Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture
|
|
|
- Samuel Houston
- 10 years ago
- Views:
Transcription
1 Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture Mat Keep MongoDB Product Management & Marketing
2 Agenda Data Security Landscape and Challenges Best Practices and MongoDB Implementation Resources to Get Started 2
3 Security Breaches: More Users, More Cost 3
4 and it s getting worse $5.4m average cost of a data breach 10% annual growth in financial impact of cybercrime Source: Symantec 4 96% of thefts come from database records
5 Security: #2 Spending Increase 5
6 Security: Largest Skills Deficit 6
7 More Data, New Data Data growth: 1.8 trillion gigabytes in 2011 to 7.9 trillion gigabytes by 2015 (IDC) Technologies Growth: DB-Engines now tracks over 210 data stores Market Growth: Big data market forecast to reach $50bn by 2017 (Wikibon) 7
8 New Reality Analytics derived from big data becoming as valuable as traditional enterprise data Big data technologies must evolve to meet compliance standards of industry & government 8
9 Regulatory Compliance Multiple standards PCI-DSS, HIPAA, NIST, STIG, EU Data Protection Directive, APEC data protection standardization Common requirements Data access controls Data protection controls Data permission Data audit 9
10 Requirements Define Security Architecture Database 10
11 Best Practices & Enforcement in MongoDB
12 Authentication Confirming identity for everything accessing the database Create unique credentials for each entity Clients, admins/devs, software systems, other cluster nodes Integrated with the corporate authentication standards Application Reporting ETL
13 Authentication in MongoDB Integrate with choice of corporate authentication mechanisms 13 Kerberos protocol, with support for Active Directory PKI integration with x.509 Certificates, for clients and intercluster nodes IdM integration with LDAP support Red Hat Identity Management
14 Authorization User Identity Commands Responses Resource Authorization Defines what an entity can do in the database Control which actions an entity can perform Grant access only to the specific data needed 14
15 Authorization in MongoDB User-defined roles assign fine-grained privileges, applied per collection, delegate across teams 15
16 MongoDB Field Level Redaction Enables a single document to to store data with multiple security levels 16 User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } }
17 Field Level Redaction User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } } 17
18 Field Level Redaction User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } } 18
19 Field Level Redaction User 1 - Confidential - Secret User 2 - Top Secret - Secret - Confidential User 3 - Unclassified Field Level Access Control { _id: xyz, field1: { level: [ Confidential ], data: 123 }, field2: { level: [ Top Secret ], data: 456 }, field3: { level: [ Unclassified ], data: 789 } } 19
20 Field Level Redaction: Implementation 20
21 Auditing Database Audit Trail Collection Capture actions in the database Access Data Database configuration Used for compliance and forensics 21
22 Auditing in MongoDB Capture Schema operations & database configuration changes Authentication & authorization activities Configurable filters Write log to multiple destinations in JSON or BSON Partner solutions for capture of read / write activity IBM Guardium 22
23 Encryption Encoding of data in transit & at rest Connections to database, and between nodes Data stored on disk protected against attacks targeting OS or physical storage Mechanisms to sign & rotate keys FIPS-compliant cryptography 23
24 Encryption in MongoDB 24 SSL on all connections & utilities FIPS mode Mix with non-ssl on the same port On-disk encryption via partner solutions Gazzang LUKS IBM Guardium Bitlocker & TrueCrypt
25 MongoDB Management Service Monitor Visualize 100+ system metrics Custom alerts Backup Continuous incremental backups Point-in-time recovery Automate (tech preview) Provision in minutes Hot upgrades 25
26 Environmental Control Network filters: Router ACLs and Firewall Bind IP Addresses: limits network interfaces Run in VPN Dedicated OS user account: don t run as root File system permissions: protect data, configuration & keyfiles 26
27 Putting it all Together
28 MongoDB Enterprise-Grade Security Business Needs Security Features Authentication Authorization Auditing Encryption In Database LDAP* Kerberos* x.509 Certificates Built-in Roles User-Defined Roles Field Level Redaction Admin Operations* Queries (via Partner Solutions) Network: SSL (with FIPS 140-2) Disk: Partner Solutions 28 *Requires a MongoDB Subscription
29 Subscriptions Basic Standard Enterprise Mgt. Tools Cloud On-Prem & Cloud On-Prem & Cloud Advanced Security On-Demand Training SSL SLA 4 hours 1 Hour 30 Minutes Support 9am 9pm M F 24x7x365 24x7x365 License AGPL Commercial Commercial 29
30 Try it Out MongoDB Security Architecture Whitepaper & Security Checklist Extensive tutorials in the documentation Download MongoDB Enterprise 30
31 For More Information Resource MongoDB Downloads Free Online Training Webinars and Events White Papers Case Studies Presentations Documentation Additional Info Location mongodb.com/download education.mongodb.com mongodb.com/events mongodb.com/white-papers mongodb.com/customers mongodb.com/presentations docs.mongodb.org 31
32
33 Global Community 7,000,000+ MongoDB Downloads 150,000+ Online Education Registrants 30,000+ MongoDB Management Service (MMS) Users 25,000+ MongoDB User Group Members 20,000+ MongoDB Days Attendees 33
34 MongoDB Use Cases Big Data Product & Asset Catalogs Security & Fraud Internet of Things Database-as-aService Top Global Shipping Company Top US Retailer Top Investment and Retail Banks Mobile Apps 34 Customer Data Management Top Media Company Intelligence Agencies Top Industrial Equipment Manufacturer Top Investment and Retail Banks Data Hub Social & Collaboration Content Management
35 MongoDB Products and Services Subscriptions Development & Production On-Prem Monitoring, Advanced Security, Professional Support and Commercial License Consulting Expert Resources for All Phases of MongoDB Implementations MongoDB University Certification and Training for Developers and Administrators Online & In-Person MongoDB Management Service (MMS) Cloud-Based Service for Monitoring, Alerts, Backup and Restore 35
36 MongoDB Company Overview 350+ employees 1,000+ customers 13 offices around the world Over $231 million in funding 36
37 Fortune 500 & Global of the Top 100 Organizations 10 of the Top Financial Services Institutions 10 of the Top Electronics Companies 10 of the Top Media and Entertainment Companies 10 of the Top Retailers 10 of the Top Telcos 8 of the Top Technology Companies 6 of the Top Healthcare Companies 37
38 Costs Measured in Billions 38
MongoDB Security Guide
MongoDB Security Guide Release 2.6.11 MongoDB, Inc. December 09, 2015 2 MongoDB, Inc. 2008-2015 This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 United States License
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
MongoDB Security Guide Release 3.0.6
MongoDB Security Guide Release 3.0.6 MongoDB Documentation Project September 15, 2015 Contents 1 Security Introduction 3 1.1 Authentication............................................... 3 1.2 Role Based
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
The Essential Security Checklist. for Enterprise Endpoint Backup
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
MongoDB Security Guide
MongoDB Security Guide Release 3.0.8 MongoDB, Inc. January 04, 2016 2 MongoDB, Inc. 2008-2015 This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 United States License
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
Administering the Web Server (IIS) Role of Windows Server
Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Optimized for the Industrial Internet: GE s Industrial Data Lake Platform
Optimized for the Industrial Internet: GE s Industrial Lake Platform Agenda The Opportunity The Solution The Challenges The Results Solutions for Industrial Internet, deep domain expertise 2 GESoftware.com
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015
SMS PASSCODE 2015 Guide for implementing SMS PASSCODE protection with Palo Alto Networks. This document outlines the process of configuring a Palo Alto Networks GlobalProtect VPN with SMS PASSCODE RADIUS
Privileged Identity Management
Privileged Identity Management Take Control of Your Administrative Credentials www.liebsoft.com [email protected] 310-550-8575 800-829-6263 Philip Lieberman, President & CEO [email protected] 2012 by
Product Comparison List
Product Comparison List Data Center Size Site Solution / Feature
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Cisco ASA. Administrators
Cisco ASA for Accidental Administrators Version 1.1 Corrected Table of Contents i Contents PRELUDE CHAPTER 1: Understanding Firewall Fundamentals What Do Firewalls Do? 5 Types of Firewalls 6 Classification
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
MS 10972A Administering the Web Server (IIS) Role of Windows Server
MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
Knowledge-Based Authentication Challenge Response System
Knowledge-Based Authentication Challenge Response System Kevin Trilli Director, Product Management VeriSign, Inc. Bill Andrews Sr. Manager, Product Management Lightbridge, Inc. Purpose and Agenda Purpose
Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013
Everything You Always Wanted to Know About Log Management But Were Afraid to Ask August 21, 2013 Logging and Log Management Logging and Log Management The authoritative Guide to Understanding the Concepts
LogInspect 5 Product Features Robust. Dynamic. Unparalleled.
LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10
10972-Administering the Web Server (IIS) Role of Windows Server
Course Outline 10972-Administering the Web Server (IIS) Role of Windows Server Duration: 5 days (30 hours) Target Audience: This course is intended for IT Professionals already experienced in general Windows
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Security and Compliance in Big Data
Security and Compliance in Big Data White Paper BY DATASTAX CORPORATION AND GAZZANG, INC MAY 2013 Contents Executive Summary 3 A Brief Note About Compliance 3 HIPAA and HITECH Regulations 4 Payment Card
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
JD Edwards Security Best Practices
JD Edwards Security Best Practices Manish Somani Director, Software Engineering Oracle JD Edwards Marcelo Tamassia Founding Partner EmeraldCube Solutions October 01, 2014 Safe Harbor Statement The following
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Alliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
Securing Active Directory Presented by Michael Ivy
Securing Active Directory Presented by Michael Ivy Presenter: Michael Ivy Consultant, Rook Security Michael Ivy Thank you for being here today August 20, 2014 Brief Overview Securing NTDS and Replication
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Overcoming PCI Compliance Challenges
Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com Goal: Understand the
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Microsoft 70-414 Exam
Volume: 92 Questions Topic 1, Contoso Ltd Overview Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has a main office and six branch offices. The
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
