Can your security detect and prevent Advanced Evasion Techniques?

Key Benefits

  1. Strong authentication
    Secure easy-to-use authentication, using your preferred device
  2. Ergonomic experience
    Use your favorite tools the way you want to
  3. Identity federation
    Extend authentication across private and public cloud services

Authentication pervades your entire network, starting from access to the network itself all the way to access to data and applications. Trivial passwords, weakly encrypted communication channels, and bad security habits are frequent causes of dramatic security incidents and data loss. Recent computing paradigm shifts, such as cloud computing, convey the need to treat authentication as one of the most important topics in a corporate security policy.
A key goal is the strength of the process. More specifically, the number of factors used in the process. The more factors a given authentication technique involves, the more secure it is.
At Stonesoft, we see this idea from a slightly different perspective. When we think of authentication, we see at least three variables:

  • strong authentication as a need
  • the holistic security of the overall authentication process
  • an ergonomic user experience

We think strong authentication should be combined with the need for authentication using devices and methods that users use for multiple purposes, such as mobile phones, smartphones, tablet or standard OS interfaces.
We believe that the security level of authentication can be increased by combining multiple authentication methods into a strong, holistic authentication chain.
We also see authentication as pervading even the latest scenarios, such as federated authentication.
For example, your users need access to applications hosted in a public cloud, but at the same time, you would like to keep authentication under control from a security and governance standpoint.
Finally, when considering authentication, we always keep situation awareness and manageability in mind.