the presentation is about to begin!

minorbigarmSecurity

Nov 30, 2013 (3 years and 4 months ago)

50 views

the presentation is
about to begin!

MTM

virtual desktop alliance

a completely simple solution

for desktop virtualization

alliance sponsors

silver sponsors

gold sponsors

v.s
.

local or hosted

on
-
demand
assembly &
delivery

apps

user profile

desktop
os

client

user

apps

desktop
os

profile

virtualized &
isolated end
-
point
components

HDX WAN Optimization

Performance acceleration for
branch offices

HDX Rich Graphics

with
RemoteFX

High performance, full fidelity 2D

and 3D graphics

HDX Adaptive Orchestration

Dynamically adjusts to conditions across
the infrastructure and leverages available
RemoteFX

capabilities


HDX
SmartAccess

Simple, highly available and
secure user experience

HDX
MediaStream

Seamless multimedia experience

HDX
RealTime

Voice and video for real
-
time
collaboration

HDX Broadcast

Optimized delivery over any
network

HDX Plug
-
n
-
Play

Simple access to peripherals

Any user

any device

Any type of

virtual desktop

One centrally managed solution

VDI alone offers

limited ROI and flexibility

Citrix XenDesktop supports

all virtual desktop flavors

USER TYPES

Mobile

users

Task

workers

On
-
Demand Apps

Physical

Desktops

On
-
demand

apps


Easy setup.

Any PC or
Laptop.

Local

Streamed

desktops

Local

VM
-
based

desktops

Boots from network

5000 users/server

Runs locally

Online or offline

Hosted

VM
-
based

desktops

(VDI)

Hosted

Blade PC
desktops

Hosted

shared

desktops

Shared

500 users/server

Personalized

150 users/server

Personalized

1 user/workstation

Securing Your Citrix Deployment with Two
-
factor Authentication

Presented by:


Karen Kiffney

Senior Manager, Product Marketing, RSA

Agenda


The Problem with Passwords


RSA Authentication Overview


RSA Authentication in Citrix Environments

Secure Access for Increased Mobility

and Collaboration

12

Lack of confidence in secure
access

Struggle with one
-
size
-
fits
-
all security

Security impeding new
business initiatives

What We’ve Heard

Secure Access for Increased Mobility and Collaboration

CHALLENGE

Strong authentication

for workforce, partners

customers


Flexibility to enforce policies and
controls


by user, document, site
or transaction

Range of authentication

mechanisms for various

applications and profiles


Single sign
-
on capabilities

for reduced costs and

increased user satisfaction

Global threat detection

and takedown


Corporate identities,

credentials and systems

recovery

Confidence that only

legitimate users are

accessing

your information


Ability to monitor all user

activity on the network

Unclear who is remotely accessing
our systems and what they are
doing inside the network





Users bypass cumbersome

security mechanisms
--


putting corporate resources

at risk





Not prepared to address attacks
against our organization





Security is impeding new
business initiatives such as
VDI and outsourcing





REQUIREMENT

SOLUTION

Enable collaboration between employees, partners and outsourcers
without compromising security

RSA Authentication Solutions

RSA Authentication: Innovation Through Time

Passwords

Hardware tokens

Software tokens

SMS & text messaging

Risk
-
based
Authentication

Understand customers needs to balance

Cost Convenience Security

Small & Mid
-
Size Organizations

Fewer than 2,500 users

Enterprise

More than 1,000 users

Enterprise



Consumer Applications

More than 10,000 users

RSA Authentication: Choice

Broad range of solutions to meet the needs

of an increasingly diverse user population

On
-
Demand

PC / Web
Browser

Portable

Devices

Embedded

Solutions

Fob / Card

Token

Hybrid

Smart Card

Risk
-
Based

Tokenless

Software Tokens

Hardware Tokens

Administrators

Road Warriors

Internal Employees

Contractors

Part
-
Time Employees

Partners

Infrequent Users

Frequent Users

Customers

RSA Authentication: Three Platforms

Target

Market

Use

Case

Value Proposition

Protection of any application,
portal or network infrastructure

Users: Employees, partners,
customers

Enterprise class features and
scalability, authenticator form
factor options

Protection of SSL VPNs and
web applications

Users: Employees, partners,
clients

Convenient for end
-
users and
IT staff

Lower TCO

Small and mid
-
size organizations

Fewer than 2,500 users

Protection of web applications

Users: typically customers or
clients

Scalable, convenient, cost
-
effective; Available on
-
prem

or
hosted

RSA Authentication Manager
Express

RSA Authentication Manager

RSA Adaptive Authentication

Maximum Flexibility and Optimization

Enterprise with
More
than 1,000 users

Enterprise
-

Consumer
Applications

More than
10,000 users

A Closer Look at Multi
-
factor
Authentication

What is Two
-
Factor Authentication?


Two
-
Factor Authentication:

“The act of identifying an individual by using any combination of something they know, something
they have or something they are.”

“Something you know” = PIN, password, life
question


“Something you have” = Token, Smartcard,
Trusted Device


“Something you are” = Biometrics (fingerprint,
retinal scan, etc)

RSA Authentication: Three Platforms

Target

Market

Use

Case

Value Proposition

Protection of any application,
portal or network infrastructure

Users: Employees, partners,
customers

Enterprise class features and
scalability, authenticator form
factor options

Protection of SSL VPNs and
web applications

Users: Employees, partners,
clients

Convenient for end
-
users and
IT staff

Lower TCO

Small and mid
-
size organizations

Fewer than 2,500 users

Protection of web applications

Users: typically customers or
clients

Scalable, convenient, cost
-
effective; Available on
-
prem

or
hosted

RSA Authentication Manager
Express

RSA Authentication Manager

RSA Adaptive Authentication

Maximum Flexibility and Optimization

Enterprise with
More
than 1,000 users

Enterprise
-

Consumer
Applications

More than
10,000 users

How does RSA SecurID work?

RSA SecurID Authenticators

Flexibility and choice

Authenticator family includes hardware
and software tokens, hybrid devices and
on
-
demand SMS authentication

Provides customers with options to
balance risk, cost and convenience
needs

Designed for use by employees,
partners and customers


RSA Authentication: Three Platforms

Target

Market

Use

Case

Value Proposition

Protection of any application,
portal or network infrastructure

Users: Employees, partners,
customers

Enterprise class features and
scalability, authenticator form
factor options

Protection of SSL VPNs and
web applications

Users: Employees, partners,
clients

Convenient for end
-
users and
IT staff

Lower TCO

Small and mid
-
size organizations

Fewer than 2,500 users

Protection of web applications

Users: typically customers or
clients

Scalable, convenient, cost
-
effective; Available on
-
prem

or
hosted

RSA Authentication Manager
Express

RSA Authentication Manager

RSA Adaptive Authentication

Maximum Flexibility and Optimization

Enterprise with
More
than 1,000 users

Enterprise
-

Consumer
Applications

More than
10,000 users

RSA Authentication Manager Express

Multi
-
factor authentication with zero footprint

Risk
-
Based Authentication

On
-
Demand Authentication

Easy to Manage

Appliance Platform

Risk
-
Based Authentication

How it works

Web Browser

RSA

Risk Engine

Device
Profile

User Behavior Profile

PASS

FAIL

Protected
Resources

PASS

RISKY

Identity Challenge

?

On
-
Demand
Tokencode

Challenge
Questions

Access Denied

SSL VPN

OWA

SharePoint

Web Portals

Authentication Policy

Assurance
Level

Activity Details

Multi
-
factor Risk
-
based Authentication


Factor #1
:

Something You
KNOW


Step Up:

Something You
KNOW

or
HAVE


Factor #2
:
Something You
HAVE


Factor #3:

Something You
DO

RSA Authentication Securing
Citrix Environments

MTM virtual desktop alliance solution

Clients

WAN


Complete end
-
to
-
end solution


60
% greater
density


1/3 cost of networking infrastructure


Secure Delivery


Bandwidth optimization


Cisco
Validated
Design included


Desktop Virtualization S/W

Citrix

Hypervisor

VMware/Citrix/Microsoft

Desktop O/S

App

App

Data

Storage

Unified

Network
Services

Unified

Computing

Unified

Fabric

Broker

Unified

Storage

Why MTM?


largest Citrix reseller in N. America


Cisco UCS datacenter ATP certified


NetApp
FastPath


deep investment and competency in virtual desktop


end to end solution


full professional and managed services options

Geographic Coverage

Los Angeles

Houston

Arlington Heights

Philadelphia

Austin

Dallas

Cincinnati

Columbus

Milwaukee

St. Louis

Boston

Wilmington

Dover

Stamford

New York

Rocky Hill

San Francisco

Seattle


Cisco Gold Partner


Unified Communications Masters


Largest Citrix Solution Advisor in the US


Platinum Solution Advisor


Microsoft Gold Certified Partner


Unified Communications Competency


Server Infrastructure Competency


VMware Enterprise Solution Provider


NetApp

Gold Partner


AppSense Gold Partner


CommVault

Platinum Partner


OpenText Premier Partner

Core Practices


Real Solutions For
Today’s Dynamic
Business Environment

Virtualization


Helping Companies
Communicate
Effectively Across
Multiple Workspaces

Unified
Communications


Optimize System
Availability And
Reliability

Managed
Services

Professional Service Offerings


Assessment


Design Services


POC/Pilot Implementation Services


Production Rollout Services


Instructor Led and Virtual Training

Managed Service Offerings


Remote Support and Remediation


Managed Services


Infrastructure


Covers:


XenServer, Hyper
-
V or VMware


XenDesktop, Provisioning Server, XenApp, etc.


Ongoing


6 month handover support


Managed Services


Full Solution


Adds support for desktop image management


User Tier
-
1 helpdesk

why desktop virtualization


why a validated design


why MTM technologies

get more information

www.virtualdesktopalliance.com


demos available


complete solution demo lab under construction


on site demo using iPad and laptops


in demo studio in select markets with Cisco UC components


schedule your demo today!

Thank You!