The IDG 9074 Remote Access Controller



Similar documents
secure Agent Secure Enterprise Solutions

secure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software

How To Achieve Pca Compliance With Redhat Enterprise Linux

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

System Security Policy Management: Advanced Audit Tasks

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Someone may be manipulating information in your organization. - and you may never know about it!

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Remote Services. Managing Open Systems with Remote Services

Administration Guide NetIQ Privileged Account Manager 3.0.1

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Three significant risks of FTP use and how to overcome them

GHEM Secure Access Control

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

PowerBroker for Windows Desktop and Server Use Cases February 2014


MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Injazat s Managed Services Portfolio

HIPAA Security Matrix

PowerBroker for Windows

IBX Business Network Platform Information Security Controls Document Classification [Public]

Storage Guardian Remote Backup Restore and Archive Services

Find the Who, What, Where and When of Your Active Directory

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

ISO COMPLIANCE WITH OBSERVEIT

Network and Security Controls

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

IBM Tivoli Netcool Configuration Manager

Keyfort Cloud Services (KCS)

Cisco Advanced Services for Network Security

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Network Configuration Manager

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

4. Getting started: Performing an audit

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

What s New in Centrify DirectAudit 2.0

Cisco ASA. Administrators

GE Measurement & Control. Cyber Security for NEI 08-09

Secure, Remote Access for IT Infrastructure Management

HIPAA Security Alert

LogRhythm and NERC CIP Compliance

Projectplace: A Secure Project Collaboration Solution

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Tk20 Network Infrastructure

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

PCI Compliance Auditing and Forensics with Tectia Guardian

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Exporting IBM i Data to Syslog

CSP & PCI DSS Compliance on HP NonStop systems

WHITE PAPER. Improving Efficiency in IT Administration via Automated Policy Workflows in UNIX/Linux

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

IT Networking and Security

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

DISASTER RECOVERY WITH AWS

Intel Enhanced Data Security Assessment Form

PCI Requirements Coverage Summary Table

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

How To Manage A Privileged Account Management

AdRem Software s HIPAA Compliance. An AdRem Software White Paper

How To Manage Security On A Networked Computer System

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Symantec NetBackup 7 Clients and Agents

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Teleran PCI Customer Case Study

Agio Remote Monitoring and Management

QRadar SIEM 6.3 Datasheet

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Payment Card Industry Data Security Standard

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

<Insert Picture Here> Oracle Database Security Overview

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

PCI Requirements Coverage Summary Table

TELE 301 Network Management. Lecture 16: Remote Terminal Services

Provide access control with innovative solutions from IBM.

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Transcription:

secure Agent Secure Enterprise Solutions Product Overview The IDG 9074 Remote Access Controller 2448 E. 81 st St, Ste 2000 Tulsa OK 74137-4271 USA Tel: 918.971.1600 Fax: 918.971.1623 www.secureagent.com

2 Security requirements for open systems Access the root of the problem In support of business objectives, today s IT environment is an increasingly heterogeneous mix of hosts, servers, and operating systems, which can cause problems for IT systems administrators. For mainframes, administrators need access at the system level, while for UNIX and Linux systems, they need root access. A person with root access has total control of the system both unintended mistakes and deliberate maliciousness can cause catastrophic interruptions in system availability and business continuity (or even survival), therefore, such access is not to be granted lightly. The concerns inherent in granting root access on UNIX and Linux systems are magnified as the computers are distributed geographically (for example, a production data center in one location and the associated disaster recovery site in another) or as the number of systems increases. Granting root access to a particular user transfers control of that system from the central security administrator to a wider and, therefore, more vulnerable user environment, putting the entire enterprise at risk. Increasingly valuable data and a corresponding growth in data intrusions have forced network security professionals to reevaluate the practice. An overall shift toward securing access to corporate data and systems sharpens the focus on this critical issue. As a result, the standard practice of providing root access based solely on operational requirements is coming under increasing scrutiny. Its vulnerabilities have recently been questioned by internal security auditors and by external regulatory agencies. Out of many discussions with COOs, CIOs and Security Officers, the following requirements for open system servers emerged: Secure access to root level with a user ID and password known only to the authorized individual; that is, no blanket access with a global password Audit logs for root-level access and activity Role-based access controls (RBAC), so a user only can access a server based on his or her job function Central administration of all access controls and for all locations, including backup, disaster recovery, and archive sites so administrative tasks only have to be done once Issue alerts if attacks are detected or a defined number of unaccepted accesses are counted Encryption of the entire data transfer to ensure security

3 Problem solved IDG 9074 Remote Access Controller Now such requirements (and many other functions) are integrated in the IDG 9074 Remote Access Controller. The figure below shows a typical installation. Security Administrator Defines user groups. Assigns access rights. UNIX, Linux, or Other Open Systems Servers TCP/IP IDG 9074 Remote Access Controller Functions Filters Alerts Secures Logs TCP/IP Internal Network The IDG 9074 Remote Access Controller is an integrated hardware/software solution that supports customers needs and smoothly integrates into their existing infrastructures. In addition to a primary IDG 9074 Remote Access Controller, secondary Remote Access Controllers may be used as defined by customer requirements, access-load balancing, and to ensure redundancy (particularly at remote locations such as backup, archival, or disaster recovery sites). Features of the IDG 9074 Remote Access Controller We designed the IDG 9074 Remote Access Controller to be transparent in use and with features that make configuration and maintenance quick and easy and that provide state-of-the-art security, even for remote locations. Role-based access controls Using the included GUI administration program, you can easily set up user groups and assign access privileges to them. Equally important, if group membership changes, you can easily add or remove users, and do so from a central location, avoiding the time and expense of travel to remote locations or dealing with individual user systems. s patented authentication logon protocol ensures only authorized users have access. Combined with role-based access controls, it assures that those who actually access a system should have access, even from remote locations. Our logon protocol helps prevent attacks not only by outsiders, but also

4 by negligent or malicious insiders. It is currently in use in many of the world s largest data centers. Encryption of all communications between the IDG 9074 Remote Access Controller and clients ensures security of the data stream. All data is transmitted using our industry-proven, advanced encryption technology, and our patented, centralized key-management strategy. Access and activity logs provide auditability. Unauthorized personnel cannot access log files, assuring proof of regulatory compliance. Easy-to-use GUI-based administration program means you can configure and maintain the IDG 9074 Remote Access Controller quickly and easily from one central location even remotely, so in the event of problems, travel and downtime are minimized. Secure remote access means disaster recovery plans can be supported and maintained from any location. Our patent-pending Instant Replay feature presents a scrollable history window showing a keystroke-by-keystroke recall of a particular connection. As the associated console emulation updates itself, Instant Replay captures refreshed screens and saves them in memory. It helps reduce downtime you can see what actually occurred, down to the keystroke level, and quickly take corrective action, even from remote locations. Instant Replay is also useful in training. Secure Telnet clients included at no additional charge. Connections can also be made through SSH or SSH2. Includes easy-to-use REXX programming language that allows quick automation of operating system command sequences without extensive prior programming experience. Provides security administrators with an over-the shoulder view of operators with root access without the operators knowledge, allowing for real-time, proactive monitoring, even of multiple consoles simultaneously. The IDG 9074 Remote Access Controller is an out-of-the-box solution that installs quickly and does not require intensive training of security administrators. The IDG 9074 Remote Access Controller can connect to multiple UNIX servers. An alternate IDG 9074 can provide redundancy. The combination of a primary and alternate is far more affordable than other solutions priced on the basis of an entire server farm. About has been helping customers protect and manage sensitive data for more than 20 years. Many of the largest companies across the United States and throughout Europe use SecureAgent products in mission-critical areas of their daily operations. The Company develops both software and hardware products that play an integral role in

5 secure remote console access, data backup and recovery, advanced automation, integrated tape management, and disaster recovery. is a pioneer in the implementation of role-based access controls, and both commercial customers and the governmental sector use its products extensively to comply with evolving regulatory guidance. Among the companies using products are three of the four largest US banks, two of the largest credit card processing companies, the nation s two largest communications companies, the world s largest stock exchange, the largest US airline, and the largest airline reservations companies in the US and Europe. For additional information, please contact: 2448 East 81 st Street, Suite 2000 Tulsa, OK 74137-4271 Voice: 918.971.1600 Fax: 918.971.1623 Toll-free: 888-746-7735 www.secureagent.com IDG 9074 is a registered trademark and Remote Access Controller is a trademark of.