Entrust High Level Deck
Entrust High Level Deck
© Entrust Corporation
Who We Are
$1B+
in revenue
3,400+
colleagues
50+
years of innovation
2k+
partners
140
countries served
65%
Fortune 500 served
2
RECOGNIZED LEADER
Gartner Magic Quadrant
Leader in Compass for 2024 –2024 – Access
Identity Verification
Management
- Leader
- Challenger
We Passwordless
Authentication 2022
SECURE
65% of
Market Leader in
Leadership Compass for
Secrets Management 2023
3
Digital Security & Identity Chosen by World’s Leading
Brands
4
WHAT IS ZERO TRUST
Zero Trust is a security concept centered on the belief that an organization should not automatically
trust anything inside or outside its perimeter.
5
5
CISA – ZERO TRUST MATURITY MODEL (V2.0)
Cybersecurity and infrastructure security agency (CISA)
https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf
ENTRUST IS UNIQUELY POSITIONED TO HELP
PQ
Ready
9
Entrust Digital Security
Users’ Devices Network Security Web Servers Applications Database Data File VM Logical Disk
BYOK, DKE
Root of Trust
10 Tamper Resistant
FIPS 140-2 Level 3
HSM AS A SERVICE WITH NSHIELD 5C
HSM MULTITENANCY
1
9
APPLICATION INTEGRATION CHOICES
Entrust nShield HSMs suit almost every application environment
◦ Commercial and in-house security applications: Encrypt, decrypt, sign, hash, etc.
Microsoft
PKCS #11 Java JCE OpenSSL Web Services API Entrust nCore
CryptoAPI/ CNG
Operating Systems
© Entrust Corporation
Where Can I Use nShield HSM?
nShield HSM
Users’ Devices Network Security Web Server Applications Database BYOK, DKE
FAST Payment,
End-to-end F5
MS IIS CyberArk, MS SQL, Oracle Cloud Key
Encryption Palo Alto
Apache HashiCorp, MS Key Protection
For Web and A10
ADCS, EJBCA, … Management
Mobile App Citrix….
13
Offering HSM as a Service
Customers • Multi Tenant nShield 5 (2024)
• Performance upgradable by license – no
hardware change required
• Target customers who has cloud strategy,
fintech companies, lack of IT Security
personnel, has nShield HSM in Production
Private
Cloud
14
SECURING DATA WITH KMS &
TOKENIZATION
KEY CONTROL 10
CENTRALIZED KMS
FOR DATA
PROTECTION
• Key storage
• Backup
• Rotation
• Key revocation
KEYCONTROL VAULT FOR VIRTUAL MACHINE (VM)
ENCRYPTION
Background
Pelindungan data pribadi ditujukan untuk menjamin hak warga negara atas pelindungan diri pribadi dan menumbuhkan
kesadaran masyarakat serta menjamin pengakuan dan penghormatan atas pentingnya pelindungan data pribadi
(2) Data Pribadi yang bersifat spesifik sebagaimana dimaksud pada ayat (1) huruf a meliputi:
data dan informasi kesehatan;
a. Data biometrik;
b. Data genetika;
c. Catatan kejahatan;
d. Data anak;
e. Data keuangan pribadi; dan/atau
f. Data lainnya sesuai dengan ketentuan peraturan perundang-undangan.
(3) Data Pribadi yang bersifat umum sebagaimana dimaksud pada ayat (1) huruf b meliputi:
nama lengkap;
a. Jenis kelamin;
b. Kewarganegaraan;
c. Agama;
d. Status perkawinan; dan/atau
e. Data Pribadi yang dikombinasikan untuk mengidentifikasi seseorang.
© Entrust Corporation
DATA TOKENIZATION
➢ Rest-API based (supported by any programming language)
➢ Data format is preserved (no change in database schema)
➢ Works for any OS and database – MySQL, Oracle, Postgress, DB2, MariaDB, MS SQL and more
➢ Vault-less tokenization (no database in Token Vault)
Tokenization
De- Tokenization
Database contains token
data, not actual data
TOKEN SERVICE ARCHITECTURE
1234-0913-6979-6919
1234-1234-1234-1238 1234-0913-6979-6919
Application receives token data
3
and stores to database (on
REST API Calls
prem or on cloud).
Entrust Token
Vault
WEB BASED TOKEN PROFILE SETUP
Delete the profile
Specify at the time profile is
created. Not allowed to
modify afterward.
Name of Key, an
alphanumeric string
Charset
Number of characters to be
preserved from left and right
hand side
GRANULAR TOKENIZATION GROUPING
REST API
➢ Different or same Admin for
Server
Token Profile for HR PDPA
Token Vault (unlimited Token Token Vault 2 (for branches)
HR Server
Vault)
Token Vault 3… Token Profile for micro loan
➢ Policy based token profile for Micro Loan Server
25
TOKENIZATION SECURITY
1. Token Access Token
◦ Token calls from application to be validated with access token
2. Communication Encryption
◦ Communication between client and token service is encrypted by TLS 1.2
3. Token Grouping
◦ Each Token Vault can be managed and accessed by assigned Administrators.
Administrators can only access own Token Vaults.
4. HSM Token Key Generation and Protection
◦ Token keys are generated and protected with FIPS 140-2 Level 3 HSM
◦ Tamper resistance HSM
◦ Comply to PCI-DSS needs (Requirement 3: Use of tamper resistant hardware module)
SECURING IDENTITY WITH ENTRUST
ENTRUST HIGH ASSURANCE IAM SOLUTION
Best-in-class Passwordless Access
Authentication suite
AI – driven
KBV Voice SMS Email Grid / eGrid PKI mobile smart Facial Biometric
Q&A OTP OTP OTP cardsT FIDO2 Credentials
FIDO2 Key credential + Identity
(aka “passkeys”)
Bluetooth proximity verification
FIDO2 Credentials
Good (aka “passkeys”)
User initiates Application issues User uses Application
• Device Identity and reputation
login security challenge biometrics to verifies signed • Device Certificate
to registered smart authenticate challenge and
device in proximity passkey. Passkey proximity of
(confirmed on mobile is used passkey device
via Bluetooth) to sign and send to log in user
back challenge
31
Mobile OTP token & Push Authentication
32
Push Authentication – additional feature
HIGH ASSURANCE
1/17/2025
34
INCREASED PRODUCTIVITY
Entrust IDaaS IAM – Consumer / Citizen / Workforce
36
Entrust Data Security
DATA
Logs Financial Data Healthcare Data PII Credit cards
Data VM Encryption
Tokenization 123 456 Tokenization & (On Prem/Cloud)
Detokenization
XXX XXX During submission:
Tokenize or Encrypt
Audio/
nShield KMS & HSM
Root Of Trust Network
fields/data
Video File Encryption Security
Decrypt/Detokenize during
Excel, CSV analysis:
E2EE for Call REST APIs, Vault
Mobile/Internet Banking
PKI – Public Key
Tokenization
Infrastructure/CA
Certificate Management:
Digital Certificate
Discover, Manage, Design,
Crypto Programming API
(Java, PKCS#11, OpenSSL, Multifactor Lifecycle Management Automate
MS CNG, nCore) Authentication
Multifactor Authentication:
Discover – Manage – Design – Automate Push Notification, Password
less Authentication, Based
Edge On Premise Cloud
Credentials Authentication
© Entrust Corporation