GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development



Similar documents
PRIVILEGED IDENTITY MANAGEMENT CASE STUDY. Barak Feldman, Cyber-Ark Software Seth Fogie, Lancaster General Health

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS

Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA

MANAGEMENT IN THE CLOUD ADAM BOSNIAN

Privileged Session Management Suite: Solution Overview

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) An Assessment of Cyber-Ark's Solutions

The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS. Presenter: Terence Siau

Privileged - Super Users out of Control

Windows Least Privilege Management and Beyond

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Secret Server Qualys Integration Guide

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect and respond to privileged accounts

How To Manage A Privileged Account Management

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Privilege Gone Wild: The State of Privileged Account Management in 2015

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Privileged Access Control

Privileged Access Life-Cycle Management: How PALM Enables Security, Compliance, and Efficiency for Enterprise IT

Privilege Gone Wild: The State of Privileged Account Management in 2015

2013 AWS Worldwide Public Sector Summit Washington, D.C.

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect, alert and respond to privileged accounts

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Virtualization Impact on Compliance and Audit

Take Control of Identities & Data Loss. Vipul Kumra

Secure Your Cloud and Outsourced Business with Privileged Identity Management

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Trust but Verify: Best Practices for Monitoring Privileged Users

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

PowerBroker for Windows

<Insert Picture Here> Oracle Database Vault

WHITE PAPER. Improving Efficiency in IT Administration via Automated Policy Workflows in UNIX/Linux

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

ObserveIT User Activity Monitoring

Secret Server Splunk Integration Guide

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Cyber-Ark Software and the PCI Data Security Standard

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

PowerBroker for Windows Desktop and Server Use Cases February 2014

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Complete Database Security. Thomas Kyte

Privileged Account Management Mar3n Cannard, Security Solu3ons Architect

Enforcive / Enterprise Security

Privileged Identity Management

Minimize Access Risk and Prevent Fraud With SAP Access Control

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

IBM Security Privileged Identity Manager helps prevent insider threats

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Zero Trust. Privileged Access Management

Service & Process Account Management

Company Overview. Enterprise Cloud Solutions

Protecting Sensitive Data Reducing Risk with Oracle Database Security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

<Insert Picture Here> Oracle Database Security Overview

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

Leveraging Privileged Identity Governance to Improve Security Posture

Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

How to Audit the Top Ten E-Business Suite Security Risks

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

How to best protect Active Directory in your organization. Alistair Holmes. Senior Systems Consultant

Privileged Administra0on Best Prac0ces :: September 1, 2015

8 Steps to Holistic Database Security

Privileged Identity Management. An Executive Overview

Securing Database Servers. Database security for enterprise information systems and security professionals

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Symantec Mobile Management 7.2

MySQL Security: Best Practices

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Transcription:

GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development Digital Government Institute Cyber Security Conference June 3, 2010, Washington, DC

The Privileged Challenge? 3

The Privileged Challenge! The Insider Threat Childs City of SF Aleynikov - Goldman Makwana Fannie Mae Kerviel - SocGen 4

The Insider Threat: Some Hard Truths No. 1 security concern of large organizations is THE INSIDER THREAT (IDC Analyst Group) 33% of the crimes committed using shared accounts (CERT) 29% could not identify the individuals responsible for committing the crime (CERT) 50% of those with privileged access were no longer supposed to have it (Carnegie Mellon, DOD) 92% of all the insiders attacked following a negative work-related event like termination, dispute, etc. (CERT)

Privileged Identity Privileged Management Identity Management 101 Scope Used by Used for Elevated Personal Personal accounts w/ elevated permissions jsmith_admin IT staff Privileged operations Access to sensitive information Shared Privileged Accounts Application Accounts (App2App) Administrator UNIX root Cisco Enable Oracle SYS Local Administrators ERP admin Hard coded/ embedded App IDs Service Accounts IT staff System admins Network admins DBAs Help desk, etc Developers Legacy application Highly Powerful Difficult to Control, Manage & Monitor Hard-Coded, Unchanged Pose Devastating Risk if Misused Applications Scripts Windows Services Scheduled Tasks Batch jobs, etc Developers Emergency Fire-call Disaster recovery Privileged operations Access to sensitive information Online database access Batch processing App-2-App communication

The Holistic Privilege The Holistic Challenge Privileged Challenge Accounts Data Privileged Operations Permissions Processes Keys/Passwords Users

Privileged Users Privileged and Privileged Users and Privileged Accounts Accounts Privileged Account Management requirements Manage the credentials of Privileged Accounts Manage access control for sharing Privileged Accounts Manage Application/Service Accounts Audit and monitoring - accountability around usage of Privileged Accounts Privileged User Management Requirements Segregate and restrict super-user usage to lowest needed privileges Allow native users to elevate to a super-user mode Provide granular access control at the command level Audit and track super-user session activity Really are Two Sides of the Same Coin! Need to be managed consistently and coherently across the enterprise

Privileged Identity Privileged Management Identity Management Drivers Drivers Current Security Questions on Privileged and Application Accounts: Can you prove that you are protecting access to key accounts? Who is acting as System Administrator for this activity? Can you prove that John Smith s access to the Firecall ID was properly approved? Can you show me what Jill Jones did within his session as root last week? Have you removed hard-coded passwords from your web applications? Are you changing the Service Account passwords inline with company policy? Can you prove that you are protecting access to credit card information internally? PCI, SOX, NERC, BASEL & HIPAA are all diving deeper into Privileged Accounts and Sessions

The Cyber-Ark View : It s No Longer Just About Who It s No Longer Just About Who? WHO? remains the #1 audit issue from new prospects BUT It is only part of the challenge being highlighted by auditors today Aggressive requirements outside just Who and Heart-beat users WHAT? are people doing quickly moving up the priority ladder Increasingly cited and raised by Security and Audit personnel And can you STOP them? Embedded Application Identity challenge increasingly highlighted PCI (6.3.6) driving much of the activity

. It s No Longer Just on Servers... Copiers/Scanners/MFPs Point of Sale (POS) devices Laptops/Desktops running applications Application Encryption Key management Telephony/VOIP Systems Systems running remote sites eg - Grid stations Non-privileged Shared Accounts Mobile Devices Mainframes

Privileged Identity Management Best Practices 1. Identify key systems, applications and databases & their underlying privileged accounts 6. Receive alerts on inconsistent policy behavior, retrieve audit reports & session recordings 2. Manage who should have access to privileged accounts, leveraging existing settings from corporate directory 5. Implement processes to automatically apply the enterprise PIM policies & automate IT processes 3. Define policies, & workflows for privileged access to key systems 4. Secure the passwords in the Vault and simulate privileged account management

Cyber-Ark Solutions PIM Suite V6

The Privileged Holistic Challenge Solved! Privileged Accounts Privileged Users Privileged Sessions Sensitive Applications Compliance With Confidence Eliminate Insider Threats Improve Workforce Productivity

Why Cyber-Ark? Why PIM Cyber-Ark Suite V6 PIM Suite V6! The only integrated Privileged Account and Privileged User solution! Full lifecycle management for all aspects of privileged account management Single policy defines: Privileged account management rules (EPV) Privileged session monitoring rules (PSM) Granular access control for super-users (OPM) Integrated Privileged Account access workflows: Getting the password via PVWA Transparently connecting via PSM Natively using via OPM Central audit and reporting Central place to view audit reports and regardless of access method Privileged Session Recordings Digital Vault Built-in SOD (IT admins cannot access logs, change access controls) Tamper proof storage for audit / recordings

Why Cyber-Ark? : Widest OOTB Target Support Why Cyber-Ark? Widest OOTB Target Support

Why Cyber-Ark? : Enterprise Ready Integration Why Cyber-Ark? Enterprise Ready Integration 17

Why Cyber-Ark? Cyber-Ark Broad Synergy Industry Ecosystem Partnerships 18

Why Cyber-Ark? Undisputed Market Leadership The company has gradually expanded from its initial start as an enterprise vault for file and sensitive content sharing to assume a commanding position in privileged identity management (PIM) - Steve Coplan, April 2010 Cyber-Ark has one of the largest customer bases of the vendors included in this Market Scope and, because of its focus on enterprise customers the largest market share by revenue by a wide margin. - Ant Allan/Perry Carpenter, June 2009 Cyber-Ark is perceived as a leader in the rapidly expanding market for Privileged Access Management solutions. - Martin Kuppinger, 2010 Cyber-ark is at the top of the PIM market, based on product maturity & the number of customer deployments - Mark Diodati, 2009 19

Cyber-Ark Snapshot Established in 1999, HQ in Boston, US Offices Worldwide Cyber-Ark selected by 7 of the 10 largest banks in the world Cyber-Ark selected by 1 of every 3 Fortune 50 Companies Proven Enterprise Class Solutions Award-winning Patented Vaulting Technology Worldwide alliances with leading distributors Cyber-Ark is perceived as a leader in the rapidly expanding market for Privileged Access Management solutions. - Martin Kuppinger, Digital ID Analysis & Evaluation, 2010 Strategic Partnerships

Federal Partner DLT Solutions Cyber-Ark Federal Team Account Executive: Mid-Atlantic Tom Rines (781) 632-7837 tom.rines@cyber-ark.com Channel Management: East Michael Wrightson (609) 759-0302 michael.wrightson@cyber-ark.com DLT Team Product Specialist Manager Steve Roesch steve.roesch@dlt.com Account Executive John Sourk (703) 773-8957 john.sourk@dlt.com Account Executive Jonathan Doveala (703) 708-9125 jonathan.doveala@dlt.com Account Executive Mahtab Emdadi (703) 773-9266 mahtab.emdadi@dlt.com Account Executive Rory Cobb (703) 708-9650 rory.cobb@dlt.com

got get Cyber-Ark! solution s!

got solution s!