Top 12 Must-Have Features for Privileged Password Management
|
|
|
- Agnes Sims
- 10 years ago
- Views:
Transcription
1 Top 12 Must-Have Features for Privileged Password Management Protecting Credentials Across Traditional and Virtual Data Centers, Private/Public Clouds, and Hybrid Environments October 2013
2 2 Xceedium White Paper Executive Summary Widespread adoption of virtualization and cloud computing and the increasing dynamism of today s computing environments are elevating both the importance and complexity of an already challenging problem: effectively managing and protecting passwords for privileged accounts. Managing privileged passwords across the large array of traditional infrastructure (network gear, servers, mainframes, etc.) has been a long-standing security and compliance problem. Further complicating matters for most organizations is the multitude of privileged credentials hardcoded into applications, and the continued proliferation of non-password credentials that also require inclusion within TOP Must-Have Features for Next-Generation Privileged Password Management AUTOMATED/FACILITATED DISCOVERY SECURE STORAGE/VAULTING AUTOMATED POLICY ENFORCEMENT SECURE RETRIEVAL AND PRESENTATION/USE SEAMLESS TRANSITION TO FULL PRIVILEGED IDENTITY MANAGEMENT COMPREHENSIVE COVERAGE FOR TRADITIONAL TARGETS SUPPORT FOR VIRTUALIZATION AND CLOUD MANAGEMENT CONSOLES SUPPORT FOR MACHINE TO MACHINE AUTHENTICATION SUPPORT FOR KEY MANAGEMENT ON-PREMISE, VIRTUAL MACHINE AND CLOUD-BASED DELIVERY OPTIONS CLOUD-ALIGNED ARCHITECTURE AND APPROACH CLOUD-READY SCALABILITY AND RELIABILITY security policies and management practices. Examples of such credentials are SSH key pairs and the PEM-encoded keys used to access Amazon Web Services (AWS) resources. This paper elaborates on these challenges and explains how Xceedium Xsuite fully addresses them by delivering against the 12 must-have features that define a nextgeneration solution for privileged credential management. With Xsuite, customers obtain a complete set of controls for protecting and managing all types of credentials for all types of resources, wherever they are located, and in a way that keeps pace with today s hybrid cloud environments. The net result is far greater reductions in risk, cost of ownership, and operational workload than are possible with alternate solutions that fail to provide comparable depth of controls, breadth of coverage, and alignment with the essential characteristics of cloud computing. Privileged Password Management Basics Privileged user passwords (hereafter, privileged passwords) are distinguished from ordinary end-user passwords in that they uniformly gate access to an organization s most sensitive resources namely, the administrative accounts (e.g., admin, root, SYS, and sa) and associated capabilities used to configure and control pretty much all of your organization s IT infrastructure. Given the risk involved, it s fairly obvious that managing and protecting such credentials is important a point, by the way, that is validated by the numerous sets of associated requirements codified in commonly invoked security standards and regulations, such as NIST Special Publication and the Payment Card Industry Data Security Standard (PCI-DSS). Regulatory requirements aside, privileged password management is not only a good practice from a risk management perspective, it s also
3 Top 12 Must-Have Features for Privileged Password Management in the Hybrid Cloud Era 3 essential to overcoming the litany of insecure practices common in today s organizations. Weak, stale or exposed passwords (e.g., because they are kept on a post-it note or in a spreadsheet), having too many passwords, password sharing, having no clear attribution for shared accounts, having no option for strong authentication, and having no option for centralized revocation are just a handful of the issues we routinely encounter. The real problem though is the potential for any of these conditions to lead to successful spear phishing, targeted attacks, and ultimately data theft not to mention compliance violations. Need proof? According to the 2013 Verizon Data Breach Investigations Report, 76 percent of breaches could be traced to stolen credentials, while another 13 percent were the result of credential misuse by trusted insiders. Findings such as these make it abundantly clear why today s organizations need to take advantage of an enterprise-class solution, like Xceedium Xsuite, for privileged credential management, protection, and access control. The Hybrid Cloud Impact The traditional issues cataloged above are only the tip of the iceberg. Given the compelling cost, adaptability, and responsiveness advantages of hybrid cloud configurations where IT services and applications utilize both traditional and virtualized infrastructure spanning both enterprise and cloud datacenters widespread adoption is inevitable. Along with all their benefits, however, hybrid clouds also introduce several new challenges for privileged password management, including: Greater scope as the concentrated power of virtualization and cloud management consoles add a new type of privileged resource/account into the mix; Greater dynamism as new servers/systems can be added on-demand, not to mention in bulk (e.g., 10, 20, or more at a time); and, The potential for creating islands of identity as each different cloud service has its own identity store and infrastructure. 1 Beyond the challenges presented by the hybrid cloud, IT security managers also need to keep two other aspects of the privileged password management problem in mind when evaluating potential solutions. First, they need to account for the machine-to-machine, or application-toapplication (A2A) scenario, where passwords used by one system/application for gaining access to another system/ application are hard-coded in the accessing application, or made available to it in a plain-text configuration file. The second item to consider is the often-overlooked issue that most organizations may also have thousands of keys (e.g., for SSH implementations) that, although they are not traditional, phrase-oriented passwords, still operate as authentication credentials to privileged accounts and, therefore, still require management and protection to reduce associated risks. The net result is that, in the hybrid cloud era, privileged password management is now more important and complex than ever before. Greater volume/scale as operational demands and the ease of deploying virtual machines result in more entities requiring privileged access (and, therefore, privileged passwords);
4 4 Xceedium White Paper Introducing Xceedium Xsuite Xceedium Xsuite is a complete solution for privileged identity management (PIM). As such, in addition to being able to control access, monitor, and record the activities of privileged users across hybrid cloud environments, Xsuite also incorporates all of the capabilities required of a next-generation solution for privileged password management. In fact, it s important for IT security teams to recognize that although managing and protecting passwords is valuable in its own right, it s also the means to a greater end. In particular, it s the initial (or complementary) steps in the broader and equally important process of actually controlling and managing access to high-risk resources. If the distinction here seems subtle, it s largely because, in practice, functional implementations of authentication mechanisms (i.e., passwords) and access control rarely involve one without the other and thus, they are often lumped together in our minds. In any event, the design objectives for the privileged password management capabilities included within Xsuite are the same as those applied across the remainder of the solution. Specifically, Xceedium s goal is to deliver a solution that not only provides a comprehensive set of controls and capabilities for a comprehensive set of targets and use cases, but that also does so in a manner consistent with cloud-era delivery options, practices, and architectures. Comprehensive Controls When it comes to evaluating privileged password management solutions, we recommend looking first at whether the solution incorporates a comprehensive set of controls for helping the security team overcome the risks posed by traditional approaches to creating, managing, and using sensitive administrative credentials. Specific areas to examine include discovery, vaulting, policy enforcement, retrieval, and the ability to support seamless evolution to a full-featured privileged identity management implementation. Xsuite Components
5 Top 12 Must-Have Features for Privileged Password Management in the Hybrid Cloud Era 5 The Top 12 Criteria 1 AUTOMATED/FACILITATED DISCOVERY Without a means for automated or facilitated discovery, the process of bringing privileged passwords under management can be onerous not to mention fraught with errors or omissions that leave your computing environment vulnerable to today s sophisticated attacks. For this reason, Xsuite includes a variety of methods for discovering devices, systems, applications, services, and accounts including leveraging well-known port associations, directory information, management consoles, and APIs. For example, Xsuite leverages available APIs for supported virtualization and cloud management solutions to alert administrators when new virtual machines are created. In addition, the solution makes it easy to bulk-import system lists from text files, as well as to make ad-hoc entries through the management console. Finally, it s also important to understand that it is by design that Xceedium has chosen to avoid more disruptive (and potentially riskier) discovery techniques requiring target-based agents that hook or shim the local TCP stack. 2 SECURE STORAGE/VAULTING An encrypted vault provides a centralized point of control and is the key to eliminating insecure storage methods (like spreadsheets) that make it easy to share and compromise credentials. The Xsuite vault is Credential Safe TM, a FIPS Level 1 compliant solution that leverages AES 256-bit encryption to securely store all types of credentials, not just passwords. Additional compelling features of the solution include: The option to take advantage of integrated hardware security modules (HSM) from our partners (SafeNet and Thales) to field a FIPS Level 2 or Level 3 implementation. This is particularly important for high-profile, risk adverse clients and use cases, such as those involved with financial and banking systems, where it is desired to store the keys used to encrypt credentials separately from the encrypted credentials. Multiple deployment options are supported, including Xsuite hardware appliances with onboard PCI cards, Xsuite virtual appliances making calls to network-attached HSM appliances, and Xsuite appliances of either type making calls to an AWS HSM-as-a-service offering. The use of proven, white-box cryptographic routines to protect encryption keys while they are in use (i.e. in memory) on a system. This approach prevents hackers from grabbing/piecing together keys by monitoring standard cryptographic APIs and memory, and overcoming inferior alternatives based on key chunking or simple obfuscation. The inclusion of this technology is particularly important for A2A use cases where the accessing system must also vault credentials and there is greater potential for the system to become compromised (e.g., due to it being in a relatively exposed location). 3 AUTOMATED POLICY ENFORCEMENT Xsuite automates the creation, use, and change of passwords, thereby eliminating the tendency to reuse passwords or rely on passwords that are weak (but easy to remember). With Xsuite, flexible policies can be set to enforce password complexity, implement change requirements such as rotating passwords based on time (e.g., daily or weekly) or in response to a specific event (e.g., after each use) and govern use (e.g., allowing access only during specified time windows, or requiring dual/multiple authorizations for password access). Because these policies can be applied in a hierarchical manner and to groups of target resources, not only can different requirements and capabilities be accommodated for different targets, but also their enforcement effectively becomes dynamic as any resource added to a group automatically inherits the policies for that group. Behind the scenes, Xsuite also interacts directly with affected target resources to ensure that all credentials remain synchronized (i.e., when they are changed at one end, they are also changed at the other).
6 6 Xceedium White Paper 4 SECURE RETRIEVAL AND PRESENTATION/USE Putting privileged credentials into a vault is pointless if they can t also be securely retrieved and used. The first step in this process is accurate authentication of whomever or whatever, in the case of applications and scripts is looking to access/use a credential. In this regard, Xsuite fully leverages your existing identity infrastructure, with integration to Active Directory and LDAP-compliant directories, as well as authentication systems like RADIUS. Support is also included for: Two-factor tokens (e.g., from RSA and SafeNet); X.509/PKI certificates; Personal Identity Verification and Common Access Cards (PIV/CAC) which are necessary for federal sector compliance with HSPD-12 and OMB mandates; SAML; and, Composite multi-factor techniques (e.g., combining passwords with RSA tokens). In the preferred mode of operations, Xsuite subsequently presents the requested credential to the target system on behalf of the accessing entity (e.g., user or application). This approach conveys several additional security benefits. First, in contrast to simple check-in/check-out solutions, credentials are never seen by or distributed to the accessing entity. This greatly reduces their potential for exposure. In addition, because authentication to the target system is completely automated and users never need to handle/ remember their passwords, policies can be implemented to dramatically increase password complexity. Because all access to targets occurs via Xsuite, the solution can also provide full attribution of privileged user activities, even for shared admin accounts. For the sake of completeness, it s also worth noting that all network communications between accessing entities, Xsuite, and managed targets are SSL encrypted. In addition, Xsuite supports an alternate mode of operation whereby accessing entities can directly retrieve and submit required credentials to target systems on their own. 5 SEAMLESS TRANSITION TO FULL PRIVILEGED IDENTITY MANAGEMENT Xsuite provides organizations originally focused solely on password management with everything they need to transition to a full-featured privileged identity management implementation if and when they realize the need to do so. Some of the more notable capabilities at the IT security department s disposal when it s ready to take advantage of them include: Granular role-based access control and associated workflows (e.g., for requesting/authorizing additional permissions); Automated connection/session establishment with target resources (with support for RDP, SSH, web, and several other access modes/options); Real-time monitoring of privileged user sessions, along with policy-based enforcement of allowed/ denied activities (e.g., which commands a specific user can employ); Logging, including syslog-based SIEM integration; Full session recording with DVR-like playback for jumping directly to events of interest; and, Leapfrog prevention that keeps users from circumventing their permissions by leveraging accessible targets to gain access to other, unauthorized targets. Furthermore, implementing these additional capabilities couldn t be easier. There s no need for a separate product, device, or management console because Xsuite delivers all of its privileged password management and access control functionality as one, tightly integrated solution. Xsuite also provides unified policy management across the entire solution, an approach that further simplifies implementation and administration.
7 Top 12 Must-Have Features for Privileged Password Management in the Hybrid Cloud Era 7 Comprehensive Coverage The second high-level area to evaluate when selecting a solution for privileged password management is the scope of coverage that it provides. In other words, for the comprehensive set of controls identified above, what types of accessing entities, credentials, and target systems does the solution actually support? 6 COMPREHENSIVE COVERAGE FOR TRADITIONAL TARGETS Xsuite includes a wide array of target system connectors providing out-of-the-box integration for all types of IT infrastructure, network devices, systems, and applications, including: Windows Domain, Local Administrator, and Service Accounts Popular Linux and Unix distributions AS/400 Cisco and Juniper networking devices Telnet/SSH-based systems SAP Remedy ODBC/JDBC databases Systems and applications servers An extensible solution, Xsuite also provides flexible customization capabilities so that organizations can easily extend support to proprietary and internally developed systems. 7 SUPPORT FOR VIRTUALIZATION AND CLOUD MANAGEMENT CONSOLES Xsuite s out-of-the-box coverage for managing and protecting credentials is not limited to traditional targets; it also extends to popular virtualization and cloud solutions, including VMware vsphere, Amazon Web Services, and Microsoft Online Services. Moreover, the capabilities that apply for these solutions are not limited to the individual instances of associated virtual machines, applications, or services. Coverage extends also to the corresponding management consoles, which due to the power they command, must be recognized as privileged resources in their own right. 8 SUPPORT FOR MACHINE TO MACHINE AUTHENTICATION As alluded to earlier, humans are not the only users of privileged credentials. For most organizations, numerous applications and systems are also enabled to access sensitive resources, such as other applications or databases. This is typically accomplished by embedding associated credentials into the accessing application s code or making it available at run-time via a configuration file neither of which is a particularly secure or manageable option. Xsuite provides coverage for these A2A use cases by enabling developers to inject a lightweight Xsuite client into their applications. This approach provides privileged applications with everything they need to register with Xsuite, dynamically retrieve required passwords, and subsequently protect them while in memory on the local system. In addition, multiple mechanisms are available to authenticate the privileged applications and verify their integrity prior to Xsuite releasing requested credentials. By leveraging Xsuite for A2A scenarios organizations can: eliminate exposed/insecure A2A credentials by vaulting them centrally, automate A2A credential management and policy enforcement, and simplify related auditing and compliance activities. 9 SUPPORT FOR KEY MANAGEMENT In addition to supporting cryptographic operations, many types of keys also serve as tokens to confirm identity. Although such keys are not passwords in the traditional sense, they still operate like passwords and are still subject to similar threats, risks, and challenges, such as copying,
8 8 Xceedium White Paper sharing, unintended exposure, and unaudited backdoors. Because such keys are typically embedded or transparently used in solutions to shield users from their relative complexity, they re also more likely to be orphaned and/ or proliferate over time. It makes sense, therefore, to apply many of the same controls used to manage and protect passwords to these alternate credentials as well. Indeed, recommended best practices for thwarting related threats include: Moving authorized keys to protected locations; Rotating all keys regularly (to guarantee the eventual termination of access in the event of leaked keys); Enforcing source restrictions for authorized keys; and, Enforcing command restrictions for authorized keys. 2 Accordingly, Xceedium has extended Xsuite s controls and other capabilities to account for alternate credential types, including SSH keys and the PEM-encoded keys used to access AWS resources and management consoles. In other words, with Xsuite, such credentials can be: (1) vaulted, (2) rotated and controlled by configured policies, and (3) retrieved and used in a manner that minimizes the potential for their theft or exposure. Cloud-era Delivery In the hybrid cloud era, another major gating factor for the success of a privileged password management solution is how well it fits in not only physically but also in terms of aligning with cloud networking needs and capabilities. 10 ON-PREMISE, VIRTUAL MACHINE AND CLOUD- BASED DELIVERY OPTIONS Xsuite supports three convenient deployment options that allow organizations to keep pace with complex hybrid-cloud architectures: A hardened physical appliance available in two models for traditional rack-mounting in the enterprise data center; An Amazon Machine Instance (AMI) pre-configured for deployment with the Amazon EC2 infrastructure; and An OVF-compliant virtual appliance ready-made and pre-configured for deployment in VMware environments. Regardless of the deployment option(s) used, organizations obtain a solution that enables management of their entire hybrid cloud infrastructure. 11 CLOUD-ALIGNED ARCHITECTURE AND APPROACH Xsuite is purposely architected to incorporate numerous features that make it a good citizen in hybrid cloud environments. Three examples include the following: Auto-discovery and protection. In hybrid cloud environments, operators can create (or retire) any number of systems with a single command. Xsuite accounts for this situation by leveraging applicable APIs to automatically discover virtualized and cloud resources and then provision (or deprovision) appropriate credential and access management policies. Avoiding islands of identity (i.e., identity federation). One way that Xsuite eliminates separate islands of identity information is by fully leveraging whatever identity infrastructure an organization already has in place. Another way, specific to AWS implementations, is by supporting ephemeral users an approach that keeps
9 Top 12 Must-Have Features for Privileged Password Management in the Hybrid Cloud Era 9 12 organizations from having to maintain separate identity information in the AWS Identity and Access Management sub-system. Enabling automation. A comprehensive API allows programmatic access to and automation of all Xsuite functionality (e.g., by external management and orchestration systems). CLOUD-READY SCALABILITY AND RELIABILITY Privileged credential management is a critical element of an organization s IT infrastructure. This is doubly true when the implementation is extended to support A2A use cases, which operate in a fully automated manner. To this end, Xsuite includes native clustering and load distribution functionality capable of meeting the high availability and scalability requirements of the largest and most demanding environments. Compared to common alternatives, with Xsuite there is no need to invest in separate, external load balancers, no performance delays typical of active-passive approaches, and no need to license additional optional features. If desired and operationally acceptable from a latency perspective Xsuite clusters can even be configured to enable redundancy across geographically dispersed data centers and cloud environments. Conquering Privileged Credential Management in the Cloud Era Managing and protecting privileged credentials is essential to reducing risk and achieving compliance with related regulatory requirements. It s also a problem that is growing in complexity and significance, as hybrid cloud environments introduce management consoles with unprecedented power and the ability to add/remove literally hundreds of target systems with nothing more than a handful of mouse clicks. Organizations looking to address this critically important area of their information security strategy need to evaluate candidate solutions for the depth of controls, scope of coverage, and degree of cloud alignment they provide. As discussed herein, Xsuite delivers against all three of these dimensions to provide today s organizations with precisely what they need: a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency, and protects their investment by supporting traditional, virtualized, and hybrid-cloud infrastructure alike. For more information, please visit Footnotes/References: 1. New Platforms, New Requirements. Privileged Identity Management for the Hybrid Cloud, Xceedium white paper, March Managing SSH Keys for Automated Access - Current Recommended Practice, IETF Draft, April 2013
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
next generation privilege identity management
next generation privilege identity management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep up pace with
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Zero Trust. Privileged Access Management
Zero Trust Privileged Access Management $394,700 Mean Monetary Value of Losses Due To CyberCrime Percentage of organizations reporting specific security events: Source: U.S. CERT 2010 CyberSecurity Watch
The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller
Learn How Privileged Account Security Solutions are the Right Painkiller Table of Contents Introduction: Control Access, Empower Team 3 The 10 Pains of UNIX Security 4 Pain No.1: Protecting the Keys to
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
Drawbacks to Traditional Approaches When Securing Cloud Environments
WHITE PAPER Drawbacks to Traditional Approaches When Securing Cloud Environments Drawbacks to Traditional Approaches When Securing Cloud Environments Exec Summary Exec Summary Securing the VMware vsphere
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Moving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871
Implementing Software- Defined Security with CloudPassage Halo
WHITE PAPER Implementing Software- Defined Security with CloudPassage Halo Introduction... 2 Implementing Software-Defined Security w/cloudpassage Halo... 3 Abstraction... 3 Automation... 4 Orchestration...
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Pass-the-Hash. Solution Brief
Solution Brief What is Pass-the-Hash? The tools and techniques that hackers use to infiltrate an organization are constantly evolving. Credential theft is a consistent concern as compromised credentials
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Privileged Session Management Suite: Solution Overview
Privileged Session Management Suite: Solution Overview June 2012 z Table of Contents 1 The Challenges of Isolating, Controlling and Monitoring Privileged Sessions... 3 2 Cyber-Ark s Privileged Session
The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect and respond to privileged accounts
The CyberArk Privileged Account Security Solution A complete solution to protect, monitor, detect and respond to privileged accounts Table of Contents The Privileged Account a Real, Pervasive, Threat...3
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
ManageEngine Password Manager Pro Vs Thycotic Secret Server
ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on August 19, 2015) Feature ManageEngine Password
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Moving Beyond User Names & Passwords Okta Inc. [email protected] 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Moving Beyond
Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security [email protected]
Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security [email protected] Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage
Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
PowerBroker for Windows Desktop and Server Use Cases February 2014
Whitepaper PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 4 Sample Regulatory
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
PowerBroker for Windows
PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 5 Sample Regulatory Requirements...
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Public Cloud Service Definition
Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
WHITE PAPER. Active Directory and the Cloud
WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access
edmz Introduces Achieving PCI Compliance for: & Remote Vendor Access [ W H I T E P A P E R ] Written by e-dmz Security, LLC February 2010 C o p y r ig h t 2 0 1 0 e - D M Z S e c u r i t y, LL C. A l l
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Assuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
The bridge to delivering digital applications across cloud, mobile and partner channels
Axway API Gateway The bridge to delivering digital applications across cloud, mobile and partner channels Axway API Gateway a foundational component in an API-first architecture for digital business provides
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
BANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Vormetric Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard
Partner Addendum Vormetric Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
RSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect, alert and respond to privileged accounts
The CyberArk Privileged Account Security Solution A complete solution to protect, monitor, detect, alert and respond to privileged accounts Table of Contents The Privileged Account a Real, Pervasive, Threat...3
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief
The RSA Solution for Cloud Security and Compliance A GRC foundation for VMware infrastructure security and compliance Solution Brief The RSA Solution for Cloud Security and Compliance enables end-user
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-3waysad-113012 Table
Sentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
