS Software has been deployed in UBS Wealth Management Client Portal for their internet Banking Applications to meet the E2EEA requirements mandated by HKMA and MASReference Casesi-Sprint introduction and technical overv
48、iewi-Sprint Products OverviewUser Administration and Provisioning(UIM)Versatile Authentication System (UAS)Unified SSO Platform(USSO)Unified Access Control and Authorization(UAM)Password Management for Shared & Privileged Accounts(UCM)YESSafe SolutionsSummaryTopicsToo Many IDs / CredentialsCustomer
49、Pain PointsPassword Management ComplexitiesUsers are frustrated by the complex login and password policies. Poor password selection and management cause weakened security at the desktop. Loss of ProductivityEmployees get locked out, which interrupts work and revenue-producing activity.High Help Desk
50、 costs for password-related callsMounting Regulatory PressurePreventing public access to private data is a requirement (HIPAA, GLBA). Increasing in security standardsRequirements for strong authentication for critical applications.Integrating advanced authentication for applications is difficult.Ent
51、erprise SSO Non Intrusive SSOEnable SSO ConvergencewebSSO, ESSO, Cloud SSOThe Unified Single Sign-On Platform for Enterprise,Cloud and Mobile ApplicationsAccessMatrix Unified Single Sign-On (SSO) platform covers Enterprise Single Sign-On (ESSO), Federated Single Sign-On, Web Single Sign-On and Mobil
52、e Single Sign-On. It provides Identity Federation platform that supports popular identityprotocols e.g. SAML, and OAuth to provide the SSO capabilities for cloud and mobile applications.AccessMatrix The Unified Single Sign-On PlatformBusiness ChallengesLoss of ProductivityFrequent Interruptions in u
53、ser productivity and revenue generating activities due to employees locked out Integration of business entities through merger and acquisition eventsHigh help desk and user support cost due to password-related issuesSecurity ExposureWeakened security due to poor password selection and managementPass
54、word sharing among staff lead to potential fraudsDifficulty of integrating advanced authentication for applicationsMore Stringent Regulatory RequirementsEnsure only authorized users can access private data (HIPAA, GLBA) and track and report on all access (SOX)AccessMatrix Universal Sign-On (AxMxUSO)
55、Web Based eSSO solution to enable organizations to achieve secure single sign-on to both web and non-web applications without any source code changesNo manual software installation & Zero-Administration is required at the client workstationSelf-install, self-config, self-upgrade and self-serviceNo s
56、ingle point of failure design to ensure that the SSO feature is always available to minimize operation disruptionHSM Integration to provide strong key management and efficient encryption and decryption of user credentialsAccessMatrix USO (User Experience Simulation)myloginID*albertcLogin SuccessfulR
57、eference CasesBank of LanzhouESSO PlatformThe Bank has leveraged our AccessMatrix USO to provide a SSO platform for their internal applications and their users can enjoy the convenience of application access. Bank of China(BJ) ESSO PlatformThe Bank has leveraged our AccessMatrix USO to provide a SSO
58、 platform for their internal applications and their users can enjoy the convenience of application access.i-Sprint introduction and technical overviewi-Sprint Products OverviewUser Administration and Provisioning(UIM)Versatile Authentication System (UAS)Unified SSO Platform(USSO)Unified Access Contr
59、ol and Authorization(UAM)Password Management for Shared & Privileged Accounts(UCM)YESSafe SolutionsSummaryTopicsComprehensive enterprise access control system and single sign-on (SSO) platform based on AccessMatrix technologyProvide Web Access Control and Authorization FeaturesFine grain access cont
60、rol to manage users to access to confidential information and critical business transactionsAgent technology for protecting critical application resources Web Server Web Security Agent (WSA)Application Server Application Security APIs (ASA)Flexible APIs and agent technologies to provide easy and see
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- T/CIQA 89-2024農(nóng)村電商運(yùn)營(yíng)職業(yè)能力培養(yǎng)與評(píng)價(jià)規(guī)范
- T/CACE 0132-2024改性磷石膏混合料填筑應(yīng)用技術(shù)規(guī)程
- T/CI 465-2024質(zhì)量分級(jí)及“領(lǐng)跑者”評(píng)價(jià)要求多晶硅
- 商品砼運(yùn)輸承包合同10篇
- 幼兒園園長(zhǎng)授權(quán)責(zé)任協(xié)議書(shū)9篇
- 食堂規(guī)范化整治項(xiàng)目施工合同3篇
- 農(nóng)村轉(zhuǎn)讓土地的合同3篇
- 2025年溫州市商品銷(xiāo)售合同4篇
- 履約擔(dān)保委托保證合同律師擬定版本5篇
- 綠化運(yùn)營(yíng)維護(hù)合同5篇
- 心內(nèi)科工作流程
- 中考數(shù)學(xué)總復(fù)習(xí)第四章第20課時(shí)解直角三角形課件
- 低空經(jīng)濟(jì)產(chǎn)業(yè)園商業(yè)計(jì)劃書(shū)
- 2025中國(guó)鐵路濟(jì)南局集團(tuán)招聘生60人高頻重點(diǎn)提升(共500題)附帶答案詳解
- 2024-2030年中國(guó)內(nèi)河碼頭產(chǎn)業(yè)前景預(yù)測(cè)規(guī)劃研究報(bào)告
- 2025年上海市各區(qū)高三語(yǔ)文一模試題匯編之文言文二閱讀(含答案)
- 【讀后續(xù)寫(xiě)】高中英語(yǔ)讀后續(xù)寫(xiě)講評(píng):100 dollars 名師課件-周媚
- 《公共事業(yè)管理概論》課程教學(xué)大綱
- 2024版質(zhì)量管理培訓(xùn)
- GB/T 44569.1-2024土工合成材料內(nèi)部節(jié)點(diǎn)強(qiáng)度的測(cè)定第1部分:土工格室
- 2023-2024年福建省普通高中學(xué)生學(xué)業(yè)基礎(chǔ)會(huì)考化學(xué)試題匯編
評(píng)論
0/150
提交評(píng)論