Symantec White Paper - Two-Factor Authentication - TC TrustCenter

Symantec White Paper - Two-Factor Authentication - TC TrustCenter Symantec White Paper - Two-Factor Authentication - TC TrustCenter

12.04.2013 Views

WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A Total Cost of Ownership Viewpoint Two-Factor Authentication Who should read this paper Symantec Validation and ID Protection Service provides you with a better, more cost-effective way to protect your entire network. Now scale your network security to meet the authentication demands of employees, customers and business partners. And reduce your total cost of ownership up to 40 percent - without getting locked into a proprietary system. Learn how strong authentication is being deployed today and understand the cost categories that need to be considered.

WHITE PAPER:<br />

TWO-FACTOR AUTHENTICATION: A <strong>TC</strong>O<br />

VIEWPOINT<br />

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

A Total Cost of Ownership Viewpoint<br />

<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

Who should read this paper<br />

<strong>Symantec</strong> Validation and ID Protection Service provides you with a<br />

better, more cost-effective way to protect your entire network. Now scale<br />

your network security to meet the authentication demands of<br />

employees, customers and business partners. And reduce your total cost<br />

of ownership up to 40 percent - without getting locked into a proprietary<br />

system. Learn how strong authentication is being deployed today and<br />

understand the cost categories that need to be considered.


WHITE PAPER: TWO-FACTOR AUTHENTICATION: A <strong>TC</strong>O VIEWPOINT<br />

<strong>Two</strong>-F wo-<strong>Factor</strong> actor <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

Contents<br />

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

<strong>Symantec</strong> VIP vs. competitor solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br />

Administrator and token life-cycle management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5


1<br />

<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

Introduction<br />

By the end of 2013 more than 75 percent of U.S. employees—and more than 1 billion workers worldwide—will routinely work outside a<br />

traditional office environment. 1 Increasing numbers of employees will need to remotely access the corporate network. Even people working<br />

from the office will be using the Internet to do their jobs as organizations adopt the software-as-a-service (SaaS) application delivery model.<br />

Meanwhile, with the growing prominence of extranets and cross-organizational collaboration tools, non-employees—including customers,<br />

suppliers, and business partners—increasingly need access to corporate applications and data, sometimes through social media<br />

technologies. Extended networks can help organizations cut operational costs through greater process efficiencies; promote cross-<br />

organizational innovation; and eliminate the need to build costly and time-consuming point-to-point connections. Although there are<br />

tremendous benefits to this expansion of the corporate network, the need for strong security has never been more apparent.<br />

Enterprises have traditionally used two-factor authentication (2FA) to secure access to corporate resources remotely. Due to their relative<br />

ease of use and familiar end-user paradigm, One-Time Password (OTP)-based solutions are the most widely used 2FA solution deployed by<br />

enterprises today. As 2FA vendors and Enterprise IT professionals gain experience deploying these solutions, the true cost or total cost of<br />

ownership (<strong>TC</strong>O) becomes apparent and can be estimated quite accurately across different authentication solutions.<br />

This white paper will focus specifically on various OTP-based authentication solutions and will help IT professionals identify the key<br />

components that contribute to their <strong>TC</strong>O. Furthermore, this white paper will draw a comparison between <strong>Symantec</strong>® Validation and ID<br />

Protection (VIP) Service, and a competitor’s strong authentication solution from a <strong>TC</strong>O perspective.<br />

Defining <strong>TC</strong>O<br />

<strong>TC</strong>O accounts for all of the costs associated with planning, procuring, deploying, and owning a two-factor authentication solution—not just<br />

the solution cost paid to a particular vendor. It should include:<br />

• Up-front costs for an infrastructure that must be scalable, highly reliable, and protected in a secure facility (hardware costs)<br />

• Deployment costs, including both internal and outsourced resources to plan, install, and configure the solution, as well as costs to<br />

set up and train end users<br />

• One-time costs for devices (such as tokens or mobile phone applications) that generate the OTP, as well as any replacement and<br />

distribution costs<br />

• <strong>Authentication</strong> software license fees, either annual subscriptions or perpetual licenses, which then impose additional maintenance<br />

fees<br />

• On-going administration costs include costs to maintain the OTP deployment, as well as end-user support and help desk costs<br />

• Integration costs<br />

1-Worldwide Mobile Worker population 2009-2013 Forecast and Analysis,” IDC, December 2009


<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

<strong>Symantec</strong> VIP vs. competitor solution<br />

Scenario: Deployment of 5,000 OTP credentials deployed to secure remote access to corporate resources.<br />

IT infrastructure costs<br />

For validation, administration, and life-cycle management of OTP credentials, we assume two servers per site (for redundancy and failover) as<br />

well as a single disaster-recovery server deployed at a different site. <strong>Symantec</strong> VIP deployment will also leverage the existing enterprise<br />

directory for the user’s first factor (password). The ability to leverage the existing user store for the first factor is a cost benefit for the<br />

<strong>Symantec</strong> solution as it simplifies end-user onboarding and training, as well as administrative overhead. It is also important to note that the<br />

VIP Enterprise Gateway is lightweight and completely stateless as compared to the leading competitor’s servers which host a proprietary<br />

database engine. Therefore, the type of server required for <strong>Symantec</strong> VIP is less costly. Costs include both hardware and OS.<br />

IT and support staffing: Initial setup, integration, and distribution<br />

For initial deployment, the IT staffing model assumes one full-time equivalent (FTE) project manager and one FTE system administrator for<br />

one week.<br />

Credential costs (one-time token fee)<br />

<strong>Symantec</strong> VIP Access for Mobile provides a downloadable mobile credential for 2FA that makes strong authentication more convenient for<br />

end users as well as more affordable and cost-effective 2FA for the enterprise. VIP Access for Mobile is available free of charge to both the<br />

enterprise and end user, and is distributed directly by <strong>Symantec</strong>, further reducing administrative overhead for the enterprise. VIP Access for<br />

Mobile supports over 700 different mobile phone models, including Blackberry®, iPhone®, Android, Windows® Mobile and J2ME. A leading<br />

competitor also offers a mobile software credential, however it has associated token seed fees, and is not supported on as many phone<br />

models as VIP Access for Mobile. The model assumes that 60 percent of end-users use VIP Access for Mobile with the <strong>Symantec</strong> solution and<br />

50 percent of end- users use software tokens with the competitor solution.<br />

Hardware token costs are a one-time fee in the first year of deployment. A leading competitor leases their tokens typically over a three to five<br />

year period, and enforces token renewal as the lease expires. <strong>Symantec</strong> VIP hardware tokens typically do not expire, and can be used for the<br />

life of the battery, typically 5-8 years. <strong>Symantec</strong> customers own their tokens and do not have to renew them after the life of the subscription,<br />

providing further cost saving that is not accounted for in this model. For token costs, the model also assumes that ten percent of issued<br />

tokens are lost or broken annually. Estimated token costs are based on list pricing.<br />

Hardware token distribution<br />

Hardware tokens must be distributed to end users, and the model assumes that 25 percent of users utilizing hardware credentials are remote<br />

and must have tokens individually packaged and shipped to their location. Other hardware credential users will pick up their tokens from a<br />

central location, incurring minimal additional cost.<br />

2


3<br />

<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

Software costs (one-time license fee)<br />

<strong>Symantec</strong> charges a flat per credential, per year subscription fee over the lifetime of the solution (three years in this example). The model<br />

assumes the competitor is charging 20 percent of the software license fee as a recurring software maintenance fee.<br />

Administration<br />

The model assumes that half the administrator FTE can support a deployment for 5,000 users. With <strong>Symantec</strong> VIP, the enterprise<br />

administrator no longer needs to import token seed records for each batch of tokens, or distribute software token seeds to end users using<br />

mobile phone credentials. We believe that the administration costs for <strong>Symantec</strong> VIP will be lower by about 30 percent.<br />

Administrator and token life-cycle management<br />

• Total number of credentials: 5,000<br />

• Total years of analysis: 3


<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

Conclusion<br />

As seen in the examples above, <strong>Symantec</strong> VIP delivers significantly lower <strong>TC</strong>O than a leading competitor, by over 40 percent. In addition,<br />

there are several key features of the <strong>Symantec</strong> VIP that will further enable the enterprise to adapt their deployment to the evolving business<br />

requirements while at the same time minimizing <strong>TC</strong>O in the long run. These concepts are summarized below:<br />

Better value with <strong>Symantec</strong><br />

• Free, easy-to-use software credentials provide significant cost savings<br />

• Single, integrated platform allows you to deploy multiple devices depending on user and application types<br />

• Flexible models enable you to create a customized solution for your business<br />

• Leverages existing technology investments (Directory, database, SSO servers, etc.)<br />

• Fully scalable<br />

• Open versus proprietary–more credential choices and no vendor lock<br />

• Continuous innovation–innovative devices both in cost and functionality (secure storage, end-point security, etc.)<br />

• Single platform can support changing authentication requirements<br />

• Lower costs<br />

• Cost-effective tokens<br />

• Out-of-box self-service application–including token activation, token synchronization, etc.<br />

4


<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

Glossary<br />

2-<strong>Factor</strong> <strong>Authentication</strong>, Strong<br />

<strong>Authentication</strong>, Multifactor<br />

<strong>Authentication</strong><br />

All of these terms refer to the authentication practice of requiring confirmation of something you know,<br />

such as a user name and password, and something you have, such as a smart card, token or certificate.<br />

<strong>Authentication</strong> The process of confirming that something is genuine. In computer security, authentication is usually an<br />

automated process of verifying the identity of someone or something, such as a computer or application.<br />

Credential Proof of qualification, competence, or clearance that is attached to a person. A digital certificate, token,<br />

smart card, mobile phone, or installed software are credentials that may be used to enable strong or<br />

multifactor authentication.


<strong>Two</strong>-<strong>Factor</strong> <strong>Authentication</strong><br />

A Total Cost of Ownership Viewpoint<br />

About <strong>Symantec</strong><br />

<strong>Symantec</strong> is a global leader in providing security,<br />

storage, and systems management solutions to help<br />

consumers and organizations secure and manage<br />

their information-driven world. Our software and<br />

services protect against more risks at more points,<br />

more completely and efficiently, enabling<br />

confidence wherever information is used or stored.<br />

Headquartered in Mountain View, Calif., <strong>Symantec</strong><br />

has operations in 40 countries. More information is<br />

available at www.symantec.com.<br />

For specific country offices<br />

and contact numbers, please<br />

visit our website.<br />

<strong>Symantec</strong> World Headquarters<br />

350 Ellis St.<br />

Mountain View, CA 94043 USA<br />

+1 (650) 527 8000<br />

1 (800) 721 3934<br />

www.symantec.com<br />

<strong>Symantec</strong> helps organizations secure and manage their<br />

information-driven world with security management,<br />

endpoint security, messaging security, and application<br />

security solutions.<br />

Copyright © 2011 <strong>Symantec</strong> Corporation. All rights<br />

reserved. <strong>Symantec</strong> and the <strong>Symantec</strong> Logo are<br />

trademarks or registered trademarks of <strong>Symantec</strong><br />

Corporation or its affiliates in the U.S. and other<br />

countries. Other names may be trademarks of their<br />

respective owners.<br />

8/2011 21172471

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!