Learn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA



Similar documents
PRIVILEGED IDENTITY MANAGEMENT CASE STUDY. Barak Feldman, Cyber-Ark Software Seth Fogie, Lancaster General Health

Valery Milman CYBERARK PRIVILEGED ACCOUNT SECURITY

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS

MANAGEMENT IN THE CLOUD ADAM BOSNIAN

Privileged Session Management Suite: Solution Overview

Privileged - Super Users out of Control

GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development

CyberArk Privileged Threat Analytics. Solution Brief

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect and respond to privileged accounts

Seven Things To Consider When Evaluating Privileged Account Security Solutions

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS. Presenter: Terence Siau

The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller

The CyberArk Privileged Account Security Solution. A complete solution to protect, monitor, detect, alert and respond to privileged accounts

Pass-the-Hash. Solution Brief

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

With Great Power comes Great Responsibility: Managing Privileged Users

Trust but Verify: Best Practices for Monitoring Privileged Users

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) An Assessment of Cyber-Ark's Solutions

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Privileged Identity Management. An Executive Overview

The Cloud App Visibility Blindspot

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

ObserveIT User Activity Monitoring

Next Generation Jump Servers for Industrial Control Systems

Privileged Identity Management

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Best Practices for Information Security and IT Governance. A Management Perspective

1 Introduction Product Description Strengths and Challenges Copyright... 5

Privilege Gone Wild: The State of Privileged Account Management in 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Q1 Labs Corporate Overview

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

How To Manage A Privileged Account Management

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Securing Remote Vendor Access with Privileged Account Security

Privilege Gone Wild: The State of Privileged Account Management in 2015

USER ACTIVITY MONITORING FOR IBM SECURITY PRIVILEGED IDENTITY MANAGER

QRadar SIEM and FireEye MPS Integration

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Administration Guide NetIQ Privileged Account Manager 3.0.1

What is Security Intelligence?

RETHINK SECURITY FOR UNKNOWN ATTACKS

Vulnerability Management

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

#ITtrends #ITTRENDS SYMANTEC VISION

Enterprise Database Security & Monitoring: Guardium Overview

Endpoint Threat Detection without the Pain

Copyright 11/1/2010 BMC Software, Inc 1

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Cloud Data Security. Sol Cates

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

The Benefits of an Integrated Approach to Security in the Cloud

Protecting the keys to your kingdom against cyber-attacks and insider threats

The 7 Tenets of Successful Identity & Access Management

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

IPLocks Vulnerability Assessment: A Database Assessment Solution

Windows Least Privilege Management and Beyond

OVERVIEW. Enterprise Security Solutions

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

1518 Best Practices in Virtualization & Cloud Security with Symantec

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

eeye Digital Security Product Training

Security Solution Architecture for VDI

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Effective End-to-End Cloud Security

Security Analytics The Beginning of the End(Point)

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Vistara Lifecycle Management

Transcription:

Learn From the Experts: CyberArk Privileged Account Security Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA Stallion Shooting Event 20.06.2014

Privileged Accounts are Targeted in All Advanced Attacks Anything that involves serious intellectual property will be contained in highly secure systems and privileged accounts are the only way hackers can get in. Avivah Litan, Vice President and Distinguished Analyst at Gartner

Privileged Accounts are Targeted in All Advanced Attacks 100% of breaches involved stolen credentials. APT intruders prefer to leverage privileged accounts where possible, such as Domain Administrators, service accounts with Domain privileges, local Administrator accounts, and privileged user accounts. Mandiant, M-Trends and APT1 Report

Analyst review

Analyst review

Analyst review

Analyst review

Regulations A.11.2. Managing user access Users registration Managing the privildges Managing user passwords Preview of access D Recomendation Predefined rulles for access control Control over third party access ( App service ) Password lenght requiremnts Rulles about encryption and storing the keys And others

CyberArk Customers Communications and media Financial Sector Medicial sector Energy and mining Industry

CyberArk Overview Trusted experts in privileged account security Over 1,500 privileged account security customers it s all we do! Founded in 1999 HQ Boston MA Approach privileged accounts as a security challenge Designed and built from the ground up for security Focus on solving business problems Privileged account security goes well beyond audit Only comprehensive privileged account security solution One solution, focused exclusively on privileged accounts Enterprise proven

Stopping the Attack That s Inside Your Network Privileged Accounts Perimeter Breach Attack Goal DETECT PROTECT RESPOND

CyberArk Solutions Management Portal/Web Access Enterprise Password Vault Privileged Session Manager Application Identity Manager On-Demand Privileges Manager Privileged Threat Analytics Master Policy Secure Digital Vault DETECT PROTECT RESPOND

Risk Assessment Case 2001 2013 Number of employees that knew the password and have left the company 40+ Number of times the password was used 100,000+ What is managed by the account unknown

Unified Workflows Unix Admins Windows Admins DBAs VM Admins External Vendors Business Applications Auditor/ Security & Risk OPM Workflow SSH / X / Telnet PSM Workflow EPV Workflow AIM AIM Workflow Workflow Monitoring & Reporting Workflow Virtual Servers Unix /Linux Servers Windows Servers iseries zseries Mainframes Mainframes Databases Applications Network Devices Security Websites & Appliances Web apps

Automatically Discover Privileged Accounts Across the Datacenter Unix/Linux Servers Vmware ESX/ESXi Linux virtual images Windows virtual images Windows Servers Windows Services Scheduled Tasks IIS Pools Windows Desktops & Laptops Where do all the privileged and superuser accounts exist?

Central and Integrated Policy Definition Security/ Risk Management Password Vault Web Access Central Policy Manager System User Pass Unix Oracle Windows z/os Cisco root SYS Administrator DB2ADMIN enable tops3cr3t tops3cr3t tops3cr3t tops3cr3t tops3cr3t

Discovery & Audit DNA

Privileged Threat Analytics

Introducing Privileged Threat Analytics CyberArk s Privileged Threat Analytics detects malicious privileged account behavior. By comparing current privileged activity in real-time to historical activity, CyberArk can detect and identify anomalies as they happen, allowing the incident response team to respond, disrupting the attack before serious damage is done.

Excessive Access to Privileged Accounts Abnormal sequence of 52 password retrieval activities in 8 hours starting on March 20 th

Excessive Access to Privileged Accounts Abnormal sequence of 71 password retrieval activities in 5 minutes, starting on July 9 th, at 16:43 Source: Data of CyberArk customer analyzed in the CyberArk labs

Questions?

Thank you.