ࡱ> C>?@ABF MЈF8WJFIFHHDuckyC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222X^D !1AQq4ar26BSTUdt"b#$R.!1AQa"23SqR#$ ? vU5f5 #IjYw%:1e)~?'.vhƏ=`Qal|~;j4{WMl|~7j4{[jacOFoc0ؕƷ+k/)pZՎNxl"fD6*($(b Ņm-}/W[؋Hp:|3^m(;j}+I- U$ȉ( (}cok{n]J02@{y#r뻿i1to9ҩѩbMgtY+y0t{| }'һHomnA葨P$APYӯ^ C9pGOƹ-!n>,mHZƭD-4Sb1ڮ(+7xՕңp%W#Axp:TVI}4ȸ{OK2 QYJ}kKtJ-821Nk*2qW9oUҚ}Ό!PD^m%GM# R+SjQx_Z0}8G$گv/md?Ǹ.l=ݝxrc NR+ea52lx<6W:Rox G~|*5'g,pI-+"k´[ӷmø7bmsbRxw:D}U%.*`4XDH\AͼJ7J2WׯE?&nik+GF] z1Yk(@ jwXA39 T^,ʌVୢ0б1JFIFHH(Photoshop 3.08BIMHH8BIM8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM@@8BIM MsJFIFHH'File written by Adobe Photoshop 4.0Adobed            M"?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?u甁w Kj\%()>)AK_?4\w?(YIJ?86%JT GJ<hik?$|]Rj)KJZq'R'J.x%/Mʔ/(LA%>Z 5/4SJ[O4J5~))G-R~)})mR?G~T4yIKɢ;TQJT-oKyOIO9@R?ܔ JW}A0>|"R0i/Х P)nN'7IJR9=R>)~rt|k%iIKKvNxORR>MIwJJ^>M)$y<~)'ӿ )8BIM'File written by Adobe Photoshop 4.0Adobed            /"?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?98j" 8O萒$y"GdN%%+̦ݬj!1RS?$I!(t2{)ta-x)R8Hl1xi)`rp$O)JJe$s4䟽9%+9K$]☓$䏇τħ BII)`1ǒ״|{GRDJ "}H"R3Q4K$#ӺPq0>䔹*P;ɋ@75:ZۺmϚJVΝR䔦DI'N%%+a<(: urx$Ǵh}%<:M#ԋ L=Rۇe*ZGϺxi쒘{| y D|J@NJJcn){N }p=#˔#`[䒘 wÄq)V#%~i wIKmq大y-;30;> S @ ))D7@}< w$%'pAO꒘LĴ'$D)ĥ$$ -5t )t;ƪNXK{ǀ%1 q0Ttg'uD~)o %+ij|-y ˏD pO&LR_x?L?$|FK\IOƚ[rJZ׶)Z1ԏwPg_4@e%(?[ 7B~$cJQ `NcMR1||Sǀ&b8IKn N|#R }d%#׎t_TKIRٝ%5S_0Jb!r}F))iuM>Z Ɂ cJTKp4p )&~JY_:ۜt쒘|$x ӘJagR&S8IJ h"4&9'R>r|ꖑ"` IKq?FDLyBAx<IOѣۛ0tM2 }N]IN'\xn|RM@qɎi<$NwcL_4IJ qHcRƇO&"tR?4cY-ƿ4>22 m/[ 2Ӳg!5Ш9RR/w-:"&R\ J'YKi=,<AIKyqwJ[1#w$SZyR-sw@} R)Z&#]JJ?R$Gy Ξ=ILd`$ Ϛm|M!䒕7$ %8u%Ǎ|R|Sj΃ GJ[C)qܔ6$&uIJAƺh<3o?xO A,)&y)KGRx$ R'x'ǙNLqL ZϒJ_p?! Np4->RR;oHOvJyGER1' nm%*O)3)n=KP5{|RR IO< )_S@'_`| <;$@! 5SCtkiRfRR] ퟊}>) S )H#S)m2$kGJZ )g5CLiw%w<$mS@C){x<$DxOz(6))-KC!Gp>>IKѤ "|$5Rh쒙I4|S@N=>%.yN^M-M '%/ DKA $H>_p'NxIJk"#9vk☆,i@Hw0a%2&MS=M }${;'_%-vt4L^͏#HEx5iNJQt)6O$.' )a>|Q:%"{hXIO4=$Gp|CIL`?I>9`t)|S?7_4 1 )mS`h<$6󬤥 ۺp*P#^%/$3)Dw48R8JGHJb/L/G'_NF~ RO@S3䣬%28;~TASm2mdM-:% :J\Б '~$HSAۄofM08 BAD5h{oh=NBJ\d|fR$GmR$s L@8qӲJVAK;(y&>))qD2|S|ӆ IJ2F3?KӝFș%"&<%0Zri3' iD@&)!?BN(x&p'IKq')?*;G>)RA ?:N@hRR!1>Ik)'%/)>4道IJ;摟gDG 撕# 'َ;%=$ #A RRۜ{'dܞ`}< OI)k~0oy/RIO\l&?*q$EN?RD n`߳hz/ mGj~b=eP{l3WcIa5Uv$y@bp&uw;H~V«9wOiW=|~Zk=] !q>g-vLkEfbMxРEfĻUEnm6nl7Ix %,I3ޤ>Qy<Ԅ%)c ~v'%a8+䓐 CCG {bZ Ӿv~qG.'RX8HT5 kb^Ky/$JQĿ۫1w ﯕuXT>᫏IFC%OQȄrc7m'{Z<1jT!4Oc2XuUpx?\F;l 5w(n&n pn;T⋃ ln9|,9?NzN8BIrTwup,"l!t|S+KZֆ*$=hs&,D^68;ggzLb-5i:K]_X0;й..or9P>(Ȫ}5vfn_(cnc,ܗ=ū.yjuċncl:WM)aV 썝ݎF7c u4k "]!D) ylw.,}]o80l1C. vW"7oh}Q<͵k>31WC&B8}0HۚtF-,6]%{$3qeBY,ž74gF%ݨ;~o}l[]6Nf ubs)28-U]1X{!;]tpۋo7#qIF7i\4|~;}v2lVOǷ:kΕZkBm--zkJ.дh҃J J<[Ҵ- JhZVEb[\^JҴ(0-#Dž =-w%696Vۻ EEEEEEWfnww= w?;2.(̢2':ޏ[~_ah>Kik_ŨᰖwcEW7Wܸ#IQJgcUsTUl NQG򗔫J*|_⃩TEjԨZr.Jfz9\e%bfZBtd`Eו4+H|{y\;Eږ-C}W_ >|璔ǰNj&y cU~z?]3@vtLs-BT|_Rh:Zbyi 5<|UH%UΔ%s V8֋PZqUZ|_WUUTJԪ6ζ?q?뽘(hERкw7 Mgt<cUгբ^ɲaCITjU2yo)>AKTT.zld$0׎+AQiZGU7Ԫpj  4hZ sM(B?e >"8KwGxQS*hR:r/"cjH-ƂGMLzCNfFˋpkxv=!\[t7 ƄF|o fi?σڅTȺT%8[E쬳?v`;l+fɚ6M4Z5Bcn`AD'y6'd߯rHW mȘyo)SI&4d;Fo9|PVaQڥ!:I^Hw(uA+}ryDHn79e7֏|s1@arUow$p~jJP)\)bЅrw(bTm1EIwr =;(qG9-i0+i 9WjJc9sª胅\ ]SA@M0bYNSr87`.=MG3y(;YXA%0Y$i!Y!@ Xրg0YaS|\t}b{>gXbgPaP䧈xeLn6TLB.t@ =9FE{B]Cd"@n'1hv(=*8[ӓ~}X(!PG3 > oOI,!`".3 Q)yvFq-M @ BH/3j6;c"P,+NӗWBçs@nN=(KRw4W)eTrrEF^4&P0L5:fH3:. MD ed=P J|2E7] !GP {L'zN rA'{:Jq~I;"/R4Le {BY8?t"pB$ͫ@ S.]CY:yP  s0b 8:'>aB`X<9O`V#e@ Q'BUԹf$>CU =Y"*訸)) p+ Og& "I"PnVLHPpux)f1:`ZbgIU!#}0L%Avi;Ӗ]KxT98m #pg*[FB3W[|V곙Hf:l) *P =PE9]s Psn~[29ܮlM!Q% ԩŲhT[&JC8Lɘa.r%C&vfs9,rDʈTQҊ)&JwktFnQEOBU'B")X `U.K !%4bTfd=J) t@( CgCm^&PD+PRp$ Ð7څe8\H(R`*e=k5tB`~F( *I&Q1P2I%)z6g7WqĺTPY n6`5{o9j$9@atУF!U%[4\J!N8foIN_ #O`g yAPlVnlVM 8i<0ή-Kw"եV27D#{S9y$~lEVhVQ"cVƕ|؛ta.=yȖbjvVnU ;>;cU8˦0.c%2o cPPLGd%sJ<{{cY&F݊.b8Sw'F[:^,H

O~GO'4~e;x$ ѲDLʉ <&`,?t(8sk#[hII'@C~.wZ؍]3,ܨXṪ+v1e.Д\5YPLΙ`7?e=7EW;`Z,uYBZ00g 3j?kHW03ꋷ{pԿ|Qp G N'. -?"Q_+CWc~rˋ E5~*R݋v\?xwcn3N5Ώ~䏩~H~䏩~H~䏩~H1$ģJDd.xcCV|\jJH;q C@`½s/ XRG>P֣;;g%ycOdeKq3 >YBY3:UQ+@. kRNX7ENv.YttD+[~L&5r8[ /X5gD*xq_"gL,}t) `c!F YQHoa2퇱} NgBĔ ;&=~Qxt<ϡG ֠ @3l?H!Bb@Zg!2Y+ML/1c.E:&jJLCI;!f)X,E>+8n+?aQy,ՊRK{g!GE/ms_'<:O1_FԼ м^.cZT0>-[daBn m,fR҆slPȧz%0Ts_ *8G$G! w|T%QP8FBVzfi HT_tc"k4cɘ>JjG!⓺LhVl N-9u>e<=t%hA zj/kBZ:BAQcz\ -v"NYrT@% 9eآ b[8YWgٖb**t\:DR ¾%uI]P \a3>'vaf|fOznT/YRɱX8pnLf²:ž auV&=Rv)4=g{ǠYɫLg*?wF =U-2Bk [/h\Ͽ1}*;/JiD6  z+,OxLNw\U0a N٦& zEoplM1LNrBy`S} r=lv"ǾgZ,>/MJo[ C딽]INf^Co%J\A-鯭X唩yDe?rq ݹ':?Xiѯ??!GEXoj'_vWoiBŜ" I]n}) RlR;frwIp8575rҕՓTvy1ä a@b8ϤJclЄ^O}s)jv{zxVU4Czg<-9ϧ15@xLJ N_mvlBvZv.0oFe5s蕨%.P K Ύ :GH_OLlf :Ϣxe.pKдLYVJpwC{0b@k\}⍤%TzB3_Vө^*z[)o@Qx4_T}C/C/+h*%KL71 ~>V[>D7Z ӟ00*}`WeeOq7ۻ 'H.#Hhw+Gpm|tBZ.Xy,{|+٤S'XDz;04 +G NbeHO?C a|`rQz洛̲ ƎngаsԾKXL٘$@S Xh* Qm,F{HbQ`w\?޵ f O`H:R@X;q1P(TcTߎ4 yۛ;L*Bp7ʬ8Z2gs'C+ yrIiM` +d6ZJ TTé+U Ī* Yـ$B\t:.壶 :uS}>$a*1$ #LJ{!+ RG!Uhpy]]ip+"n 9+1x 0 SqU+L}UoP<͊d[0 ,ۀjE5Mjc"Fc[Q0A aNJᩗCSʂ^PUj/9\ht ]3Vt ֛eUP \7sAN[h*]m e*A03yj@Bc/̺kcYKRLˡ\-@cg,q>R!LQ$!cu]1 $Z͑a%pYngb fPEHU;WPҸN %uAN`{em gz8sd:jQ q;pxwܲ1Sŭ"@  W­;qVhѢa4*o8oE XEdp*VUXpYhr-Qr$*@[WB.՗+ *`-W&%;+Kb+&t4-V7(YC@ܦ_KF_Au`[P-E5\IWK`kUoѮb}#qẝSu3dV>JdSQC+>!d0 ȝ-ȁt0㣼>ٙ-C^`,BZ`^Azs..,U3p!(CArd!~Wac;ݜG:ЋsJydP܄y]bnT [F)cf_QH8 uFf}h]yi -YƅhWuu.7:ø_6]wA\. iQgζꥹl8af,ox9(JJ*TK0-( À-gK Nw+W@OT,G&ChzzYV/,Зࣔ{ fh]6x@$霕.-z["7xu=ON,%ҵüfVq7Niݷz}Nm31mso[ns5mMQyw8"5]0i+P4m9Y2 /ҾīY?6K|Kz}y^/L{=7z,kLsw*F­9;Ψ<]79^>e-f(nijU-&}5a~ k߼PFG2x(PrNvf_؆u/LOʟ|~PkO=_EQ%ݾw" Ϳ0OJne7۳I:B㟻Kѽ<\s"і68_jg-}!r/~k+gfʪx[J1>gy?4p=pveg|OFJv wU;>qo"zP↜8juƇ tV:75敫^?ZW;TYA Ps[kBu…I#+5xֱ/-Ƴ뽿Hy?j7#uV!lj5pfD*W J @a*`8H Uף] ܇ә6oF摭;v*5_oqY1V.P=~cvHvUdՙO݈ãO~[͹2m3%pQ؎?2ßlm@)ɞ ,Z)S[^6 YO 3}`kBκ|;]y'ܿ }%.`X9܎v CV΋~f ey;= c,7S,T躾@>wU=ޑ˺ye57zҫ UNSzή1Gw^_iwwޠFp`!\$`dlkhvd1$*g*$xڭ{tǶI=B{\/RZ(Z@qw+B=@sy[Y57=dHpq #aS$0A?W% oķnj>}׌_ŷ>۰D0yPVTw7lQčsuNP_ysבx^_dX%!Yc^ֆ̪*RP* F0W%ʹꙻ.j{9fwj:m |ΆA^꾽jݨ6ڹj~=$P0Y @{_PJnɅ\g*ٿ V{Yq'EwHĸ}#":;7s w@ wh͵_6k!b&2! ] \RH*CrDH#AF6Gt[C D(/A1+6@K]W x=ff- NpBZ#]~w_qTK5уuFt]OuSc7O߁\ d{!2PPυz"AFw! ` uB-RحЗj}ȭ[K?ͭ#qLwtKtSHp tY7OruN7Su?$n`'iiv~hGv>dͶ^b`Q6n0pQo%jvn~ڞhTNFsU3HsjjhuT].B Pt[7MJ7J~p}dh-3@ d4 ! d_)K@MN`y 2K_^2Ԓס J^^!oCWK -{h$2) -Fo#r.r(S%/ls+PXװP!z<=]]Q] ZǕѮ,thC\UmMz֥Gl6m :жml{c;Ѽ =kӛ^0m/gfbX36"|GGo%݋3ݨ%:hMⴖ.@NKs`F#!S rMuBDc?3y>}޾jֈXx\`QfhƮ]Ou)18Lwhׯ=a?-;^ϧ}Qؗ|SO`8 sX*~Ř!At,Q*H(#@I\iU'0+muRRLs1s,O|8lkuo5oEyoSG,9QRX̓R^Eᶊ tRǭ\ <7 I򩽬.㬃mřw5NxGM?f6_0 m왡?;s%7YR{%WXy; %2ݹ7873ӎ4-SiULG'x) JkI?fYCocJcMÎ"c(+h*F k>`Mo `}6d?l4,sq0>M))ɻ¼j[ [OZIIk)MQ^ח4yj%9)E9Qu~~T;uvQg+u:X:jlvW-cMݏʹ/XWp,KDz4EC\MT.4c$Ma~!-!y]{_S/vl_ɖclx5$Oʋ B'A" #xV4+e/=uwywvzw-pGTwsOn͚Dş\("ڐFk"3{XoΪVo,tb7=;-FhB-6*qh}v v0,ѓ7Mv͖dYm~̶YF@SW4GߙK9Fb{œUJ70Y˦,hr&f S njI.cUjZ;k:⺮  5zvE,ښpI<"g5lz,/}MjWviv/-lOВ -g -mmc~GG;ϲ2on߲+RYE*.rb+/긪%sb(&&VWFtU@qw<"x4x^>f@| A~62)[̅b9~hq!;<߃1}dxE_WY?7my3??n?y)П"O%"ćDpPQ48 ]NaX߉U2V, ŏVE.zݱ-D _V0Q3ȍwΌ g")WT Fpe&WIq5:m$VfbBlpmoM@,*c+=\@Ns}#fb&ޣex>c]Ft]E Lr!Tx~o׶m+ӶmFI, o{cvnmbNMXZxIی_LOf;W?>| 7y5ӊW[0$awL|JǧP>ACKeUvHUU8/"y*3R<*?`d5XWe,?.]) [e>_cemMVd ?/$2zLt9^.n :zfצ+7`6Ql ^Vm^lzqX&o%%&Boc8&'z|NG|VZM~-V[_,Iۛ!8GN^ĤLR^y笶byy0G:<:sws>}g8@s3q|sa^kG相3 i~\6+ɅelYΙ ق%Ûvnbji糸vs#3c̷#Yڦ93.w{6,_j|`$[ ^)JK ?m u!^+Yt]>M/G瞮nZR鄮hk6V{vtzKuuq7TWqtc7Nwtu_7YqSL7Mt?߱=q:-ҹa.tEBot] 'B53Ӌ^yfȨ:cƈMPP T-Z#P}_Pdz);H! +*HBD ʪ좖+*$D4QEuQ9yUH>Js)g 4n&<".ɚ<r:#O.hK6g\bt Dr;S$D 4(#B_1sp_"1ώ`30aEu,*sQ>V2bdn-C# ZɏT|ʇn'͒- Z9mf9mK]6ɵ87}8~W y]3I K.ˠN˧jR]Q5͕P߻R[WVutѪ*]W]SR~د W `u>>yΓmy6mEFHe3O6XrVp/Ew_TÚ6)ۢ q{ {k,Z ;'bYQݝ-΋I hwe6}S~A|t"ȼ ev2| HC ѥVƥU'ikN;$ߣ`LdfywG9Zld},Bi)CʹPB.Rr ;j9PG.X uoP]v;f!WCF\*Bj9=!Yesȉd 8 $A}va~>7KMSԯ+|Z޿Q_.Ѳ"~%c|WYwăĶ{"~Gʺ~lgN~]%O >FC?O ^ DY]?z?Jzy<^XzxA`^ujs]ܧU}ns׿@^5şT>Yxe \0w3W5Z5 ofXd,ʘ"&)b$& +J1"-%A u_\YЏ <.@V/z QR!:u> \XVDߛ^sʍG[{(`{"B,ˊ~;bF{*kdՏ0 ۧ3}aPr9=N' ˟::{#w\ڕl=7(È]piu_/ߐ1 >@ j0T#!\dS !j2$U1͇j1b9b5bb3oó nHN PSw6b. .T݂xc~ __T[̯b,ƘM *u"Y#^%Nb^*Ţ^("+@▚%!j9hߩGK$D[W357U3-n⤉L~L&5ƤL5Dy@D r'<әEiمo=jٛ/?r(Gj?8j?ߍ]]5D]>J]}VuY^VF'yfuPy@^q)Y׆ H3iQxuu7QxuUV 'ߢ^}?+pODv/(PGQMBy'jj oFzj$i8/sA< ۞Gˊ⭼J,>0s5OYN0x*CMAGsy%unuvA M0=KC3b9ΜeiibN"ϓ,\a }IbfN9sa-ҎZ9BWtz~W'O'ypi}Y}qEA[l~? t2{tB~@Ӓyq\D߲%4^ 1+nb tXwBڕK)Eo]}dҧ!Vl!zfm(=e?a "-m5|WAێ6ɶklVsli:Fб6tIHT,f%;# "oEr%NrĬ#|Id9MN'w,7L3 p49mbhYӐ7hZS&0U)]ׅ~F7t? :J{OE?$-eRW!奈^O$B az<ɥɨ;9I[$ ҽHBb&>o"i [? ŵ&tRy Б{]Y(R]n5v]ݘ^#ݒmi"ӑ.4{IsMӛ8>&5pί/z}h=꟨S m.B!}/ ?2%^fa_0VKF8+.K"bY.JRQON Wh^}_GwSOQIY>!EVae=]`d{VYvfѲ+J^A%1Ea *q8,rFiJV?2>ڬ0/h*b)r,؞c~("Km `^-`NflG D[LFtHHd MJ$oM0&&4_Ahֳ@{zt(x-n==ai0dx JK<+m\4;; 6L#AІNt $c 탪aЄ%MY6߄ Xe_ݧ>+yi|9נtHQ{$&ll ~"X%w60a& P: GY)rv61V{n&5nI bHNGҴE۸䴓s qɏ4Cn9經[nyD"JR6qI>In Hm8Hba/b[ykHQXI`)I,\BO?7c-"R2ۭ :2m!_,aIUww/I $-&ѢZֽ\Uc_>+7}Ƴn:c>eֲEnj+dv`7 srgXb2Uunbp4=OE`G""<%+?#O! hWd)E9K~`CIuPG÷ imcg`3`=X&|6 fkXC*!,/|A=u_Vc\$;yXݡ[ɭFTd%b ;CfNޑ)h]K:Ս36:=]rÕ`\+vub\/?P<,&20ՂYK;,f`k<n uvK3k؃>9D>Wo< <zK]|6>t}ܜҗDH<@;hTjXe[D(=EՓM=!2J겮n]"6M8( / 0DTimes New Roman(0(:A 0 DTahomaew Roman(0(:A 0 " DArialew Roman(0(:A 0 0DWingdingsRoman(0(:A 0 @DArial Blackman(0(:A 0 "PDSymbollackman(0(:A 0  C0.  @n?" dd@  @@`` :28 #// 8" & 8! 5210 ,8!&+U*X$ 7&)}E.E}+ ;^^eyy"M$' $;N 35$[6?13N32/#-+ &9$#$#$9"%D$(_3:)C)%'v1H9#)"*9'+''B"'*<5+-5C*Og|F@%+P#". !" R$MЈF8W R$T*QQ>1 $$$R$<#<544"$$$$$$$$$$2$`dlkhvdd$ W 3RAd @A5%"  fff@8`a mʚ;ro9ʚ;g4JdJd@:A 0,ppp@ <4ddddl$ 0,x<4ddl$ 0,x<4BdBdl$ 0,xg4TdTd@:A 0*p] pp0___PPT10 v___PPT9XP? ,O =E _  qSecurity Drivers WIT Infrastructure Challenges   Strategies Simplify and strengthen authentication by replacing weak passwords with SecureBadge. Automate access decisions based on business information and distribute enforcement. Provide the same, appropriate information and application access experience to all users inside and outside the perimeter. Create virtual networks to isolate critical business components from general network traffic. Protect individual users, devices, applications and networks from attack by moving access enforcement down to the end systems.lZSSimplify and strengthen authentication by replacing weak passwords with SecureBadgeT" T Replace password use on all authentication systems with SecureBadge. Smart card containing several certificates SecureBadge will contain all the necessary credentials for identification, authentication and the generation of one time passwords. Including Web Single Sign On (WSSO), Win2K/ActiveDirectory access, and remote access Our application developers will use WSSO Partners/customers/suppliers will Authenticate locally Send credentials (SAML assertions, X.509 certificates)EZ+ZZZ"ZLZE+"L  Authentication FlowU2. Automate access decisions based on business information and distribute enforcementVV Information will drive decisions about people, devices and relationships Access Assignment  Privileges, encapsulated in roles, are automatically assigned based on a principal s attributes. Decision Enforcement  Target application and data attributes, principal roles, and general access rules will contribute to access decisions that will drive discrete access controls. Policy decisions will be made using XACML (eXtended Access Control Markup Language) and recorded in LDAP accessible directories. Policy decisions will be communicated to enforcement mechanisms using SAML assertions. Administration Delegation  Access decisions will be delegated to information owners via management tools and SAML assertions.VI,I,&Authorization Flow |3. Provide the same, appropriate information and application access experience to all users inside and outside the perimeter}} Provide a common access method independent of location Distinct access level, dependent on role Application gateways for user access Preferred access method Targeted for partners, customers, suppliers and most internal users Built using web portals, terminal servers, etc. VPNs for administrative access Targeted for administrators, problem management, etc Secure full network accessl`%P`%P  Application Access_4. Create virtual networks to isolate critical business components from general network traffic`` Partition the network by service type and criticality to prevent attacks on weak devices from taking down entire infrastructure. Secure enforceable rate control for specific services and protocols. Partition the network by organization, project or geography to protect different user communities from each other. Multiple internal network partitions focused on task based boundaries.TZEZsZGZEsGNetwork Partitioning by Service5. Protect individual users, devices, applications and networks from attack by moving access enforcement down to the end systems Devices are highly mobile and must be able to protect themselves. This requires: Hardening the security of end user devices and infrastructure components Improved device firewalls, file/disk encryption Improved software solutions and new hardware platform designs NGSCB  Next Generation Secure Computing Base Application and infrastructure servers require additional protection and isolation. NSA NetTop type application architecture Application specific (e.g. web services) firewalls Policy driven encryptionQPIP0P>P.PTPuPQI0>.  T  u  Application Access & Hardening^ Challenges8Reliance on SecureBadge will impact user if badge is lost or damaged. Acceptance of partner/supplier/customer credentials increases threat exposure. Network partitioning will add complexity and may shut down applications which expect full access to all IP based services. End to end encryption challenges some current policies and designs which inspect and block content. Protecting end devices may hamper central device management and operational support. Automating and distributing access decisions will cause additional work for application and information owners.9Z9s+Policy Driven Security Service Architecture,,  ZPolicy Decision and Enforcement ^ Application or Server Protection oClient or Device Protection KNetwork Protection 8Cryptographic Services [Audit and Assessment Services BteloVC0 r/#beijkpo ` TTr-[` TTrh-[ʬ` 333MMM` TTr8r-[` TTrQ[-[պ` TTrTz<7Fӥ` TTr4eXQƄΗ>?" dd@$~?" Zd@@d @F@@<`@2 n?" dd@   @@``PR    @ ` ` p>>  jkbk""j(  eT G  "GV\   "   60e0e     ?BCDE@FJ  5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||Y   #"$@`S"T  S BCDEdF.@&GshV #.9@Rdv~\B$ @        `"b_`   0e0e     ?BCDEF@ 2@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||"" 'nHDi7nfK5$<Da-OBWb~f 3uYVF3 @          S"8^   0e0e     ?BCDEtF4 @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| 1KgeM, "+.=Lgl|WG6@         S" ~   0e0e     ?BCHDEDF& @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||cK$.7< AH$E1BC5W*kc@     `S"UH    0e0e     ?BCDEFB yd@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||&&xlR08AVfvhF3# .;HCVi+~Opn]H3  @            `S"V    0e0e     ?BClDEF> @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||##  2 p Fk,5>BJRdhl}ikeYaEU&ME52/_=H>1?0B$;4 $  @           `S"%F    >0e0e     ?BCDEFF @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||))* !L'r6Edu,Mn}bz>hT@ {* $@             `S"     60e0e     ?BCDEFB @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||((& *7BZ#r1HYj~ ?ewrM(wNV0D2 2& @             `S"F \    0e0e     ?BCDE|F6 @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| -5BRWo %@GUcsyyf0~iFq3M <)  @          `S"Wb :   0e0e     ?BCDEdF. d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| AEia};en5o6{"J @        `S" N   0e0e     ?BCdDEF: d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||""E<'41 *# 1R u+0 5h/0106<P}Wn^]b>cdc]WcDE<@           `S" DA    0e0e     ?BCHDELF$ @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||C;@Thp{ /{7q?nDZFFH#EC@      S"] w    0e0e     ?BC[DEXF* yd@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||E? =3))Rd v|'PA=K*U[Z YKE@       `S" f   v0e0e     ?BCDEFR d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||44VcW~=#zn^:PUB1&0 `@w15?97,I/[2~>GPaeiHhb\Hz>?4&&u&3;CIV&(@                 `S" :f   0e0e     ?BtCbDE|F4 @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||/<$g J_t tttt(b,P0'123159bFHM.Tb_\J8@          S"f6   0e0e     ?B>CDEtF6 y@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| '{zZG4  '25 8>"// <JYhlQJ9(@         `S""4`^   0e0e     ?B|CDEtF4 d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||Vs]G-*L_r|zx#^.P3B838#<@AKUhxf@         S"U #.   0e0e     ?B CEDEpF2 d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||T A (  #+(3Q8z=ED9C<2(  t6] g T @         `S"R]  S FBCxDEF:@"".Cq&;EOT Z`dinxxxtldT^H-<-'l!H+2'# @           `"Qj2  S ^B CDEFB@&& 3?dK+STUOFE;b.   - <8K\S`mQTydZP PE:'  @            `"h8V   0e0e     ?BCsDEF> d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||## k8*3<ABCL;397468?EKX ]bc6fVisok3TPKmBmAw6+ @           `S"Xc\ Y  "G   H0e0e     ?BCHDEFN @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||11gv  q ?w  (Qz<BH5`3-13363/0N1<f<<L50+q#*'$!^ $(@                `S"h  s 0e0e     ?B_ C<DEFf @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||AAQ <  $ (@ -2H<<<M40,W$$$!,-5.*1'$d&'7($ !L~6 zUZ(w4 x Y  C O  $ _ [ Q 04@                     `S"_   N0e0e     ?BC>DEFJ @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||,,e')**-0:<5>^=95I-$#!(`  0  + z>'d !$%e'"$@              `S"Y  6d "`@  T Click to edit Master title style! !$  0 "  RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S   6 " `  ^*C ! 6\ "    `*C " 6D "    `*Cl  TA޽h ?SUMTEXTB TTr-[80___PPT10.,% :Sumi painting design template\  \[m[(  VT   "m   60e0e     ?BCDE@FJ  5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||Y   #"$@`S"T  S BCDEdF.@&GshV #.9@Rdv~\B$ @        `"b_`   0e0e     ?BCDEF@ 2@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||"" 'nHDi7nfK5$<Da-OBWb~f 3uYVF3 @          S"8^   0e0e     ?BCDEtF4 @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| 1KgeM, "+.=Lgl|WG6@         S" ~   0e0e     ?BCHDEDF& @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||cK$.7< AH$E1BC5W*kc@     `S"UH   0e0e     ?BCDEFB yd@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||&&xlR08AVfvhF3# .;HCVi+~Opn]H3  @            `S"V    0e0e     ?BClDEF> @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||##  2 p Fk,5>BJRdhl}ikeYaEU&ME52/_=H>1?0B$;4 $  @           `S"%F    >0e0e     ?BCDEFF @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||))* !L'r6Edu,Mn}bz>hT@ {* $@             `S"     60e0e     ?BCDEFB @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||((& *7BZ#r1HYj~ ?ewrM(wNV0D2 2& @             `S"F \    0e0e     ?BCDE|F6 @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| -5BRWo %@GUcsyyf0~iFq3M <)  @          `S"Wb :    0e0e     ?BCDEdF. d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| AEia};en5o6{"J @        `S" N   0e0e     ?BCdDEF: d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||""E<'41 *# 1R u+0 5h/0106<P}Wn^]b>cdc]WcDE<@           `S" DA    0e0e     ?BCHDELF$ @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||C;@Thp{ /{7q?nDZFFH#EC@      S"] w    0e0e     ?BC[DEXF* yd@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||E? =3))Rd v|'PA=K*U[Z YKE@       `S" f   v0e0e     ?BCDEFR d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||44VcW~=#zn^:PUB1&0 `@w15?97,I/[2~>GPaeiHhb\Hz>?4&&u&3;CIV&(@                 `S" :f   0e0e     ?BtCbDE|F4 @ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||/<$g J_t tttt(b,P0'123159bFHM.Tb_\J8@          S"f6   0e0e     ?B>CDEtF6 y@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E|| '{zZG4  '25 8>"// <JYhlQJ9(@         `S""4`^   0e0e     ?B|CDEtF4 d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||Vs]G-*L_r|zx#^.P3B838#<@AKUhxf@         S"U #.   0e0e     ?B CEDEpF2 d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||T A (  #+(3Q8z=ED9C<2(  t6] g T @         `S"R]  S FBCxDEF:@"".Cq&;EOT Z`dinxxxtldT^H-<-'l!H+2'# @           `"Qj2  S ^B CDEFB@&& 3?dK+STUOFE;b.   - <8K\S`mQTydZP PE:'  @            `"h8V   0e0e     ?BCsDEF> d@ 5% 8c8c     ?1 d0u0@Ty2 NP'p<'pA)BCD|E||## k8*3<ABCL;397468?EKX ]bc6fVisok3TPKmBmAw6+ @           `S"Xc  6Xf  "p f  T Click to edit Master title style! !  0[f  " ` p f  W#Click to edit Master subtitle style$ $  6|`f  "`` f  ^*C  6df  "`  f  `*C  6hf  "`  f  `*Cl  TA޽h ?SUMTEXTB TTr-[80___PPT10.,%H 0 @0X(  0 0 N r gg P#  r  ~*0 D""DDdd 0 NP'r gg  # r  *0 D""DDddd 0 c $ ? ;  r 4 0 N*r gg  @ r  RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S 0 T4r gg P  r  ~*0 D""DDdd 0 T8r gg   r  *0 D""DDddH 0 0޽h9 ? ̙3380___PPT10.sX  P(    Nr gg P#  r  ~*0 D""DDdd  N?r gg  # r  *0 D""DDdd  Tr gg P  r  ~*0 D""DDdd  Tr gg   r  *0 D""DDddH  0޽h9 ? ̙3380___PPT10.?  V(    <  9Doing the Time Warp. Again. Security Directions at Boeing<:60(0  <  P p EStephen T. Whitlock IT Security Architect stephen.whitlock@boeing.comLF( H  0޽h ? 33ff̙y___PPT10Y+D=' = @B +      n (  ~  s *tT`@     Ta`GH3f @S" `? P  f(Static, long term business relationships")0)r  Zf/GI3fd @S" `? P ` f& Dynamic, global business partnerships$'0'   The`GH @S" `? P  r4Assets protected by perimeters from external threats"5059r   Z`o/GId @S" `? P `  I Internal and external threats amplified by cross enterprise requirements$J0J+   TPs`GH3 @S" `? P  CTraditional computing environment used by an office based workforce"D0D(r   Zt/GI3d @S" `? P `  x8 Mobile and wireless devices used by a virtual workforce$9090   T{`GH3 @S" `? P  HData relies on operating system controls and applications for protection"I0I2r  Z|/GI3d @S" `? P ` B Data exposed by XML, web services and grid computing environments$C0C@8   P`  T`GH333 @S" `?   BTHEN"0r  Z|/GI333d @S" `?  D NOW$0H  0޽h ? 3f{FEɄ___PPT10i.dF`+D=' = @B +  p$(    B\  @  fG{H|I{>  *B  @   8/EPFPQFUVW2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `0  L Applications$ 0  B !  ff @1" `   DData$0 l " 6"`p`PpB #@   xEFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 'I>G< (  p p c $   x p c $0p 6  H p 0޽h ? 3f{FEɄ___PPT10i.Z=+D=' = @B +$!  ; 3 tw(  t" t@ # lDG @ " ``p UBoeing 2033" t@  fE @ " `P0  I Partner A$ 0 33~ t s *M`@   b t@  `GIv2 @"   B t@ S EFFQFUVWvd @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 'I>G< ;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"  *B tB  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"   *B tB  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" F c *" tB  flW @ " `0 @  M Application B$033B tB  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" 6 @S B tB  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"  @ B tB  vEPFPQFUVWvd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver"  pc ~ t@ Hv2 @" `P` ~ t@ Hv2 @" ` `P " t@ Z\G7Hd @ " `  LPartners, Customers, and suppliers authenticate locally and send credentials"M0MR t@  `Gy Hvd @"  P ` R t@  `Gy Hvd @" P `  t@ Z@aGH%d @ " ` ` t6Boeing employees use X.509 enabled SecureBadge and PIN"707 t@ ZleGHd @ " ``@` p External credentials: First choice  SAML assertions Alternative  X.509 Certificates"V0VH t 0޽h ?O@tttt 3f{FEɄ___PPT10i.V+D=' = @B +   xD(  x x c $o`   ~ x s *+d  H x 0޽h ? 3f{FEɄ___PPT10i.Ze-+D=' = @B +  D< (  x  c $y`p   R  s *3>  R  s *3>P P l R @ s *3>  "  T$r @" `p a!Principal Name and Access Request$"0""  T @" `@ `  WResource or Application$0R  s *)0 0 F     p -"    `H| @ " `  #Policy Decision Point XACML EngineH$033 fB   6D) "    ` @ " `   XPolicy Enforcement Point$0   <X0  BSAML"0  <8 P L  BSAML"0  <؏0 l BLDAP"0|F  t   D Z  s *)` ` T  c $) ` h2  s *"`D t   <d   CXACML"0  <  CX.509"0B  Zf @" ` P  OPolicy or Rules$0B  Z @" `^ "  K Environment$ 0 B  Zpf @" `0  NPrincipal Data$0!B  Z @" `   %Target (Resource or Application) DataH&0H  0޽h ?o      ̙33y___PPT10Y+D=' = @B +   D(    c $    ~  s *@n   H  0޽h ? 3f{FEɄ___PPT10i.ZC+D=' = @B +#  ""0 !"(  "  @  f @ " ` C M Application A$033" !@  f @ " `P@  M Application B$033~  s *4`@   b @  fGIv2 @" p b @  `GIvd @" p B @ # EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" # @*B @ # EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"  *B  @ # EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"  *~  @ H3fv2 @" ` B  @ # EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" @s B  @ # EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" @# @ ~ @ Hv2 @" `p@ B @ c EFFQFUVWvd @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< QVUVWvd @KKRGOIGIv3v9C RHp3+7p3|9|E|9|E+7p3+7k&v<&v @  `G5HIJd @ " ` 0 0 g)User level access via application gateway"*0* @  `G,Hd @ " `  WInternal user workstation"0~ @ Hv2 @" `@~ @ H3fv2 @" `p    @  `GEHmd @ " `p`0 m-Admin level access via administrative gateway$.0.R @  fGy Hvd @" 0  R @  fGy Hvd @" p0R @  fGy Hvd @" pP@0R @  fGy Hvd @" 0 P@ B @ c EFFQFUVWvd @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< ` H"0 2 B B9\ 1"`N6 H"0 2 B B\=\ 1"`c@ H"0 2 B B8A\ 1"`cZ H"0 2  HD\ 1"`  R H"0 2  HG\ 1"`W z  H"0 2  H4K\ 1"`   H"0 2  HI\ 1"`   H"0 2  HtQ\ 1"`   H"0 2  HT\ 1"` c  H"0 2  HX\ 1"`   H"0 2  H0\\ 1"`  H"0 2  H_\ 1"`   H"0 2  Hc\ 1"` d , H"0 2   Hf\ fԔ"` t  H"0 2 ! H\j\ fԔ"`   H"0 2 "B Bm\ 1"`   H"0 X # 6q\  nSecurity Service Levels for: Network Control Voice over IP High Priority Special Projects General Purpose`0 2R1 2g Q x $ BG4Hb3f3fԔ"`@~ % 0ZfS"`?@ p x & 0fC"?  ~ ' 0Zf3fS"`?0 @~ ( 0fS"`? 00 ~ ) 0LfS"`?P`x * 0fC"? @P x + s *fS"`? 0`r , s *f3fC"? ``x - 0Zf3fC"? p0 ` . s *"`@@~ / s *y\ `@  \   0 <({\ f @" `` 0 XPartners/Customers/Suppliers 0 1 H\ 2 @" P  CGeneral 0x 2 s *fS"`?0~ 3 0ZfS"`?   4 H\ 2 @" `p E Perimeter 0  5 B0\ 2 @" ` F B  NNetwork Management 0 6 H\ 2 @" `f  G Data Center 0  7 H\ 2 @"  P  @VOIP 0 8 BP\ 2 @" ` PP  XHighly Reliable Applications 0 9 0 \ "` 0r bNetworks are logically partitioned. Many logical networks share a common physical infrastructure. .c0 2a}B : C  \ EFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G<  S  p\ EFFQFUVWvd @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 'I>G< 'I>G< 'I>G< 'I>G< ;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"  *B  @  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower"  *B  @  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" F c *x  @ B3fv2 @" `s"  @  fP\  @ " `P@  M Application B$033B  @  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" @6 S B @  EF$QVUVWvd @ ##0*`T`T-`TK>;`TJ)`T`T-r9`Tr9r9r9BDr9`T} 4 4 } } }44}}}:4:4}}:@ `@@@@@ 0*`T`T-`TK>;`TJ)`T`T- XSxitower" @  x @ Bv2 @" `ps  B @ S EFFQFUVWvd @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< QVUVWvd @KKRGOIGIv3v9C RHp3+7p3|9|E|9|E+7p3+7k&v<&v'I>G< ĥGČHq}d @" `  <^ p  YPolicy Enforcement Services"0  <^  L' a!Application And Server Protection$"0"  <^     RNetwork Protection$0  <,^ o g xw  WClient Protection Suite$0  <X!^ p \Supporting Security Services$0  # lFGGHq}d @" `@@  # lf7}GpHq}d @" `pr  <&^  l  ]Assessment And Audit Services$0  < +^  ^Ubiquitous Encryption Services$0  <H/^ %} QIdentity Management"0  <4^ ) %  OPolicy Management"0H  0޽h ? TTr-[___PPT10i.B<]+D=' = @B +)  (()*'(  ~  s *<^ `@  ^  B  T2^ f @" ` p  L Policy Store$ 0 p  HG HI fԔ: JB  T@^  @" `   XDynamic Data Feeds: Principal Attributes, HR Data, Roles, Env, etc. Resource information"Y0Y :IB  T|E^  @" `   WStatic Data: Principal Identities, Corp. Policy, Contracts, Business and Legal Req, etc"X0X O#B  TJ^  @" ` @ SExternal Policies: Partners, Customers, Suppliers, Government, Legal and Regulatory"T0T j  BGHIfԔ8  d"  @ <H IcfԔ d"   <HIVfԔ ( d   <GGHFIGfԔ@ h   0O^  p RAccess Decisions&0(2j  BZGHIfԔ@ x8  0T^ P F ~Redirected Access RequestsH0(2 *B @   lY^ /EPFPQFUVW2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `0] L Applications$ 0 B  Z^^ f @" `0 0`  DData$0d  <GHpIf3Ԕ^"  6H`Isf3ԔV@  0db^ 0`  QAccess Requests&0(2  0f^ 0  j*Principal: Person, Application, or Machine$+0 2+B  c T j^ |E(FTQ&UVW2 @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" ``@ XPolicy Enforcement Point$0  0n^  ` @Targeted Resource: Application, Data, Network, or other resource$A0 2Ar  Hr^ H)jJ `  H"0   0v^  0   NPolicy Store: Directories, databases, etc. accessed through a common interface$O0 2Of  0"`@@F @ z  @ :-B B s  @{^ /EPFPQFUVWf2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `@0 z M Policy Engine$0n  0"`     `?GHIfԔ?"0?@NNN?Np@f   0"`p ! 0H^  @ HAccess&0(2 " 0`^  HAccess&0(2f  @ C *Aj0195384#" `?IPVF @ z # p 2B $B s  p^ /EPFPQFUVW2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `@0 z RPolicy Management $0n % 0"`  d" & <G *HICԔpF @ z ' 0p4B (B s  ԋ^ /EPFPQFUVW2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `@0 z TIdentity Management $0n ) 0"`  d" * <G *H1ICԔpH  0޽h ?`      %& )* 3f{FEɄ___PPT10i.Z+D=' = @B +K  K K?OI(  ~  s *H^ `@  ^  B  C H ^ E(FTQ&UVWf @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" 'P H"0  cB @ s  ^ EFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 'I>G< ~ APEP"0 P8  P  @  P *B >B s  b /EPFPQFUVWd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" ` P  J$0   ? Hb 2 @" ` P  HServer 2$ 0  fF  P  A  p P *B BB s  b /EPFPQFUVWd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" ` P  J$0   C Hb 2 @" ` P  PServer & $ 0  ^F  P  D  P *B EB s  b /EPFPQFUVWd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" ` P  J$0   F H`b 2 @" ` P  HServer N$ 0  ^F  P  G  ` *B HB s  b /EPFPQFUVWd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" ` P  J$0   I Hb 2 @" ` P  HServer 1$ 0   J N"b 2 @"  0  M Application N$0  K Nx&b 2 @"  p ZApplication & $0  L N*b 2 @"    M Application C$0  M N.b 2 @"   M Application B$0 ' N # l1b ?2 @?"6?@ `NNN?N  M Application A$0 H  0޽h ?;<;==<N<H.*- /0 .1 /2 5 3f{FEɄ___PPT10i.Z+D=' = @B +  -D(   r  N8b G13" `'0  ?Next Generation Secure Computing Base Physical Controls$@0@ #r # T=b G3d" `@ QAnti Virus Anti Spam Anti Spyware Encryption, Signature$R0R r ! TAb G fd" `8 EHost Based Intrusion Detection Software Firewall$F0F ~  s *TDb `@  b     0Bb h  c%Policy based client security services"&0&8 ` `0 )0   0Jb ` ``  FHardware" 0   0TNb ` P  DKernel"0  0hQb `p00 I Application" 0   0Tb ` 0@ ENetwork"0jB @ s  4Xb EFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 5HY?fH" 0 `  7d yd>5HY?fH"  P0  1d yd>5HY?fH" @p 2d Zyd>5HY?fH" P  0d 33fyd.3f3@3f"   ^B d 6D)@P~ d s *b `@  b  B  d 3 B hb E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4"  APEP"0B d 3 B b E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" ` 0 APEP"0j d BG*H74I*f8c j d BG3/H,pI3/f8c `  d  fԌb GHKS @ " `  HInternet$ 0 B d C H db E(FTQ&UVW2 @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" ` ``  CPEP$0d"  d <G$*H`dI&uf8c n ` =L P P  #d#  p P B $d Tb f @" `P P  J$0  $B %dB c  ԙb /EPFPQFUVWfd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `P *  J$0   &d <Hb     UPolicy Decision Point$0p8   Md=" 'dB 3 rb ff @Ԕ" `  \Partners Customers Suppliers$0f B (dB C EFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 'I>G< d S Nb E(FTQ&UVW2 @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" `0r H"0 j ?d BG#HI#f8c8  d @d <G\(HI\(f8c8 08d Ad <GHIf8c8r8B Bd 3 B b E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" p@  H"0 B Cd 3 B b E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" @ H"0 B Dd 3 B b E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" p #  H"0 B Ed 3 B b E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4"  # H"0 d Fd <G{HI{f8c n d Gd <G`HI`f8c n z j Hd BG>HI>f8c pj Id BGHIf8czzpH d 0޽h ?P%d dd%dddd%dd d&dd@d>d=dAd%dDdFd%dBdGdDdEdHdBdCdId 3f{FEɄ___PPT10i.Z+D=' = @B +E   \T !(  ~  s *Tb `@  b  B   l b E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" ` 0 0  p Policy driven encryption engine4!0   0Pb  P 6 SEncryption Policies$0 2^"   6H@I#bo\ (^"   6H4I#bo (^"   6HbI#bo0 (^"   6HI#bo( ^"  6HI#bo( P ^"  6HJUI#bo( 0   00b   n0Protocol based encryption and signature services"101B  Tb  @" `8  UKeys and Certificates$0j  BGHIf8c(0(d"  <H*Isf8c0 P  8 @ p&B B c  b /EPFPQFUVW2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `@ L Applications$ 0 B  Tb f @" `@p DDisk$0B  Tb f @" `@ DFile$0B  Tb f @" `@0  L Data Objects$ 0 b    fZb G  @" @   GTunnels$0dB   0f ExF8QFUVW̙d @))??`T`T|T|T,H;P;P,H,Ht,, t t,t% % tt% ttt@`@`@`@`@`@` 0*`T`T0*`T`T0*`T`T0*$`DGLetter#"  `@   DE-Mail"0cB   (f `ExF8QFUVW3d @))??`T`T|T|T,H;P;P,H,Ht,, t t,t% % tt% ttt@`@`@`@`@`@` 0*`T`T0*`T`T0*`T`T0*$`DGLetter#"  `@  OInstant Messaging"0 ^"  6H{I#bo( =L P P  #   B  T f f @" `P P  J$0  $B B c  b /EPFPQFUVWfd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `P *  J$0    <f     UPolicy Decision Point$0B   Thf  @" `` QSignature Service$0j ! BGH Iop H  0޽h ?@       ! 3f{FEɄ___PPT10i.Z+D=' = @B +!    p(  ~  s *f `@  f  j @ BG#HI#8c 0P B  c T Hf /E(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" `  K Log Analyzer "0B   c T p!f E(FTQ&UVW3f @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" `   [Network Vulnerability Scanner"0jB  @ s  %f EFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< f /EPFPQFUVWfd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `P *  J$0    <Af     UPolicy Decision Point$0  0Ff  @ ]Audit and Assessment Policies$0 2H  0޽h ?         3f{FEɄ___PPT10i.Z+D=' = @B +@   @@ 2;0@<(  0~ 0 s *`   " 40@ S ~`Gff @Ԕ" `0p FBoeing$033" 50@ C xpff @Ԕ" `p \Partners Customers Suppliers$0fx 10 BZ̙{"`0 @ r 20 <̙{"` 0 30  `?̙{?"6?@`NNN?Np 0B 0 Z3 @" `  FPolicy$0 p 0 HG@nHI@nf8cP  p"  0 HZG)H%I>f8c OL P P  80#  P P B  0 Zf @" `P P  J$0  *B  0B s  P/EPFPQFUVWfd @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `P *  J$0    0 B    UPolicy Decision Point$0B 0  ` @E(FTQ&UVWd @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" 0  APEP"0 p 0 HGH2KIf8cP B 0 C H E(FTQ&UVWd @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" `  APEP"0 j" 0 BGJ!HŁIYf8c ` B 0  r 0eE(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" `   MCrypto Services"0 p" 0 HGTHYI-o Q j" 0@ BHSI88c` ( ZB 0@ S  EFFQFUVWv8c((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< p 0 HGۏHIۏf38c 0  fG0[HI0[>   0  `GxHIx>0 p p 0 HGxHIxf38c0 p v 0 NZGQHIQf38c   0@  fGdDHuIdD>v 0@ NGdDHuIdDf38c$B  0@ s  X/EPFPQFUVW!!!8cTT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `o zm L Applications$ 0  *B !0@   /EPFPQFUVW2 @TT`T`T`T`T~V#V# ~ ~**=7`T=7o- P Po-o-o- P P o- o- o- P Po-o-o-TOTO o- o-o-dQ0dQ0o-o-d@8d";d";@8@8dYBd;Ed;EYBYBd*Md Pd P*M*Mdo-%Q0%Q0(o-(o-%@8%";%";(@8(@8%YB%;E%;E(YB(YB%*M% P% P(*M(*M%*=7*<*NN*`T*=7** ***%(@`@@@@@@@@@@@@@@@@ 0*`T`T0*`T`T0*`T`T0*WMRznserver" `~ h` L Applications$ 0  r" "0 <Ԕ"` @B #0  ff @8c" `P P DData$0 B $0 C H E(FTQ&UVWd @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" p  APEP"0 B %0 C H DE(FTQ&UVWd @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" P APEP"0 r" &0 <Ԕ"`@ @@B '0  r |0eE(FTQ&UVW @0*`TM`TML`TL`T`+`T`TSRQ0Q(PMK0*80`+LL`T0*`TXD+0E+F+F`+F`+F*F0*F F FFR0EXD0X  R R    0* * `+ +X+0+XD+ L M R `T LLMR`TL@L@M@R@`T@LPLPMPRP`TPLLMR`TL"L"M"R"`T"L'L'M'R'`T'L+L+M+R+`T+L0L0M0R0`T0L(5L(5M(5R(5`T(5L8:L8:M8:R8:`T8:LH?LH?MH?RH?`TH?LCLCMCRC`TCLHLHMHRH`THLMLALLLML@/B7@/J4KJ4KB7@/B7'(@`@@@@@@@@@@@@@@@@@0*`T0*0*`T0* n F+computr4" ` 0  NAudit Services$0 p (0 HGpH~Ipf8c P j )0 BG`HtmI`8c00 l *0 6"`@0 `l +0 6"`p ` `p ,0 HGHI8c0 p l -0 6"`p`Pp .0 HG ;HI ;8c ` p" /0 HZGHcI8c Ll 00 6"` p pB 60@   x EFFQFUVW @((" GG 8" 8" :M`TMG: :M`T`T`T`TMMZDD1Z1Z 'I>G< 'I>G< nU8revi0z4}oPXmms Oh+'0T hp    $,Slide 1The Boeing CompanyShort Security Strategy V1 tadepojuuri372Microsoft PowerPointgy @@prrn@t&mlMGSg  )'    """)))UUUMMMBBB999|PP3f333f3333f3ffffff3f̙3ff333f333333333f33333333f33f3ff3f3f3f3333f33̙33333f333333f3333f3ffffff3f33ff3f3f3f3fff3ffffffffff3ffff̙fff3fffff3fff333f3f3ff3ff33f̙̙3̙ff̙̙̙3f̙3f333f3333f3ffffff3f̙3f3f3f333f3333f3ffffff3f̙3f3ffffffffff!___www4'A x(xKʦ """)))UUUMMMBBB999|PP3f3333f333ff3fffff3f3f̙f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙33333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffff3fffffff3f̙ffff3ff333f3ff33fff33f3ff̙3f3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3ffffffffff!___wwwõ޻׼׶׻׶ܼܼܶýhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhýhhݒ޻޼޽⼼ݻ޵޼⽽޼׻޼޽޵ü޽ݼý⽼üݼ׼ݶ׼޶ݘ⼼޽ݼý⽼⼻ݼݼݽ޻üݽؽýݽݼ޶ýݒݻݽ⵻׼üݽݓ׼ݽöõ޵޼޻ᶻÒݽ޽õ޼׼⼼޼⒵ݵµⶼõ޼ýõõöݽ׽⼶޼ýÒýܽݼ޽޼ؽݽ⵻ݵ޽޽޼ؽݽ޼޼⼶öýݽ޽»õýݼݽ⒵ݼܼ޽¼޽޽ݼݶ¼ݽ޼׶õ޻⵻޼ý޽޵⼼µ¼ݼܼݻ޻י޼޼޻ݼ޼޵׼޼ⵒݻⶼ޽޽ݽ޵ݼ޽ݽݵ޽׼׼ܼݽ½ݽ޽ⶻݽ޼׵ݶ޼½ݽⶵݽݼ⒘޽ݼݻݽ޼ݽݽݽݽݼ޽ݽݽݽݽݽýõ޵½⻵⼻ݽ޽ý½՜.+,0     On-screen Show The Boeing Companyu{ Times New RomanTahomaArial Wingdings Arial BlackSymbolSumi painting design templateSlide 1Security DriversIT Infrastructure Challenges StrategiesTSimplify and strengthen authentication by replacing weak passwords with SecureBadgeAuthentication FlowV2. Automate access decisions based on business information and distribute enforcementAuthorization Flow}3. Provide the same, appropriate information and application access experience to all users inside and outside the perimeterApplication Access`4. Create virtual networks to isolate critical business components from general network traffic Network Partitioning by Service5. Protect individual users, devices, applications and networks from attack by moving access enforcement down to the end systemsApplication Access & Hardening Challenges,Policy Driven Security Service Architecture Policy Decision and Enforcement!Application or Server ProtectionClient or Device ProtectionNetwork ProtectionCryptographic ServicesAudit and Assessment ServicesteloV Slide 24  Fonts UsedDesign Template Slide Titles _r tadepojutadepoju  !"#$%&'()*+,-./0123456789:;<=?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-/012345789:;<=DRoot EntrydO)Picturesp{Current User6SummaryInformation( UPowerPoint Document(>DocumentSummaryInformation8.