Top Banner
IDENTITY
22

Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

Jul 25, 2015

Download

Technology

ForgeRock
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

IDENTITY

Page 2: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Page 3: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Page 4: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Page 5: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

IDENTITY CARDS

Page 6: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

DIGITAL IDENTITY

Page 7: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Page 8: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

SOCIAL LOGIN

Page 9: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

BY SECTOR

Page 10: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

TAKEOVER OF SOCIAL LOGIN

50%USE

social login

90%SEEN

social login 2 BILLIONUSE

social login

75%WORLDinternet users

Page 11: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Page 12: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

SOCIAL MEDIA CYBER ATTACKS

36%SOCIAL NETWORK USERS

HAVE ACCEPTED FRIEND

REQUESTS FROM

PEOPLE THEY DO NOT

KNOW

1/6SOCIAL NETWORK USERS

REPORT THAT SOMEONE

HAS HACKED INTO THEIR

PROFILE AND

PRETENDED TO BE THEM

4/10SOCIAL NETWORK USERS

HAVE FALLEN VICTIM TO

CYBERCRIME ON SOCIAL

NETWORK PLATFORMS

Page 13: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

SOCIAL MEDIA CYBER ATTACKS

Impersonations• Fake accounts use a organization’s logo to spread

malware and phishing to customers

Executive Impersonators• Executive impersonator gains followers over the course

of months, announces company is going belly up

Page 14: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

SOCIAL MEDIA CYBER ATTACKS

Customer Service Scams• Fake customer service accounts target customers or

other customer service reps

Sensitive Information• Sensitive or noncompliant information, true or false, sent

to stakeholders

Page 15: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

THE CHALLENGE

IRS• Name• Social Security Number or

Individual Tax ID Number (ITIN)• Date of Birth• Filing Status• Mailing Address• Third Party Verification

Questions

WHAT YOU GET

Page 16: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

ZEROFOX ENTERPRISEZEROFOX SECURITY

INTELLIGENCEZEROFOX CONTINUOUSIDENTITY PROTECTION

Page 17: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

HOW WE SOLVE THE PROBLEM

ZEROFOX

SECURITY ENFORCEMENT

ANALYTICS &EVENT MGMT

Page 18: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

CONTEXT BREEDS CONFIDENCE

Driven by expert models, supervised machine learning and malware and phishing detection technology, the Security Analysis Engine identifies never before seen attacks and

camouflaged threats.

Page 19: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

ZEROFOX CONTINUOUS IDENTITY PROTECTION

HIGHLIGHTS• Real-time security analysis of users

as they attempt to log in to an application.

• Assess each identity for behavioral and technical threat indicators to identify elevated risk levels.

• Find malicious or fraudulent behavioral indicators in a user’s network.

Page 20: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

FORGEROCK INTEGRATION

ZeroFOX conducts real-time security analysis of each user as they attempt to log in, empowering ForgeRock to:• Monitor and enhance

controls around high risk users

• Shut out compromised accounts

• Identify malicious actors• Have a comprehensive

risk profile of each user

Page 21: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Page 22: Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM

CONTACT US

Global HQ1111 Light St., 3rd FloorBaltimore, MD 21230

855-ZFOX-FOX [email protected]