Identity & Access Management Security

Home What We Do Enterprise Cybersecurity Identity & Access Management Security
Overview

A security discipline that makes it possible for the right entities (people or things) to use the right resources (applications or data) when they need to, without interference, using the devices they want to use.



A well architected and configured perimeter security infrastructure can protect the network from external threats and attacks to provide availability of the corporate applications and services. Ouranos with its versatile experience in the security domain can design and implement the perimeter security infrastructure to meet specific customer requirements. S I M has strong alliances with industry leading security vendors to provide comprehensive perimeter security solutions that include the following

▪ Firewall
▪ Intrusion Detection and Prevention
▪ Remote access VPN
▪ Gateway Anti-virus and Anti-spam
Two-Factor Authentication is a part of the broader family of multi-factor authentication, which is a defense in depth approach to security. Two-factor authentication has been used throughout history by having a known person utter a password. The first factor is the password, and the second would often be the presentation and demeanor of the requestor as reasonable given the circumstances of his arrival. The security of a system relies on the integrity of the authenticator and physical protection of the "something you have". Copy protection of the "something you have" is a bonus. This may comprise some form of physical tamper resistance or tamper-proofing, may use a challenge/response to prove knowledge of the shared secret to avoid disclosure, and may involve the use of a pin or password associated with the device itself, independent of any password that might have been demanded as a first factor. A challenge/response will not defeat a man-in-the-middle attack on the current authentication session but will prevent the attacker from successfully reusing or replaying credentials on his own. Two-factor authentication is based on something you know (a password or PIN) and something you have (an authenticator)—providing a much more reliable level of user authentication than reusable passwords.