SSO + MFA + Access Management
Multi-Factor Authentication serves a vital function within any organisation – securing access to corporate networks, protecting the identities of users and ensuring that a user is who he claims to be.
Evolving business needs around cloud applications and mobile devices, combined with rising threats and the need to reduce costs, require entirely new considerations for access control.
Authentication is one piece of the Access Management pie. Identity and Access Management solutions provide a framework for granting and requesting access to applications, enforcing access controls and ensuring visibility into access events. That’s where SafeNet Trusted Access comes in.
SafeNet Trusted Access is an access management service that combines the convenience of single sign-on with granular access security. By validating identities, enforcing access policies and applying smart single sign-on, organisations can ensure secure, convenient access to numerous cloud and web-based applications from one easy-to-navigate console.
New threats, risks and vulnerabilities as well as evolving business requirements underscore to the need for a strong authentication approach based on simple service delivery, choice and future-forward scalability.
Today, organisations are asking:
More than ever, customers are looking for Identity and Access Management solutions that deliver simplicity, automation, reduced TCO and choice.
Multi-Factor Authentication ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity.
MFA can be achieved using a combination of the following factors:
Because Multi-Factor Authentication security requires multiple means of identification at login, it is widely recognised as the most secure method for authenticating access to data and applications.
Thales's Multi-Factor Authentication software delivers the protection you expect, while enabling customers with broader choice, improved visibility and the ability to expand into the future. As a result, organisations using our MFA software have:
Better self-control of data – Thales enables customers with the option to create and control their own token data, so there is no reliance on a third-party vendor
Improved management and visibility – Thales' solutions deliver single-server management, providing full control, simple administration and reduced cost and staff burden
Expanded options – Thales delivers the broadest choice when it comes to access security methods – so you can meet the needs of any user and any risk level (hardware or software, certificate-based authentication or traditional one-time-password, on-premises or into the cloud)
Future-ready solutions – Thales provides new solutions that deliver MFA and single sign-on (SSO) for cloud applications as well as credentialing for mobile device management
Painless migrations - Thales offers seamless migration to cloud-based authentication, which maintain your existing investments and cause no disruption to end users
With the plethora of access control offerings available today, it is important for organisations to carefully evaluate the available solutions before making a decision on which solution to implement. When choosing a solution, organisations should take a number of factors into account. The following are some questions to consider:
Do I want to protect my internal network from unauthorised access?
If so, consider two-factor authentication (2FA) solutions that enable flexible and comprehensive secure network access, both in the office and remotely if needed.
Do my users need to connect from remote locations?
If so, consider portable solutions that enable secure VPN and web access for remote users, that enable employees to secure their laptops and data while on the road.
Do my users need to access many password-protected applications?
If so, consider solutions that provide single sign-on functionality, either by storing user credentials on the token or by integrating with external single sign-on systems.
Do I want my users to digitally sign and encrypt sensitive data or transactions?
If so, consider smart card-based solutions that provide secure onboard PKI key generation and cryptographic operations, as well as mobility for users.
How sensitive is my business data?
The more sensitive the data, the higher the priority on the robustness and security of the solution.
Do I want to firmly protect data that sits on my users’ PCs and laptops?
If so, consider token solutions that integrate with PC security products such as boot protection and disk encryption applications that require the use of a token to boot a computer or decrypt protected data.
Have I or do I want to implement a secure physical access solution?
If so, consider token solutions that enable integration with physical access systems.
Thales allows organisations to meet the IT challenges of cloud, mobility and escalating threats with authentication management platforms that offer flexible and simplified service delivery, which address numerous use cases with the broadest range of authentication methods and tokens.
More and more businesses embrace the benefits that derive from managing their data and applications in the cloud. As users access sensitive assets from a greater variety of devices and locations, organisations become vulnerable to new threats. AaaS enables organisations to easily apply strong authentication onto multiple access points.
Thales AaaS products:
SafeNet Trusted Access: Delivers AaaS with flexible token options, enabling a quick cloud migration and protecting data from any source – from cloud-based and on-premise applications to networks, users and devices.
Thales offers the most comprehensive identity access and management systems to administer, monitor and manage strong authentication deployments across the organisation.
Thales Management Platform:
vSEC: A flexible smart card management system for enterprise deployments requiring on-premises card printing for PKI-based authentication and physical access.
Offering the broadest range of methods and form factors, Thales allows customers to address numerous use cases, assurance levels and threat vectors with unified, centrally managed policies – managed from one authentication back end delivered in the cloud or on-premises.
Certificate-Based USB Tokens: Provide secure remote access as well as other advanced applications, including digital signing, password management, network logon and combined physical/logical access.
Context-Based & Step-Up Authentication: Context-based authentication, when combined with step-up authentication, optimises a layered approach to access security by assessing user login attributes and matching them against pre-defined security policies.
Certificate-Based Smart Cards: Strong multi-factor authentication in traditional credit card form factors that enable organisations to address their PKI security and access control needs.
Hybrid Tokens: Authenticators that combine one-time password, encrypted flash memory or certificate-based technology on the same strong authentication device.
Mobile Phone and Software-Based Authentication: Save on hardware and deployment costs, while users benefit by not having to carry an additional hardware token around with them.
Pattern-Based Authentication: Also called Grid Authentication, presents the end-user with a matrix of cells which contain random characters, from which they select a 'personal identification pattern' (PIP).
Out-of-Band Authentication: (OOB) authentication is a form of strong authentication that utilises a communication channel other than the channel being accessed to provide a ‘something you have,’ second authentication factor.
OTP Authenticators: Generate dynamic one-time passwords (OTPs) for properly authenticating users to critical applications and data, whether on a token, mobile device or grid-based authentication.
Thales's security applications consist of middleware and password management software that enable users to securely store and manage user credentials.
Thales Security Applications Products:
SafeNet Authentication Client: A middleware client that manages Thales's extensive portfolio of certificate-based smart cards, USB tokens and software-based devices.
Organisations are facing new access control challenges as mobile devices become the computing platform of choice, as organisations rapidly adopt Software-as-a-Service (SaaS) and cloud-based applications and as threat vectors escalate.
Thales allows organisations to adapt their business and security needs to meet these challenges with access security solutions that offer flexible service delivery which simplifies authentication implementation and management through automated processes, which drastically reduce the time and cost of provisioning, administration and managing users and tokens compared to traditional models.
Organisations need to leverage enterprise authentication to ensure secure remote access, even when their employees are located in the office.
Administrators need to create consistent policies for secure access via VPNs and keep their identity and access management solution flexible, cost-effective and easy to-deploy.
The growth in the use of virtualised environments – particularly Virtual Desktop Infrastructure (VDI) solutions – is challenging businesses to overcome the vulnerabilities of fixed passwords.
Thales's Multi-Factor Authentication solutions for Software-as-a-Service (SaaS) allows enterprises to maximise cloud data security.
Take steps to protect against corporate espionage and Advanced Persistent Threats (APTs) that originate from unauthorised local network access.
With the right platform, organisations can efficiently implement unified access policies and single sign-on for web-based applications.
With context-based authentication, employees can easily and securely access enterprise and SaaS applications, as long as they meet pre-defined policy rules set in advance by the administrator.
In addition to the above, by combining authentication with encryption and cryptographic key management, Thales customers can address the following high-priority security needs throughout their organisations.
Thales's data protection solutions solve the challenges of data governance, control and ownership that arise in the cloud and virtual environments.
By adopting an information-centric approach you can meet the data compliance needs of today while staying persistently compliant with new mandates.
Consistently safeguard the integrity and trust of your organisation's public key infrastructure (PKI) environments.
Offering solutions that are industry-specific, Thales is able to serve the particular requirements of our customers, protecting the world’s leading organisations in finance, retail, healthcare and more.
Thales is the market leader in financial data security for the world’s largest financial institutions protecting over 80% of the world’s fund transfers, providing transaction security for five of the world’s largest central banks.
With Thales solutions, healthcare organisations achieve and maintain compliance by protecting sensitive data, such as patient records, medical transactions and intellectual property for pharmaceutical and medical patents.
Retailers use Thales solutions to secure customer data inside their organisations and achieve compliance with all retail data privacy mandates.
Thales is trusted by governments across the world to secure mission critical information, control access, ensure data ownership and safeguard communications.
Scalable cloud-based data protection solutions for increasing ARPU and reducing operational costs, all while simplifying operations and maintaining compliance.
The surge in high-profile security breaches, as well as evolving business environments that require entirely new considerations for access control – like Software-as-a-Service (SaaS) applications and mobile device management – represents a shift in how trust and control is established and maintained.
More than ever, authentication is vital for the health of any organisation – empowering admins to secure access to corporate networks, protect the identities of users and ensure that a user is who he claims to be. Check out the below resources to learn how your organisation can utilise and benefit from Multi-Factor Authentication solutions.
Many organisations rarely look closely at the Total Cost of Operation of their authentication solution and instead make a decision heavily driven by the up-front purchase price. This approach to assessing authentication costs shows that infrastructure investments and management overheads dominate the total cost of the solution. Lowering these overheads, therefore, would reduce their Total Cost of Operation. Cloud-based services are increasingly becoming an integral part of the enterprise, precisely because they lower costs and management overhead while increasing flexibility.
By understanding authentication technologies, you can select your authentication method with confidence. Authenticate successfully, get "A Comprehensive Guide to Authentication Technologies and Methods"
More and more cloud-based services are becoming an integral part of the enterprise, as they lower costs and management overhead while increasing flexibility. Cloud-based authentication services, especially when part of a broader access management service, are no exception and can help organisations achieve significant savings through automation. An effective access management and strong authentication service enables companies to pursue consistent access policies across the organisation by creating a single pane of glass for access events, while securing a broad spectrum of resources, whether on-premises, cloud-based, or virtualised.
Offering the broadest range of Multi-Factor Authentication methods and form factors, Thales facilitates and empowers enterprise-wide security initiatives for maintaining and improving secure access to enterprise resources.