USER ACTIVITY MONITORING FOR IBM SECURITY PRIVILEGED IDENTITY MANAGER



Similar documents
HOW OBSERVEIT ADDRESSES KEY INDIA DOT REMOTE ACCESS SECURITY REQUIREMENTS

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

HOW OBSERVEIT ADDRESSES 7 OF THE SANS 20 CRITICAL SECURITY CONTROLS

Edit system files. Delete file. ObserveIT Highlights. Change OS settings. Change password. See exactly what users are doing!

ObserveIT User Activity Monitoring software meets the complex compliance and security challenges related to user activity auditing.

Record and Replay All Windows and Unix User Sessions Like a security camera on your servers

ObserveIT User Activity Monitoring

OBSERVEIT 6.0 WHAT S NEW

Privileged Session Management Suite: Solution Overview

OBSERVEIT TECHNICAL SOLUTION OVERVIEW

Adding ObserveIT video audit logs to your SIEM

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Remote Workers are Under Control

ISO COMPLIANCE WITH OBSERVEIT

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

Secret Server Qualys Integration Guide

How to Use Remote Access Using Internet Explorer

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Ekran System List of Frequently Asked Questions

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

OBSERVEIT TECHNICAL INFORMATION FOR SALES TEAM. Created by Alex Ellis Pre-Sales Engineer - 2/26/14

Securing Remote Vendor Access with Privileged Account Security

Securing Your Business s Bank Account

OBSERVEIT DEPLOYMENT SIZING GUIDE

Netwrix Auditor for Active Directory

PowerBroker for Windows Desktop and Server Use Cases February 2014

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

MITEL UNIFIED COMMUNICATOR ADVANCED

What s New in Centrify Server Suite 2015

Desktop Activity Intelligence

Complete Patch Management

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

How To Manage A Privileged Account Management

Data Sheet: Work Examiner Professional and Standard

Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors

Using Outlook Web Access (OWA) & Remote Web Workplace

Netwrix Auditor for SQL Server

How do I use Citrix Staff Remote Desktop

PowerBroker for Windows

Netwrix Auditor. Administrator's Guide. Version: /30/2015

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Next Generation Jump Servers for Industrial Control Systems

Centralized Self-service Password Reset: From the Web and Windows Desktop

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Vistara Lifecycle Management

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

HDA Integration Guide. Help Desk Authority 9.0

User Guide. Version R91. English

AdminToys Suite. Installation & Setup Guide

End Your Data Center Logging Chaos with VMware vcenter Log Insight

Table of Contents Cicero, Inc. All rights protected and reserved.

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

CloudCall for Salesforce- Quick Start Guide. CloudCall for Act! CRM Quick Start Guide

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Configuration Information

Shell Control Box 4 LTS Product Description

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Reports, Features and benefits of ManageEngine ADAudit Plus

Citrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Trust but Verify: Best Practices for Monitoring Privileged Users

Shell Control Box 3 F5

MONyog White Paper. Webyog

Remote Access: Internet Explorer

Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA

Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9

QUICK INSTALLATION GUIDE ACTIVATE

What s New in Centrify Server Suite 2014

Concierge SIEM Reporting Overview

SmartCode. v5.0. VNC Manager. Award Winning Remote Computer Management Software. Powerful tool to control all your computers from one program

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

What s New in Centrify DirectAudit 2.0

Contextual Authentication: A Multi-factor Approach

Remote Management Reference

Netwrix Auditor for Windows Server

IC L05: Security.cloud Configuring DLP on to your flow & Applying security to your Office 365 or Google Apps deployment Hands-On Lab

Metasploit Pro Getting Started Guide

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Privileged Access Management 15.2 Available Features

Administration Guide NetIQ Privileged Account Manager 3.0.1

User manual of the Work Examiner Contents

Configuration Information

FortyCloud Installation Guide. Installing FortyCloud Gateways Using AMIs (AWS Billing)

Drawbacks to Traditional Approaches When Securing Cloud Environments

Transcription:

USER ACTIVITY MONITORING FOR IBM SECURITY PRIVILEGED IDENTITY MANAGER User Activity Monitoring is an essential add-on to IBM Security Privileged Identity Manager, providing management of user-based risk. ObserveIT adds comprehesnive user activity monitoring, recording, alerting and reporting to IBM s identity management and enterprise single-sign-on capabilities. VIDEO REPLAY AND ACTIVITY ANALYSIS ObserveIT is tightly integrated with IBM Security Privileged Identity Manager (PIM), allowing administrators to play back video of any user session from within the PIM environment. The video shows exactly what occurred on screen during the session, providing unparalleled transparency into all privileged user activities. Going far beyond simply recording the onscreen activity to video, ObserveIT transcribes every session into an easy-toread user activity log so that watching the video isn t necessary to know what the user did. Clicking on any particular event in the log launches the video playback from that exact moment. This activity analysis is also used to generate real-time user activity alerts and reporting. REAL-TIME USER ACTIVITY ALERTS When user-based attacks occurs, every second counts. The longer a threat goes undetected, the more damage a company will incur in terms of both financial costs and brand reputation. Without the ability to monitor privileged user activity in real-time, companies will continue to suffer from undetected user-based threats for extended periods of time.

ObserveIT s user activity analytics instantly alert IT security teams to abnormal, suspicious or malicious user activity. The fully-customizable alerts are integrated throughout the system, and are even overlaid into session replay. Furthermore, each alert can be assigned a notification policy which designates who gets notified and at what frequency. Alert details are overlaid in the session player, at the moment in the video that the alert was generated. KEYWORD-BASED ACTIVITY SEARCH ObserveIT captures detailed session activity data and makes it immediately available for alert generation and freetext keyword searching. Administrators, IT security officers and auditors can search for specific mouse or keyboard actions matching: names of applications run text typed, edited, pasted, selected, auto-completed, etc. titles of windows opened checkboxes and radio buttons clicked URLs accessed via browsers commands and scripts run in the CMD console Every resulting search hit is linked directly to the portion of the video where that action occurred. This makes it incredibly easy to find the exact moment that any particular action was performed from among thousands of hours of user activity.

ZERO-GAP MONITORING, ANALYSIS, ALERTING AND INTERVENTION ObserveIT monitors, records and analyzes privileged user activity in every application, Web page and window. Beyond Windows servers, ObserveIT also supports Windows desktop and Unix/Linux environments, regardless of how users log in (Remote Desktop, Terminal Services, VMware, GoToMyPC, LogMeIn, SSH, Telnet, ICA, local login, etc.). Addressing a major security gap in most organizations, ObserveIT even generates user activity logs and screen recordings for commercial, legacy, bespoke and cloud apps, including those with no internal logging facilities of their own. Administrators can observe live sessions in progress and can lock a session and user account from within ObserveIT if they wish to immediately stop a suspicious or dangerous activity. This is particularly useful in the event that the system generates a real-time alert: the administrator receiving the alert can view all activity occurring in the live session screen, rewind to see the actions that led up the alert and take immediate action to prevent further risk. Additionally, the recordings and resulting user activity logs are valuable for root cause analysis, ad hoc IT forensics and regulatory compliance audit reporting. Reports can be customized to specific business needs and can be scheduled or run on demand. LOW RESOURCE REQUIREMENTS ObserveIT utilizes ultra-efficient data storage, requiring less than 250GB/year for a high-usage, 1000-server environment. The local agents have a minimal footprint of 1%-2% CPU utilization, 10 MB RAM during session and 0% CPU when users are inactive.

HOW IT WORKS STEP 1: Privileged user requests access STEP 2: Manager approves access request STEP 3: User logs in using shared credentials STEP 4: User s session is recorded and analyzed STEP 5: User logs off, credentials checked back in STEP 6: Auditor runs a report and selects a session to view STEP 7: Auditor reviews activity log and can click any activity/event to launch the video at that particular point of interest

OBSERVEIT FEATURE HIGHLIGHTS Screen capture recording plus video activity analysis for searchable, text-based logging of all user activity Real-time alerts provide immediate awareness of suspicious, dangerous and out-of-policy behavior Advanced keylogging enables keyword searching to instantly find any on-screen mouse or keyboard action Records actions in all system areas and all apps zero-gap recording of all commercial, legacy, bespoke and cloud apps plus all system areas Supports all connection methods, including local login, Citrix, VMware, VNC, Dameware, Remote Desktop, Terminal Services, PC Anywhere, etc. SIEM, NMS and IT ticketing system integration for better security and easier investigations including direct links to session replay and user activity logs Privileged User Identification, without requiring password rotation or check-in/check-out Threat detection console detects and pinpoints suspicious activity DBA Activity Audit monitors and audits all SQL queries executed by DBAs against production databases Pre-built and customizable audit reports can be exported to Excel or XML, or scheduled to run automatically for email delivery TRUSTED BY 1200+ CUSTOMERS OBSERVEIT IDENTIFY AND MANAGE USER-BASED RISK Start monitoring in minutes, free: www.observeit.com/tryitnow