LLEVANDO LA AUTENTICACION
DE SUS CLIENTES A UN
SIGUIENTE NIVEL
Sonia Cordova - Territory Account Manager
Gabriela Valdiva – SecurID Account Manager
Cloud, mobile, social son tecnologìas que expanden la superficie de ataque
Identidad es ahora el vector màs importante de
ataque
Ataques en
aplicaciones web
fueron con
credenciales
robadas
81%
2
*Verizon Data Breach Investigations Report
 Passwords pueden ser capturados fàcilmente por phishing y otros mecanimos.
 Usuarios escriben y comparten passwords
 El punto de la cadena es el usuario
 Los passwords son tan dèbiles que pueden ser adivinados fàcilmente
PASSWORDS ESTÀN EN CRISIS
123123123
789789789
456456456
VPN
!
!
!
DESAFIOS DE
ACCESOS
REMOTOS
Remote Access (VPN)
 Critical for today’s distributed
and mobile workforce
 Passwords are easily
compromised



2FA for VPN
 IT administrators, road warriors,
remote employees
 ~ 20% of employees
Remote Access (VPN)
 Critical for today’s distributed
and mobile workforce
 Passwords are easily
compromised
VPN
OTP Tokens
 High-level of security
 Always on and available
 Broadest number of use scenarios
Autenticaciòn hoy
La Era Digital trae una
inmensa Oportunidad Digital
(Pero ...)
NUEVOS DESAFIOS DE
IDENTIDAD
Islas de Identidad”
MODERNIZATION
Ataques màs sofisticados y
frecuentes
MALICE
NUEVAS
CAPACIDADES CON
NECESARIAS
8
C ON VEN IEN T & SEC U R E A C C ESS IN A W OR LD W ITH OU T B OU N D A R IES
RSA
EVOLVE FROM STRONG
AUTHENTICATION
TRANSFORM TO IDENTITY
ASSURANCE
• Trusted by 25,000+ Enterprises
• More than 50 million active users
• 500+ certified technology partners
• More than 50% market share
• The undisputed leader in multi-factor auth
• Any application: on-premises or in the cloud
• Mobile MFA: Push, OTP, biometrics & more
• Risk-based Identity Assurance
Risk-based Authentication
Access in context
RISK RISKYPASS DENY
Device AppRole Location Behavior
MACHINE
LEARNING
Pervasive MFA
Certified and supported
CRITICAL SECURE ACCESS CAPABILITIES
Modern MFA Methods - SSO
Easy & convenient
Push Mobile OTP Biometrics Text Msg Voice Call
ProximityHW Token WearablesSW Token FIDO
Assurance Levels
Challenge according to the level of risk
Security
Risk
RISK-BASED IDENTITY ASSURANCE
PASS
Desktop or mobile
(web browser)
NetworkSession
Device Location
AppRole
RSA SecurID token
Mobile OTP
Push (Approve)
Fingerprint
FaceID
Apple Watch
FIDO
Step-Up
Authentication
RISKY Identity Assurance
Service
THE REQUIRED CAPABILITIES FOR
SECURE ACCESS
user experience that’s easy
to deploy and manage
C ON VEN IEN T
authentication that adapts to
risk and grows with you
IN TELLIGEN T
access control from
ground to cloud
PERVASIVE
CASOS DE USO
13
APP PERSONALIZADA - ICONO & APLICACIÓN
ICONO
App Móvil
Finance
APLICACION
SDK for Mobile
APP PERSONALIZADA EMBEBIDA EN LA APP
ICONO
Personnalité
Finance
APLICACION
RSA
SecurID
Token
Embebido,
utilizando el
SDK for
Mobile
CASO DE USO – ECUADOR (FINANCIERO)
 IMPLEMENTACION DE TOKEN DIGITAL
PARA SUS CLIENTES
 INTEGRACION DE SDK EN SU PROPIO
APP
 PROCESO AUTOMATIZADO DE
ACTIVACION DE TOKEN
 MONITOREO DE AUTENTICACIÒN DE
CLIENTES Y GESTION DE USUARIOS A
TRAVES DEL SERVICIO DE CYBERSOC DE
SECURESFOT
MUCHAS GRACIAS!
Sonia.cordova@rsa.com
Territory Account Manager
Gabriela.Valdivia@rsa.com
Sr SecurID Account Manager

More Related Content

PPTX
Hardware Authentication
PDF
Mobile (in)security? @ Mobile Edge '14
PPTX
Mobile (in)security ?
PDF
Ibm security domains 2015[3]
PPTX
Multifactor Authentication
PDF
BYOD / Mobile-Device Security Guidelines for CxO's
PDF
MID_Security_Connected_Jan_van_Vliet_EN
PPTX
Webinar on Enterprise Security & android
Hardware Authentication
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security ?
Ibm security domains 2015[3]
Multifactor Authentication
BYOD / Mobile-Device Security Guidelines for CxO's
MID_Security_Connected_Jan_van_Vliet_EN
Webinar on Enterprise Security & android

What's hot (20)

PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
DIGIPASS for Apps
PPTX
Cyber security
PPTX
cell phone viruses and security
PDF
Smartphone Ownage: The state of mobile botnets and rootkits
PPT
Cell Phone Viruses & Security
PDF
Plurilock Zero Trust One Page Quick Overview
PPTX
Two Factor Authentication: Easy Setup, Major Impact
PPTX
Intro to Smart Cards & Multi-Factor Authentication
PPT
cellphone virus and security
PPTX
Mobile device management GFE
PPTX
Seminar-Two Factor Authentication
PDF
(Pptx) yury chemerkin hacker_halted_2013
PPTX
Mobile security
PPTX
Two Factor Authentication
PDF
(Pdf) yury chemerkin hackfest.ca_2013
PDF
(Pdf) yury chemerkin intelligence_sec_2013
PPTX
Mobile protection
PDF
(Pdf) yury chemerkin hacktivity_2013
PPTX
Multi-Factor Authentication - "Moving Towards the Enterprise"
ISACA CACS 2012 - Mobile Device Security and Privacy
DIGIPASS for Apps
Cyber security
cell phone viruses and security
Smartphone Ownage: The state of mobile botnets and rootkits
Cell Phone Viruses & Security
Plurilock Zero Trust One Page Quick Overview
Two Factor Authentication: Easy Setup, Major Impact
Intro to Smart Cards & Multi-Factor Authentication
cellphone virus and security
Mobile device management GFE
Seminar-Two Factor Authentication
(Pptx) yury chemerkin hacker_halted_2013
Mobile security
Two Factor Authentication
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin intelligence_sec_2013
Mobile protection
(Pdf) yury chemerkin hacktivity_2013
Multi-Factor Authentication - "Moving Towards the Enterprise"
Ad

Similar to Llevando la autenticación de sus clientes a un siguiente nivel (20)

PDF
Centrify rethink security brochure
PDF
Easy Solutions Product Brochure
PPTX
FrontOne our new and different solutions
PDF
How to successfully implement a secure mobile strategy
PDF
Entrust datacard --Authentication solutions overview
PDF
Entrust Enterprise Authentication
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PPSX
Welcome to the 3rd generation in user authentication
PDF
White Paper: Defense In Breadth
PPTX
The Future of Mobile Application Security
PDF
Entrust Mobile Security Solutions
PPT
ISS SA le presenta IdentityGuard de Entrust
PDF
Going beyond MFA(Multi-factor authentication)-Future demands much more
PDF
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
PPTX
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
PPTX
Unit-3.pptx
PDF
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
PPTX
Presentation- SecurID presentation for the Channel (1).pptx
PDF
Entrust IdentityGuard Mobile
Centrify rethink security brochure
Easy Solutions Product Brochure
FrontOne our new and different solutions
How to successfully implement a secure mobile strategy
Entrust datacard --Authentication solutions overview
Entrust Enterprise Authentication
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Multi Factor Authentication Whitepaper Arx - Intellect Design
Welcome to the 3rd generation in user authentication
White Paper: Defense In Breadth
The Future of Mobile Application Security
Entrust Mobile Security Solutions
ISS SA le presenta IdentityGuard de Entrust
Going beyond MFA(Multi-factor authentication)-Future demands much more
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
UNIT-3-Cybercrime Mobile and Wireless Devices-1.pptx
Unit-3.pptx
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Presentation- SecurID presentation for the Channel (1).pptx
Entrust IdentityGuard Mobile
Ad

More from Cristian Garcia G. (20)

PDF
Gtd Infraestructura Digital de Misión Critica
PPTX
Gestión de la exposición, cómo anticiparse a los ciberataques
PPTX
Más Allá del SOC Tradicional: IA y Automatización para Cumplimiento y Respues...
PDF
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
PPTX
El imperativo de la seguridad de la identidad
PPTX
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
PPTX
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
PPTX
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
PPTX
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
PPTX
La Brecha Silenciosa: ¿Estás Realmente Protegido?
PPTX
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
PPTX
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
PPTX
Gestionando amenazas y no incidentes de ciberseguridad…el camino de Tenable.
PPTX
Protegiendo Identidades y Transacciones Críticas en el Mundo Digital.
PPTX
Ciberseguridad en la Era de la IA: Estrategias y Habilitadores para los CISOs...
PDF
Estrategia de prevencion contra fraude electronico y financiero
PDF
BEYONDTRUST - Protegiendo Rutas al Privilegio
PDF
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
Gtd Infraestructura Digital de Misión Critica
Gestión de la exposición, cómo anticiparse a los ciberataques
Más Allá del SOC Tradicional: IA y Automatización para Cumplimiento y Respues...
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
El imperativo de la seguridad de la identidad
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
La Brecha Silenciosa: ¿Estás Realmente Protegido?
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
Gestionando amenazas y no incidentes de ciberseguridad…el camino de Tenable.
Protegiendo Identidades y Transacciones Críticas en el Mundo Digital.
Ciberseguridad en la Era de la IA: Estrategias y Habilitadores para los CISOs...
Estrategia de prevencion contra fraude electronico y financiero
BEYONDTRUST - Protegiendo Rutas al Privilegio
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR

Recently uploaded (20)

PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Auditboard EB SOX Playbook 2023 edition.
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
future_of_ai_comprehensive_20250822032121.pptx
4 layer Arch & Reference Arch of IoT.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
A symptom-driven medical diagnosis support model based on machine learning te...
Early detection and classification of bone marrow changes in lumbar vertebrae...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Advancing precision in air quality forecasting through machine learning integ...
Lung cancer patients survival prediction using outlier detection and optimize...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Comparative analysis of machine learning models for fake news detection in so...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf

Llevando la autenticación de sus clientes a un siguiente nivel

  • 1. LLEVANDO LA AUTENTICACION DE SUS CLIENTES A UN SIGUIENTE NIVEL Sonia Cordova - Territory Account Manager Gabriela Valdiva – SecurID Account Manager
  • 2. Cloud, mobile, social son tecnologìas que expanden la superficie de ataque Identidad es ahora el vector màs importante de ataque Ataques en aplicaciones web fueron con credenciales robadas 81% 2 *Verizon Data Breach Investigations Report
  • 3.  Passwords pueden ser capturados fàcilmente por phishing y otros mecanimos.  Usuarios escriben y comparten passwords  El punto de la cadena es el usuario  Los passwords son tan dèbiles que pueden ser adivinados fàcilmente PASSWORDS ESTÀN EN CRISIS
  • 4. 123123123 789789789 456456456 VPN ! ! ! DESAFIOS DE ACCESOS REMOTOS Remote Access (VPN)  Critical for today’s distributed and mobile workforce  Passwords are easily compromised
  • 5.    2FA for VPN  IT administrators, road warriors, remote employees  ~ 20% of employees Remote Access (VPN)  Critical for today’s distributed and mobile workforce  Passwords are easily compromised VPN OTP Tokens  High-level of security  Always on and available  Broadest number of use scenarios Autenticaciòn hoy
  • 6. La Era Digital trae una inmensa Oportunidad Digital (Pero ...)
  • 7. NUEVOS DESAFIOS DE IDENTIDAD Islas de Identidad” MODERNIZATION Ataques màs sofisticados y frecuentes MALICE
  • 9. C ON VEN IEN T & SEC U R E A C C ESS IN A W OR LD W ITH OU T B OU N D A R IES RSA EVOLVE FROM STRONG AUTHENTICATION TRANSFORM TO IDENTITY ASSURANCE • Trusted by 25,000+ Enterprises • More than 50 million active users • 500+ certified technology partners • More than 50% market share • The undisputed leader in multi-factor auth • Any application: on-premises or in the cloud • Mobile MFA: Push, OTP, biometrics & more • Risk-based Identity Assurance
  • 10. Risk-based Authentication Access in context RISK RISKYPASS DENY Device AppRole Location Behavior MACHINE LEARNING Pervasive MFA Certified and supported CRITICAL SECURE ACCESS CAPABILITIES Modern MFA Methods - SSO Easy & convenient Push Mobile OTP Biometrics Text Msg Voice Call ProximityHW Token WearablesSW Token FIDO Assurance Levels Challenge according to the level of risk Security Risk
  • 11. RISK-BASED IDENTITY ASSURANCE PASS Desktop or mobile (web browser) NetworkSession Device Location AppRole RSA SecurID token Mobile OTP Push (Approve) Fingerprint FaceID Apple Watch FIDO Step-Up Authentication RISKY Identity Assurance Service
  • 12. THE REQUIRED CAPABILITIES FOR SECURE ACCESS user experience that’s easy to deploy and manage C ON VEN IEN T authentication that adapts to risk and grows with you IN TELLIGEN T access control from ground to cloud PERVASIVE
  • 14. APP PERSONALIZADA - ICONO & APLICACIÓN ICONO App Móvil Finance APLICACION SDK for Mobile
  • 15. APP PERSONALIZADA EMBEBIDA EN LA APP ICONO Personnalité Finance APLICACION RSA SecurID Token Embebido, utilizando el SDK for Mobile
  • 16. CASO DE USO – ECUADOR (FINANCIERO)  IMPLEMENTACION DE TOKEN DIGITAL PARA SUS CLIENTES  INTEGRACION DE SDK EN SU PROPIO APP  PROCESO AUTOMATIZADO DE ACTIVACION DE TOKEN  MONITOREO DE AUTENTICACIÒN DE CLIENTES Y GESTION DE USUARIOS A TRAVES DEL SERVICIO DE CYBERSOC DE SECURESFOT