MANAGEMENT IN THE CLOUD ADAM BOSNIAN
|
|
|
- Simon Owens
- 10 years ago
- Views:
Transcription
1 PRIVILEGED IDENTITY MANAGEMENT IN THE CLOUD ADAM BOSNIAN CYBER-ARK SOFTWARE
2 SPEAKER BIOGRAPHY Adam Bosnian is EVP Americas and Corporate Development at Cyber- Ark Software. He has more than 20 years of experience in defining and implementing successful security strategies for customers who need to better manage insider threats and meet goals associated with compliance and reliability. Bosnian specializes in the area of privileged identity management, focusing on the risks associated with powerful users or accounts with high-level and often anonymous access to sensitive applications, networks and systems. He also has extensive experience in technology, retail and financial services industries.
3 Privileged Accounts Defined Elevated Personal (Login: Swhitehouse using SUDO or UAC) - Privileged operations - Access to sensitive systems The problem posed by privileged accounts: Most powerful accounts in the organization Shared Access Privileged sensitive Accounts information SYS, Rarely Local Administrators, changed, ERP known Admin etc) to many No individual user accountability (Administrator, UNIX root, Cisco Enable, Oracle - Emergency - Fire-call - Disaster recovery - Privileged operations Application Accounts (Embedded, hard-coded and clear text passwords) - Online database access - Batch processing - App-2-App communication Shared superuser accounts typically system-defined in operating systems, databases, network devices and elsewhere present significant risks when the passwords are routinely shared by multiple users. Gartner, MarketScope for Shared-Account/Software-Account Password Management
4 Identity should not just be viewed as a reference for authenticating the entity but also gathers more information about the user for making access decisions. Identity also includes the identities of the of the devices that applications run on, privileged users that manage that VM image, identities of other applications and services that application needs to interact with, identities of administrative users to manage the application and external identities outside of the enterprise that need access to the application.
5 Identity should not just be viewed as a reference for authenticating the entity but also gathers more information about the user for making access decisions. Identity also includes the identities of the of the devices that applications run on, privileged users that manage that VM image, identities of other applications and services that application needs to interact with, identities of administrative users to manage the application and external identities outside of the enterprise that need access to the application.
6 Identity should not just be viewed as a reference for authenticating the entity but also gathers more information about the user for making access decisions. Identity also includes the identities of the of the devices that applications run on, privileged users that manage that VM image, identities of other applications and services that application needs to interact with, identities of administrative users to manage the application and external identities outside of the enterprise that need access to the application.
7 Identity should not just be viewed as a reference for authenticating the entity but also gathers more information about the user for making access decisions. Identity also includes the identities of the of the devices that applications run on, privileged users that manage that VM image, identities of other applications and services that application needs to interact with, identities of administrative users to manage the application and external identities outside of the enterprise that need access to the application.
8 Identity should not just be viewed as a reference for authenticating the entity but also gathers more information about the user for making access decisions. Identity also includes the identities of the of the devices that applications run on, privileged users that manage that VM image, identities of other applications and services that application needs to interact with, identities of administrative users to manage the application and external identities outside of the enterprise that need access to the application.
9 Identity should not just be viewed as a reference for authenticating the entity but also gathers more information about the user for making access decisions. Identity also includes the identities of the of the devices that applications run on, privileged users that manage that VM image, identities of other applications and services that application needs to interact with, identities of administrative users to manage the application and external identities outside of the enterprise that need access to the application.
10 Privileged Accounts Give System-Wide Access 48% of data breaches were caused by privileged il misuse Proactively manage privileged access to prevent such attacks Who has access to privileged accounts? Administrators Contractors; Cloud Service Providers DBAs Terminated Employees Applications Why are these breaches happening? Shared account usage Excessive privilege Hidden/Sleeping accounts No revocation of access Non-existent/unenforced access controls Infrequent replacement of credentials * Verizon, Data Breach Investigations Report 9
11 Key Drivers for Privileged Account and Session Management Insider Threats > Insiders have 2 things hackers don t: access and trust > Malicious insider attacks can take up to 42 days or more to resolve (Ponemon Institute, July 2010) Create full accountability & access control Moving to the Cloud > CIO Survey: Security is the single biggest barrier to cloud computing adoption > Migrating to the cloud means losing control over the human factor Securely migrate to the Cloud with control & visibility Risk and Compliance > Compliance and audit questions are going deeper and wider > On average, non-compliance cost is 2.65 times the cost of compliance (Ponemon Insititute, The True Cost of Compliance, Jan 2011) Provide proof on privileged activity Targeted Cyber Attacks > Better planned, sophisticated and targeted t attacks > Targeting the most valuable assets > Go after the most powerful privileged system accounts Secure privileged accounts & isolate privileged sessions Access is not privileged enough: 52% can access restricted, confidential information beyond the requirements of their position Ponemon Institute, Global Privilege Study, Dec
12 Classic Insider Threat Fresh the Human Headlines Element CONVICTED!!! 75% in Oracle DBA survey: Our organizations do not have a means to prevent privileged database users from reading or tampering with human resources, financial or other business application data in the databases. Source: Independent Oracle Users Group 11
13 Ripped from the Headlines - Cyber Attacks on the Rise "Every defense company is constantly under attack. If anybody tells you they're not, it just means they don't know Northrop Grumman Chief Executive Wes Bush, Sep. 07, 2011
14 The Terminology Doesn t Matter Cyber Attacks Advanced Persistent Threat (APT) Ongoing g Targeted Attacks Cyber Threat Cyberwarfare
15 Targeted Attacks Purposeful attacker not opportunistic Organized, funded, directed Criminal, government Collects and acts on mission intelligence Persistent will continue until target achieved Continuously use various attack vectors Covert prefer low and slow approach Possible purposes: Collection of information Exploiting the network Sabotage
16 Advanced Threats - From the Wall Street Journal 15
17 Increased Awareness with increased allocated budgets It's now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation. President Obama, May 29, 2009 I'm often asked what keeps me up at night? No. 1 is the cyber threat! Deputy Defense Secretary William J. Lynn III, February 13, 2010 [...] the next Pearl Harbor that we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial i systems, our governmental systems Leon Panetta, before a Senate committee in a confirmation hearing for his appointment as Secretary of Defense, June 9, 2011
18 Attack Targets Source: Mandiant derived from approximately 120 APT victims Mandiant had exposure to over the past 18 months. I t d i t t i t k d In today s environment, any enterprise must work under the assumption that it is a potential target for attack
19 The Privileged Connection Cyber-Attack on Canada the attackers used executive spear-phishing to capture control of Canadian The Pacific Sony RSA Northwest Attack National Laboratory incident in the US (July 2011) government officials individual machines [..] Once the attackers had access, they [The... This intruders attackers] second had group seek used of user very hackers sophisticated was seek with t able kb and better, to obtain aggressive more a privileged relevant, e techniques privileges account esil to obtain and... began to send s Privileged from the accounts officials computers, are a asking critical passwords for step passwords to in servers to various [they] unauthorized compromise moved a on access, root to gain domain hide access their controller to presence key access obtain that high a was from to privileged value high shared system targets, value account by administrators targets the which lab included and its and servers. [...] many attacks government to gain officials access gave to up the these enterprise s passwords as core the s escalate process partner [ ] experts privileges the g intruders and inside IT and tried the Non-IT servers. to recreate specific and server elevate administrators. account privileges appeared dt to come from a legitimate t source [ ] ]Th The Chinese cyber-attack on Canada assets and cause damage - Uri Sony s Information Rivner, statement Head Week of regarding New interviewing Technologies, the attack, PNNL Consumer May CIO Jerry 13, 2011 Johnson, Identity Protection, Sep 19, 2011 RSA demonstrates the reason why privileged account privileged passwords accounts should never be shared among employees, or left static and unchanged - Identity Week, Sep 22, 2011
20 Realistic Approach to Neutralizing Advanced Targeted Threats Cost Sandboxing DLP/DAM "App Stores"/Whitelisting Vulnerability Avoidance Lean Forward Hardened Net/Computer Forensics Situational Awareness/SIEM Exception Monitoring Role Engineering/NAC Risk Due Diligence Change Control/Config. Mgmt. Intrusion Prevention/Incident Resp. Vulnerability Management Privilege Management/Sep. of Duties Minimize vulnerabilities and attack apertures, make sure the business can still operate then focus on the threat.
21 Gartner Privileged Account Activity Management (PAAM) Manage use and usage of shared accounts and passwords Manage superuser privileges Manage sessions for shared and other privileged accounts Monitor usage of these accounts with "keystroke" granularity Confidential and Internal Copyrights 2010 Cyber Ark Software
22 The Complexities Of The Modern Datacenter Line of Business A Public Cloud Enterprise Central Datacenter Business User IT Personnel IT Personnel Developer Infrastructure Outsourced Datacenter Line of Business B Business Applications Operating Systems Business User IT Personnel Infrastructure Developer Infrastructure Outsourced IT Personnel 21
23 SaaS SaaS Enterprise 1 Business Business Applications Business Application A Application B Developer Operating Systems Enterprise 2 Business User Infrastructure Business User Enterprise IT Environment IT Personnel Characteristics: - Accessible anywhere, anytime - No development & administrative costs - Minimal waste pay for what you use
24 PaaS Enterprise 1 PaaS Business Applications Developer Operating Systems IT Personnel Enterprise 2 Infrastructure Characteristics: Enterprise IT Environment - Minimal waste pay for what you use - No additional SW costs - Agile development - Shorter development lifecycles Developer
25 IaaS Enterprise 1 IaaS IT Personnel Business Applications Operating Systems IT Personnel IT Personnel Business Applications Operating Systems Infrastructure Infrastructure Enterprise 2
26 Hosted Datacenters Hosted Business Applications Operating Systems IT Personnel Infrastructure Enterprise IT Environment
27 Managed Datacenters Managed IT Personnel Business Applications Operating Systems IT Personnel Infrastructure Enterprise IT Environment
28 Private Cloud Line of Business A My Enterprise IT Delivery Business Applications Business User Operating Systems Developer IT Personnel Business User Business Applications Operating Systems Infrastructure Developer Infrastructure Line of Business B
29 Risks When Moving To The Cloud Where is my data physically located? Is there strict tenant isolation? Who can access and view my data? Is there full HA & DR? What are the procedures of preventing data leakage? Is my data being backed up? Can I switch providers easily? What other risks are lurking out there? 28
30 Bottom Line The right to audit Large enterprises want/need control of their data wherever it is Periods of transition = uncertainty t Security and PIM solutions required to protect sensitive data even in the cloud Premium security services Allows vendors to offer the Fort Knox security services customers are demanding Become the Trusted Advisor If security for using the cloud is the customers key areas of concern, we need to be there with our knowledge and expertise 29
31 What to Do? Data Resources Users Processes Privileged Activities are Everywhere! Policies Permissions Keys/Passwords Accounts 30
32 What to Do? 7 Steps to PIM/PAAM Best Practices 1) Include Privileged Identities within Security/IAM project(s) scope 2) Identify key systems, applications and databases AND the underlying privileged il account(s) that exist in each one 3) Identify Who Should have access to these accounts 4) Determine Who Does have access to these accounts 5) Define Policies for Privileged access to key systems Dual-Control approval, time based access, password changes Down to session and command level policies 6) Implement processes to automatically apply policy definitions Manual or Automated 7) Monitor and report actual adherence to defined policies Via SIEM tools, GRC tools, PIM reports et al 31
33 PRIVILEGED IDENTITY AND PRIVILEGED SESSION MANAGEMENT 32
34 Unified Workflows for Accessing Privileged Accounts Unix Admins Windows Admins DBAs VM Admins External Vendors Business Applications Auditor/ Security & Risk SU Workflow SSH / X / Telnet Session Workflow Admin Workflow App AIM Workflow Workflow Monitoring & Reporting Workflow I just need root to patch the database I need my service provider to connect remotely with root PIM/PSMSuite I need to check out the root password I have this script that connects with root every night Great, what are your root entitlements, who used it and why? Virtual Servers Unix /Linux Servers Windows Servers iseries zseries Mainframes Mainframes Databases Applications Network Security Devices Appliances Unix Linux Windows AS400 OS390
35 Privileged Identity Management Components External Vendors Portal/Web Access Identity Management Ticketing Systems IT Personnel Auditors Policy Controller/Auto-discovery Secure Digital Vault Monitoring i & SIEM Applications Enterprise Directory and more Developers & DBAs 34
36 Expanding from Managing Accounts to Managing Sessions External Vendors IT Personnel Auditors Portal/Web Access Secure, manage Isolate, control, Privileged Privileged and track and monitor Identity Session privileged privileged Management accounts Management sessions Policy Controller/Auto-discovery Secure Digital Vault Identity Management Ticketing Systems Monitoring i & SIEM Applications Enterprise Directory and more Developers & DBAs 35
37 PIM Minimizes Concerns In The Cloud Policy-based access restriction- full audit trail & accountability Monitor activity Web interface to view activity and define policies & workflows Session recording Business continuity - Password versioning if lost or broken Integrate with my existing IT authentication systems whether in the cloud or on-premise Compliant-ready solution proven COTS solutions in thousands of organizations Secure storage Tamper-proof vault for passwords & recordings Password encryption when in transit & at rest 36
38 General PIM Capabilities for Cloud Strict control over external administrators Session monitoring and recording Privileged SSO to prevent divulging of credentials Segregation of duties and granular admin access control Detailed audit trails PIM reporting Hosting provider can see full audit across the system while each customer can see their own sub-set of audit info, entitlements etc. (segregation of duties / multi-tenancy) Policy level definition can be set per tenant (customer) Protecting critical applications and databases Eliminating hard-coded passwords from scripts and applications Protecting DBA and key application accounts 37
39 Cloud Provider With Multi-Tenant Infrastructure Increase my selling value Offer premium security services; differentiate from competition Protect my reputation & minimize financial losses Improve my security posture and reduce insider threat Dispel security concerns Guarantee security best practices & prove to my customers that I am protecting their assets Strict tenant isolation built-in segregation of duties Approach compliance with confidence e.g. SAS 70, PCI, SOX Improve SLAs Automation & web-based based system means better operational efficiency & quicker time to resolution We believe many organizations will pay a premium to cloud providers that are known to be secure. Source: Ponemon Institute, Security of Cloud Computing Users: A Study of Practitioners in the US & Europe, May
40 Cyber-Ark Privileged Identity & Session Management ImprovingYourSecurity Posture With A Preventative Approach Privileged Access Control Protecting ti & Isolating Sensitive Assets Securing Critical Applications Continuous Activity Monitoring 39
41 Cyber-Ark s Solutions Suites: Sensitive Information Management Suite Privileged Identity Management Suite Privileged Session Management Suite Governed File Transfer Suite Secure Manager Sensitive Document Vault Enterprise Password Vault Application Identity Manager On-Demand Privileges Manager PSM for Servers PSM for Databases PSM for Virtualization Confidential and Internal Copyrights 2011 Cyber-Ark Software
42 Unified Workflows for Accessing Privileged Accounts Unix Admins Windows Admins DBAs VM Admins External Vendors Business Applications Auditor/ Security & Risk OPM Workflow SSH / X / Telnet PSM Workflow EPV Workflow AIM AIM Workflow Workflow Monitoring & Reporting Workflow I just need root to patch the database I need my service provider to connect remotely with root PIM/PSMSuite I need to check out the root password I have this script that connects with root every night Great, what are your root entitlements, who used it and why? Virtual Servers Unix /Linux Servers Windows Servers iseries zseries Mainframes Mainframes Databases Applications Network Security Devices Appliances Unix Linux Windows AS400 OS390
43 PIM for the Cloudy Enterprise IaaS Privileged Session Manager Vault Auditors PVWA/CPM/PSM IT My Enterprise Security/ Risk Management Enterprise IT Environment 42
44 PIM for the Cloudy Enterprise Managed Services IT Vault Auditors PVWA/CPM Privileged Session Manager IT My Enterprise Security/ Risk Management Enterprise IT Environment 43
45 PIM for the Managed Service / IaaS / Hosting Providers Hosting Data Center Vault (HA Cluster) Auditors IT Environment IT PVWA/CPM/PSM Auditors Central Policy Manager IT Environment Security/ Risk Management Auditors Enterprise 1 Enterprise 2
46 Key Takeaways Vendor Perspective Increase selling value Protect reputation & minimize financial losses Dispel security concerns Strict t tenant t isolation Approach compliance with confidence Improve SLAs Customer Perspective Policy-based access restriction Monitor activity Business continuity IT infrastructure integration Compliant-ready Secure storage 45
47 Summary: Privileged Identity & Session Management A comprehensive platform for isolating and preemptively protecting your datacenter whether on premise or in the cloud Discover all privileged accounts across datacenter Manage and secure every credential Enforce policies for usage Record and monitor privileged activities React and comply 46
48 USE CASES / DEMO
49 Who Dun it? Fresh Headlines Auditing tools will only tell you what user was logged in not who it REALLY was!!! Cyber-Ark gives you the integration point to show WHO the user was. Source: Independent Oracle Users Group 48
50 So What about multiple Fresh users?? Headlines In some organizations multiple users may need to use the same credential at the same time, how do you differentiate between the users? Solution: Privileged Session Management: 49
51 Whitelists, Blacklists, Fresh and Lists Headlines of All Shapes and Sizes Administrators may need to be restricted in what they can accomplish when using a privileged Identity 50
52 Collaborate Contribute Connect The Knowledge Center is a collection of resources and online communities that connect ISACA members globally, across industries and by professional focus - under one umbrella. Add or reply to a discussion, post a document or link, connect with other ISACA members, or create a wiki by participating in a community today!
PRIVILEGED IDENTITY MANAGEMENT CASE STUDY. Barak Feldman, Cyber-Ark Software Seth Fogie, Lancaster General Health
PRIVILEGED IDENTITY MANAGEMENT CASE STUDY Barak Feldman, Cyber-Ark Software Seth Fogie, Lancaster General Health November 10, 2011 Cyber-Ark Overview! Established in 1999, HQ Boston, MA Strategic Partnerships!
GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development
GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development Digital Government Institute Cyber Security Conference June 3, 2010, Washington, DC The Privileged Challenge?
Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA
Learn From the Experts: CyberArk Privileged Account Security Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA Stallion Shooting Event 20.06.2014 Privileged Accounts are Targeted in All Advanced Attacks
SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS
SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS Cyber-Ark Overview Established in 1999, HQ Boston, US Strategic Partnerships Offices Worldwide Award-winning patented Vaulting Technology 50% CAGR
Privileged Session Management Suite: Solution Overview
Privileged Session Management Suite: Solution Overview June 2012 z Table of Contents 1 The Challenges of Isolating, Controlling and Monitoring Privileged Sessions... 3 2 Cyber-Ark s Privileged Session
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions
Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions z September 2011 Table of Contents EXECUTIVE SUMMARY... 3 CYBER-ARK
Privileged - Super Users out of Control
ID WORLD Abu Dhabi 18-19 March 2012 Secure ID in the Digital World Jochen Koehler Regional Director Cyber Ark Software Privileged - Super Users out of Control Organized by: Conference Host: PRIVILEGED
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect and respond to privileged accounts
The CyberArk Privileged Account Security Solution A complete solution to protect, monitor, detect and respond to privileged accounts Table of Contents The Privileged Account a Real, Pervasive, Threat...3
The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect, alert and respond to privileged accounts
The CyberArk Privileged Account Security Solution A complete solution to protect, monitor, detect, alert and respond to privileged accounts Table of Contents The Privileged Account a Real, Pervasive, Threat...3
The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller
Learn How Privileged Account Security Solutions are the Right Painkiller Table of Contents Introduction: Control Access, Empower Team 3 The 10 Pains of UNIX Security 4 Pain No.1: Protecting the Keys to
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
With Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang [email protected]
PCI DSS Compliance: The Importance of Privileged Management Marco Zhang [email protected] What is a privileged account? 2 Lots of privileged accounts Network Devices Databases Servers Mainframes Applications
privileged identities management best practices
privileged identities management best practices abstract The threat landscape today requires continuous monitoring of risks be it industrial espionage, cybercrime, cyber-attacks, Advanced Persistent Threat
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Securing Sensitive Data within Amazon Web Services EC2 and EBS
Page 1 Securing Sensitive Data within Amazon Web Services EC2 and EBS Challenges and Solutions to Protecting Data within the AWS Cloud Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States:
Cloud Security: Getting It Right
Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon
Windows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
Next Generation Jump Servers for Industrial Control Systems
Next Generation Jump Servers for Industrial Control Systems Isolation, Control and Monitoring - Learn how Next Generation Jump Servers go beyond network separation to protect your critical infrastructure
PowerBroker for Windows
PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 5 Sample Regulatory Requirements...
SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS. Presenter: Terence Siau
SECURE, MANAGE & CONTROL RIVILEGED ACCOUNTS & SESSIONS resenter: Terence Siau Agenda Company Introduction Today s Security Challenges rivileged Identity Management Suite Overview rivileged Session Management
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS
SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS The Challenges and the Solutions Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732 United Kingdom: +44.118.949.7711
Privileged Identity Management. An Executive Overview
Privileged Identity Management An Executive Overview Privileged Identity Management Contents What You Need to Know................................................... 3 Privileged Identities Explained............................................
The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015
The State of Data Security Intelligence Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report The State of Data Security
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
Securing the Cloud through Comprehensive Identity Management Solution
Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
Leveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT
Document K23 RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT THE BOTTOM LINE Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities. Cyber-Ark
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
PowerBroker for Windows Desktop and Server Use Cases February 2014
Whitepaper PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 4 Sample Regulatory
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
CLOUD SECURITY: THE GRAND CHALLENGE
Government Ware: GovWare Singapore September 29, 2010 CLOUD SECURITY: THE GRAND CHALLENGE Glen Gooding Asia Pacific Security Leader IBM Corporation [email protected] Rest safe: Google saves the day
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Secure Your Cloud and Outsourced Business with Privileged Identity Management
Secure Your Cloud and Outsourced Business with Privileged Identity Management Table of Contents Executive Summary... 3 Understanding Privilege... 3 Do All Service Providers Get It?... 5 Managing Privilege
Security Officer s Checklist in a Sourcing Deal
Security Officer s Checklist in a Sourcing Deal Guide Share Europe Ostend, May 9th 2014 Johan Van Mengsel IBM Distinguished IT Specialist IBM Client Abstract Sourcing deals creates opportunities and challenges.
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA
RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
