Title: Authshield- Intigration with mail-Microsoft Exchange
1AuthShield Security for Mails
2If you were a hacker trying to hack into an
organization what will be your attack
methodology?
- Attack the perimeter (IP Range), scan it for
vulnerabilities, try and find a way behind the
firewall, IPS, IDS and then find a vulnerability
in the router to sniff traffic. (P.S CISCO
spends up to 50 Mn every year to scan their
routers for vulnerabilities). You will also have
to hide your traces during this entire exercise
to prevent from getting caught - Go on Social media. Identify employees working in
the organization. Chat up with them, and carry
out a phishing scam to get access to their
credentials. Use the same credentials to log into
the critical IT assets of the organization
3Vulnerabilities in E-mails
4Most vulnerable Point of Attack
Credential
Access Granted
Server
5Mails Warehouse of Information on the Go!
- E-mails are an integral part of our communication
mechanisms - Can be accessed
- anywhere in the world on
- almost every device
- Considered as written proof of communication in
many countries - Can be used to steal information or to
impersonate senior members of an organization
As per Internet Crime Complaint Center (IC3) in
the past fourteen months there have 1200 US and
over 900 non US victims where business mails have
been compromised
6Microsoft Exchange
- Microsoft Exchange had an installed base of 470
million in 2014 - Microsoft Exchange uses a propriety RPC protocol,
MAPI / RPC that was designed to be used by
Microsoft Outlook - Emails hosted on exchange can also be accessed
using SMTP, POP3 and IMAP4 protocols - Many Android, iOS and Windows Mobile phones now
support Exchange ActiveSync Push Email
7Why AuthShield 2FA
- Most Cyber attacks are Phishing related scams and
effective in majority of cases - A non aware user is the weakest link in the Cyber
Security Chain - Every organization needs to protect their mails
as they are one of the most critical assets of an
organization
8Only Protection against User Level Attacks
- Identify the user based on
- Something he knows (User Name / Password)
- Something in the users possession
- Something the user is
Tackling Identity Theft
9 Username Password
Username, Password Second Factor of
Authentication
ACCESS DENIED
Access Granted
Server
Hacker may have access to the Password but he
cannot have access to the Second Factor of
Authentication
10How is AuthShield different??
AuthShield Patented Protocol Decoding Engine
ensures that Authentication Security is
implemented at a Protocol level rather than
Application layer
Authentication Security has been limited to
applications which provide inherent support for
2FA
11Architecture
12Solution Components
13AuthShield Tokens for OWA
Hard Token
Android / iOS / Windows /BB
Linux / Mac / Windows
14Hard Token
- Security device (Hard Token) given to authorized
users - The token generates a new password after every 90
seconds - Each token is unique to the user and synchronized
with the server based on time - The password is based on a pre defined
unbreakable randomized algorithm.
Hard Token
15Mobile Token for Smart Phones
- Application installed on smart Phones
- User identity is mapped to his smartphone
- User has to enter PIN to generate the One Time
Password - Available for all smart phones
Android / iOS / Windows /BB
16Soft Token for Desktops
- Application installed on Desktop
- User identity is mapped to his desktop
- User has to enter PIN to generate the token
- Available for all OS
Linux / Mac / Windows
17AuthShield Tokens for OWA / ActiveSync / Outlook
Anywhere
One Touch Authentication for Windows / Linux /
Mac Systems OS
One Touch Authentication for Android / iOS /
Windows Phones
18Mobile One Touch Authentication
- Maps users identity to his registered mobile
phones - Anytime a user wishes to login, a PUSH
notification is sent with details on - IP
- Location
- TimeStamp
- User has to Approve the request to login
19System One Touch Authentication
- Maps users identity to his registered Desktop /
Laptop - Anytime a user wishes to login, a PUSH
notification is sent with details on - IP
- Location
- TimeStamp
- User has to Approve the request to login
20AuthShield Integration with Microsoft Exchange
- AuthShield Protocol Decoding Engine receives
Authentication request from User - Server validates the User name and Password from
AD / LDAP - Request is forwarded to the Authentication Server
for the second factor authentication check
21(No Transcript)
22Process Flow
23Process Flow
24About Us
- About the Company
- Research Oriented Information Security
Organization - All technologies are indigenous - Evaluated and
approved by multiple Government Agencies - Empanelled with DRDO
- More than six years of experience in Cyber
Security - Served key clients in Private and Public sector
25Contd.
- Features
- Patents on 2FA with Protocol level decoding
- Direct integration of 2FA with
- SAP / ERP
- Mail servers Microsoft Exchange, OCMS, IBM
Lotus Nodes, Zimbra etc - VPN
- Database Queries
- Web Applications etc
- Customized products focused on technology
immersion in clients
26Contd.
27In the Press
Rated 9/10 by PC Quest Magazine
DRDO Implements AuthShield Authentication
Security
Mindteck has appointed AuthShield for MFA
AuthShield launches Zero cost Biometrics
28Our Success Stories!!!
- Empanelled with DRDO for Multi-factor
Authentication - Only Indian Company to have developed an
indigenous Multi-factor Authentication at
Protocol Level. - Only Indian Company to have developed and
deployed an independent Internet Monitoring
System across an entire region. - Multiple Patent Pending Technologies including
Cyber Café Surveillance, Tactical Internet
Monitoring System and Multifactor Authentication.
29AuthShield Integrations
30Support
- 24 7 Support center
- Dedicated Helpline and Ticketing portal with
monthly reports (on support as well as
application performance) submitted to client -
- SLA with inbuilt penalty clauses - Timeframes
defined for critical, priority and non-critical
support - Optional - Dedicated Team deployed for client
(for Priority support)
31Some of our Government Clients
Ministry of Home Affairs
Indian Army
JK Police
Ministry of Defense
Delhi Police
Chandigarh Police
UP Police
National Technical Research Organization
National Investigation Agency
AP Police
32Some of our other clients
33Contact Us
GET IN TOUCH WITH US. WED BE HAPPY TO HELP
_at_ authshield2FA
91-11-47065866/ 45272272
info_at_innefu.com
www.auth-shield.com / www.innefu.com
876, 8th Floor, Aggarwal Cyber Plaza II,Netaji
Subhash Place, New Delhi, India