Page 261 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 261

Unit 14: Authentication




             Strong authentication technology to strengthen  their remote access so that the confidential   Notes
             client files will be secured from various hacking  attacks as well as they meet the various
             compliances.
             Solution
             Customer evaluated multiple two-factor authentication options available in the market to
             meet  their needs. The criterion applied by the customer is to make sure the product offers
             Industry  level security, product is easily configurable with the Juniper SSL VPN and is a
             cost effective  solution so that they can offer it to all their employees enabling them to work
             remotely and  increase their productivity.  ArrayShield IDAS delivered robust Two Factor
             Authentication Solution that met all customer  needs. ArrayShield IDAS provides a robust
             two factor authentication leveraging user’s ArrayCard and a pattern that is remembered
             by the user. Before users are allowed access to the  VPN they must enter a unique Secret-
             Code  derived  from  the ArrayShield  IDAS  technology. The  Secret-Code  is  generated
             through the combination of a pattern that each user remembers and  an ArrayCard (credit-
             card sized translucent card) that the user carries with them. This simple  process ensures
             that only authorized personnel are able to access the system and protects  users’ identities
             from being intercepted or stolen, without the need for an expensive token  based system
             typically used with other strong authentication technologies. Another key  advantage
             is that the user need not remember any complicated password which makes the  whole
             system experience easier.

             Securing Customer Remote Access
             IDAS integration and deployment with Juniper SSL VPN at Customer premise was very
             smooth and happened in a few hours. The whole of the deployment and integration was
             carried  out    remotely  by  the  ArrayShield  Expert  technical  team  and  the  customer  was
             impressed with the  ease of installation, configuration and the remote support provided
             by  the ArrayShield team. As the IDAS system is lightweight  and high performing, it
             required Customer to allocate just a  minimal hardware in their premise to deploy IDAS
             Authentication manager.  Customer was very happy with the technology and business
             benefits provided by the solution,  and within few weeks have taken more licenses to roll-
             out the solution to the wider use base.

             Outcome
             1.     Meet  Compliance  Requirements:  By  implementing  Two  Factor  Authentication
                 technology, customer has met the various data accreditation security requirements
                 of ISO 27001, PCI DSS Level1 and HIPAA
             2.     Improved Productivity: By enabling IDAS for Remote Access VPN, the Customer’s
                 employees can now connect to their corporate network from anywhere, and respond
                 to critical communications with-out having to wait for the next day.
             3.     Security and Cost Targets Met: With a cost effective IDAS Two Factor Authentication
                 solution integrated with VPN, the customer is satisfied that their security requirements
                 are met within the budget available.
             Questions:

             1.   Study and analyze the case.
             2.   Write down the case facts.
             3.   What do you infer from it?
          Source: http://www.arrayshield.com/uploads/IDAS-2FA-CaseStudy-Financial-Services-Remote-Access-VPN.pdf







                                           LOVELY PROFESSIONAL UNIVERSITY                                   255
   256   257   258   259   260   261   262   263   264   265