Authshield- Intigration with mail-Microsoft Exchange - PowerPoint PPT Presentation

About This Presentation
Title:

Authshield- Intigration with mail-Microsoft Exchange

Description:

AuthShield for ActiveSync is a user friendly multi-factor authentication solution for mobile users. ActiveSync allows users to synchronize their inbox, subfolders, calendar, contacts etc. with their mobile device like smart phones and tablets. – PowerPoint PPT presentation

Number of Views:48

less

Transcript and Presenter's Notes

Title: Authshield- Intigration with mail-Microsoft Exchange


1
AuthShield Security for Mails
2
If you were a hacker trying to hack into an
organization what will be your attack
methodology?
  • Attack the perimeter (IP Range), scan it for
    vulnerabilities, try and find a way behind the
    firewall, IPS, IDS and then find a vulnerability
    in the router to sniff traffic. (P.S CISCO
    spends up to 50 Mn every year to scan their
    routers for vulnerabilities). You will also have
    to hide your traces during this entire exercise
    to prevent from getting caught
  • Go on Social media. Identify employees working in
    the organization. Chat up with them, and carry
    out a phishing scam to get access to their
    credentials. Use the same credentials to log into
    the critical IT assets of the organization

3
Vulnerabilities in E-mails
4
Most vulnerable Point of Attack
Credential
Access Granted
Server
5
Mails Warehouse of Information on the Go!
  • E-mails are an integral part of our communication
    mechanisms
  • Can be accessed
  • anywhere in the world on
  • almost every device
  • Considered as written proof of communication in
    many countries
  • Can be used to steal information or to
    impersonate senior members of an organization

As per Internet Crime Complaint Center (IC3) in
the past fourteen months there have 1200 US and
over 900 non US victims where business mails have
been compromised
6
Microsoft Exchange
  • Microsoft Exchange had an installed base of 470
    million in 2014
  • Microsoft Exchange uses a propriety RPC protocol,
    MAPI / RPC that was designed to be used by
    Microsoft Outlook
  • Emails hosted on exchange can also be accessed
    using SMTP, POP3 and IMAP4 protocols
  • Many Android, iOS and Windows Mobile phones now
    support Exchange ActiveSync Push Email

7
Why AuthShield 2FA
  • Most Cyber attacks are Phishing related scams and
    effective in majority of cases
  • A non aware user is the weakest link in the Cyber
    Security Chain
  • Every organization needs to protect their mails
    as they are one of the most critical assets of an
    organization

8
Only Protection against User Level Attacks
  • Identify the user based on
  • Something he knows (User Name / Password)
  • Something in the users possession
  • Something the user is

Tackling Identity Theft
9
Username Password
Username, Password Second Factor of
Authentication
ACCESS DENIED
Access Granted
Server
Hacker may have access to the Password but he
cannot have access to the Second Factor of
Authentication
10
How is AuthShield different??
AuthShield Patented Protocol Decoding Engine
ensures that Authentication Security is
implemented at a Protocol level rather than
Application layer
Authentication Security has been limited to
applications which provide inherent support for
2FA
11
Architecture
12
Solution Components
13
AuthShield Tokens for OWA
Hard Token
Android / iOS / Windows /BB
Linux / Mac / Windows
14
Hard Token
  • Security device (Hard Token) given to authorized
    users
  • The token generates a new password after every 90
    seconds
  • Each token is unique to the user and synchronized
    with the server based on time
  • The password is based on a pre defined
    unbreakable randomized algorithm.

Hard Token
15
Mobile Token for Smart Phones
  • Application installed on smart Phones
  • User identity is mapped to his smartphone
  • User has to enter PIN to generate the One Time
    Password
  • Available for all smart phones

Android / iOS / Windows /BB
16
Soft Token for Desktops
  • Application installed on Desktop
  • User identity is mapped to his desktop
  • User has to enter PIN to generate the token
  • Available for all OS

Linux / Mac / Windows
17
AuthShield Tokens for OWA / ActiveSync / Outlook
Anywhere
One Touch Authentication for Windows / Linux /
Mac Systems OS
One Touch Authentication for Android / iOS /
Windows Phones
18
Mobile One Touch Authentication
  • Maps users identity to his registered mobile
    phones
  • Anytime a user wishes to login, a PUSH
    notification is sent with details on
  • IP
  • Location
  • TimeStamp
  • User has to Approve the request to login

19
System One Touch Authentication
  • Maps users identity to his registered Desktop /
    Laptop
  • Anytime a user wishes to login, a PUSH
    notification is sent with details on
  • IP
  • Location
  • TimeStamp
  • User has to Approve the request to login

20
AuthShield Integration with Microsoft Exchange
  • AuthShield Protocol Decoding Engine receives
    Authentication request from User
  • Server validates the User name and Password from
    AD / LDAP
  • Request is forwarded to the Authentication Server
    for the second factor authentication check

21
(No Transcript)
22
Process Flow
23
Process Flow
24
About Us
  • About the Company
  • Research Oriented Information Security
    Organization
  • All technologies are indigenous - Evaluated and
    approved by multiple Government Agencies
  • Empanelled with DRDO
  • More than six years of experience in Cyber
    Security
  • Served key clients in Private and Public sector

25
Contd.
  • Features
  • Patents on 2FA with Protocol level decoding
  • Direct integration of 2FA with
  • SAP / ERP
  • Mail servers Microsoft Exchange, OCMS, IBM
    Lotus Nodes, Zimbra etc
  • VPN
  • Database Queries
  • Web Applications etc
  • Customized products focused on technology
    immersion in clients

26
Contd.
27
In the Press
Rated 9/10 by PC Quest Magazine
DRDO Implements AuthShield Authentication
Security
Mindteck has appointed AuthShield for MFA
AuthShield launches Zero cost Biometrics
28
Our Success Stories!!!
  • Empanelled with DRDO for Multi-factor
    Authentication
  • Only Indian Company to have developed an
    indigenous Multi-factor Authentication at
    Protocol Level.
  • Only Indian Company to have developed and
    deployed an independent Internet Monitoring
    System across an entire region.
  • Multiple Patent Pending Technologies including
    Cyber Café Surveillance, Tactical Internet
    Monitoring System and Multifactor Authentication.

29
AuthShield Integrations
30
Support
  • 24 7 Support center
  • Dedicated Helpline and Ticketing portal with
    monthly reports (on support as well as
    application performance) submitted to client
  • SLA with inbuilt penalty clauses - Timeframes
    defined for critical, priority and non-critical
    support
  • Optional - Dedicated Team deployed for client
    (for Priority support)

31
Some of our Government Clients
Ministry of Home Affairs
Indian Army
JK Police
Ministry of Defense
Delhi Police
Chandigarh Police
UP Police
National Technical Research Organization
National Investigation Agency
AP Police
32
Some of our other clients
33
Contact Us
GET IN TOUCH WITH US. WED BE HAPPY TO HELP
_at_ authshield2FA
91-11-47065866/ 45272272
info_at_innefu.com
www.auth-shield.com / www.innefu.com
876, 8th Floor, Aggarwal Cyber Plaza II,Netaji
Subhash Place, New Delhi, India
Write a Comment
User Comments (0)
About PowerShow.com