Zero Trust. Privileged Access Management



Similar documents
2013 AWS Worldwide Public Sector Summit Washington, D.C.

2: Do not use vendor-supplied defaults for system passwords and other security parameters

IBM Security Privileged Identity Manager helps prevent insider threats

PowerBroker for Windows

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Seven Things To Consider When Evaluating Privileged Account Security Solutions

PowerBroker for Windows Desktop and Server Use Cases February 2014

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Payment Card Industry Data Security Standard

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

PREVENTING DATA LOSS THROUGH PRIVILEGED ACCESS CHANNELS

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

How To Reduce Pci Dss Scope

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

IBX Business Network Platform Information Security Controls Document Classification [Public]

Complying with PCI Data Security

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect and respond to privileged accounts

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

Cyber-Ark Software and the PCI Data Security Standard

How To Achieve Pca Compliance With Redhat Enterprise Linux

PCI Data Security Standards (DSS)

Achieving PCI Compliance Using F5 Products

Provide access control with innovative solutions from IBM.

SafeNet DataSecure vs. Native Oracle Encryption

Did you know your security solution can help with PCI compliance too?

Strengthen security with intelligent identity and access management

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Network/Cyber Security

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

How do I secure and manage an out-of-band connection to network devices?

Security management solutions White paper. Extend business reach with a robust security infrastructure.

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Privileged Session Management Suite: Solution Overview

Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper.

IBM Tivoli Compliance Insight Manager

Secure Data Transmission Solutions for the Management and Control of Big Data

Big Data, Big Risk, Big Rewards. Hussein Syed

How to Achieve Operational Assurance in Your Private Cloud

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

CSP & PCI DSS Compliance on HP NonStop systems

What s New in Centrify DirectAudit 2.0

TRIPWIRE NERC SOLUTION SUITE

Stay ahead of insiderthreats with predictive,intelligent security

Privilege Gone Wild: The State of Privileged Account Management in 2015

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Top 12 Must-Have Features for Privileged Password Management

Privilege Gone Wild: The State of Privileged Account Management in 2015

Drawbacks to Traditional Approaches When Securing Cloud Environments

Compliance and Security Challenges with Remote Administration

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

New PCI Standards Enhance Security of Cardholder Data

Solving the Security Puzzle

Securing and protecting the organization s most sensitive data

How To Buy Nitro Security

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

Securing Remote Vendor Access with Privileged Account Security

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

ObserveIT User Activity Monitoring

Information Technology Policy

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect, alert and respond to privileged accounts

Cloud Computing Governance & Security. Security Risks in the Cloud

Accelerating PCI Compliance

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Safeguarding the cloud with IBM Dynamic Cloud Security

8 Steps to Holistic Database Security

Achieving PCI-Compliance through Cyberoam

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

ALERT LOGIC FOR HIPAA COMPLIANCE

Privileged Users. Whitepaper SUPERMAN OR SUPERTHREAT? A PRIVILEGED USER RISK WHITE PAPER

Transcription:

Zero Trust Privileged Access Management

$394,700 Mean Monetary Value of Losses Due To CyberCrime Percentage of organizations reporting specific security events: Source: U.S. CERT 2010 CyberSecurity Watch Survey

Controlling Third-Party Access Typical Risk: LeapFrog Attack Malicious user leverages authorized access to attack connected systems across a flat network. The user breaches sensitive, highvalue targets, causing data loss, fines, reputational damage and compliance failure. Scenarios like this are known as LeapFrogging. Managing Privileged Passwords Password Management Challenges Consequences and Risks Shared Administrative Passwords Unable to trace individual actions Changes are complex, time-consuming and costly Individual access is difficult to revoke Audit and compliance requirements are unattainable Hard-Coded Application-to-Application (A2A) Passwords Credential theft or inappropriate disclosure likely Modifications require code changes, testing cycles Poor password strength and complexity

Xceedium Xsuite Privileged Access Management Solution Only with Xsuite Integrated Appliance The industry s only fully integrated Privileged Access Management suite available on a single hardened appliance. Advanced Certifications Most highly certified solution; components with both Common Criteria EAL4+ and full FIPS 140-2 Level 2 certification. Application-to-Application (A2A) Passwords The only A2A solution offering complete end-toend encryption of credentials, enterprise-class scalability and breach containment. Achieve and Prove Compliance Xsuite Provides Key Privileged Access Management Requirements Limit network scope for compliance assessments Eliminate vendor-supplied and default passwords Restrict cardholder data access Establish unique user identifications Monitor network resource and cardholder data access Establish electronic access processes and procedures Enforce authentication and accountability processes Assess unauthorized access risks Monitor administrative/shared account scope and use Control and administer privileged user accounts Establish privileged command identification and dual authorization requirements Require least privilege-based access controls Enforce security-sensitive information access controls Establish security measures to reduce risk/vulnerabilities Regularly review information system activity audit logs Enforce password creation, change and safeguard procedures Create incident response policies and procedures Require unique user identification and tracking Require and monitor ephi user access authentication

Privileged Access Control Policy-Based Access Management Control Access to Systems Personalized access pages display each user s authorized systems and devices Users never see off-limits and outof-bounds resources Select a resource and access method to establish a connection Single sign-on brokered through the Password Authority Vault

Privileged Access Control Control Command Execution Prevent LeapFrogging Xceedium s patent-pending LeapFrog Prevention technology monitors and enforces policy at the network layer and tracks all activities for trusted users, blocking unauthorized access.

Privileged Password Management Manage Administrative Passwords Out-of-the-Box and Custom Connectors for Infrastructure Integration Protect administrative, super-user and root passwords Manage millions of credentials Highly scalable, highly available architecture Centralized and secure credential storage GUI, CLI, Java administration options Create workflows and reports Backup and restore Manage Application-to-Application (A2A) Passwords Secure, encrypted credentials in storage, transit and use Manage A2A password policies Centralized storage of A2A passwords Authentication of scripts and applications Complete A2A password protection

Monitor & Audit Monitor CLI, RDP, VNC Sessions Monitor everything from simple connect and disconnect logging to full keystroke capture Capture comprehensive user activity, enabling ad hoc audits, speedy troubleshooting and forensic examinations Full-screen session capture and recording; session information Embedded session meta-data and event tagging enables DVR-like playback capability with fast-forward to policy violations at specific points in time

Reporting & Analysis Report Activity Detailed logs, session recordings and pre-defined reports Simplified administration, activity monitoring, and incident alerting and resolution Xceedium Xsuite Integrated Appliance Options Model X102P X206P Processor Intel Core2 Duo 2.13Ghz Intel Xeon E5645 2Ghz Memory 4GB DDR2 6GB DDR3 ECC Storage 32GB (x2) Solid State Drive 32GB (x2) Solid State Drive Power 250W 275W Dual, Hot-Swappable Integrated Xsuite Appliance

The Xceedium Story More Than a Decade of Security-Software Expertise Founded Xceedium was originally founded in 2000 and released its first product in 2003. Xceedium acquired the Cloakware Password Authority business from Irdeto in 2011. Funding Venture backed by ArrowPath Venture Partners and Nationwide Mutual Capital Corporate Headquarters Herndon, Virginia Key Customers Government organizations and leading enterprises across vertical markets ranging from healthcare to retail and to financial services rely on Xceedium products for robust access control and the assurance of a granular, forensic audit trail for high-risk users and system events. Customers Commercial Government Top 5 Bank Top 3 Telecommunications Company Fortune 10 Financial Services Company Top 5 Retailer Top 15 Bank Fortune 200 Food Products Company Top 3 Online Broker Top 3 Smart Phone Provider Top 5 Food & Drug Retailer

About Xceedium Certifications Common Criteria EAL4+ System Access Control/Sensitive Data Protection Federal Information Processing Standards FIPS 140 2 Level 2 JITC - PKI/CAC Gartner Cool Vendor in Infrastructure Protection The appliance-based approach to superuser privilege management works well for scenarios such as outsourcing, in which all access can be funneled through gateways. Forrester Hot Companies to Watch The Xceedium GateKeeper solution is particularly valuable to IT organizations that must meet strict compliance requirements for internal IT employees or rely heavily on outsourced providers and vendors for infrastructure work. IDC Buyer Case Study: Department of Homeland Security According to the DHS security expert, the appliance has increased security awareness training, handles remote access security functions, enforces least privilege, is scalable and was dropped into the infrastructure without affecting the holistic process in place. Enterprise Management Associates Many enterprises have invested heavily in perimeter defense, yet still have open and unmediated access for both internal and external IT operations. Administrators, consultants, vendor support, and even power technicians can do just about anything they please. Xceedium s comprehensive approach integrated, granularly secured in-band and out-of-band access addresses this threat. Analyst Views Industry Recognition Gartner Cool Vendor Forrester Hot Companies Red Herring Global 100 Network World Best of Show RSA Technosium 2010 Global 100 Network Products Best Overall IT Company of the Year 2011 Everything Channel's CRN "Need to Know" List for Security GSN Magazine Best Network Security Product

www.xceedium.com Corporate Headquarters 2214 Rock Hill Road, Suite 100 Herndon, VA 20170 +1-877-636-5803 Copyright 2011, Xceedium, Inc.