Breaking down the Barriers: Implementing Vaulting Technologies



Similar documents
Inter-Business Vault

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Security Technology: Firewalls and VPNs

ReadyNAS Remote White Paper. NETGEAR May 2010

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Inter-Business Vault. Technical Overview

IBM enetwork VPN Solutions

Cyber-Ark Software and the PCI Data Security Standard

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

H.I.P.A.A. Compliance Made Easy Products and Services

IT Security in Banque du Liban

Moving to the Cloud: What Every CIO Should Know

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

Secure Network Design: Designing a DMZ & VPN

9 REASONS WHY ENTERPRISES CHOOSE VAULTIZE FOR ENDPOINT DATA PROTECTION

Optimizing Outlook Performance

Automating the File Transfer Business Process

How To Manage Sensitive Information Management With Cyberark Software

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

Firewall Environments. Name

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Stateful Inspection Technology

Technical papers Virtual private networks

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Firewall Security. Presented by: Daminda Perera

GroupWise SMTP Infrastructure Design:

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

ICANWK406A Install, configure and test network security

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

ICE econfirm. FAQs April 2012

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Discounted Pricing MANAGED SECURITY SERVICES

Proxies. Chapter 4. Network & Security Gildas Avoine

Cisco Which VPN Solution is Right for You?

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Interwise Connect. Working with Reverse Proxy Version 7.x

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

Virtual Private Networks Secured Connectivity for the Distributed Organization

Specialized Programme on Internetworking Design and LAN WAN Administration

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

CareGiver Remote Support Information Technology FAQ

2003, Rainbow Technologies, Inc.

Network Configuration Settings

WHITEPAPER IPSEC VPN Vs. SSL VPN

How To Secure Your Business

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Cloudbuz at Glance. How to take control of your File Transfers!

Access control policy: Role-based access

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

The Ultimate Guide to Gaining Control of the WAN

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Security Design.

Firewall, Mail and File server solution

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Firewalls and Virtual Private Networks

Private vs. Public Cloud Solutions

3. Firewall Evaluation Criteria

INTRUSION DETECTION SYSTEMS and Network Security

Steelcape Product Overview and Functional Description

FileCloud Security FAQ

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IT Audit and Compliance

Recommended IP Telephony Architecture

Database Security, Virtualization and Cloud Computing

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Network Security Topologies. Chapter 11

Web App Security Audit Services

DMZ Gateways: Secret Weapons for Data Security

White paper. Keys to SAP application acceleration: advances in delivery systems.

The Protection Mission a constant endeavor

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Guideline on Auditing and Log Management

Secondary DMZ: DMZ (2)

Chapter 15. Firewalls, IDS and IPS

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Comparing Mobile VPN Technologies WHITE PAPER

CrashPlan PRO Enterprise Backup

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls. Ahmad Almulhem March 10, 2012

Cloud-enable your Storage with EgnytePlus File Sharing Infrastructure

Seagate Cloud Systems & Solutions

Preparing Your IP network for High Definition Video Conferencing

Enterprise K12 Network Security Policy

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Lesson 5: Network perimeter security

TIBCO Managed File Transfer Suite

Altus UC Security Overview

Introduction to Computer Security Benoit Donnet Academic Year

MIGRATIONWIZ SECURITY OVERVIEW

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Transcription:

Breaking down the Barriers: Implementing Vaulting Technologies

1999 Cyber-Ark introduces the Vaulting Technology US Patent #6,356,941 Remote offices Customers Partner and Suppliers A Safe Haven highly secured regardless of overall network security by multiple layers including Firewall, VPN, Access Control, Encryption and Auditing. Enables the sharing of sensitive information within the enterprise and with customers, partners and remote offices Inter-Business Vault Internal Network Network Vault

The Inter-Business Vault An Advanced Extranet Partners/Customer Internal Network Inter-Business Connector Inter-Business Vault The Internet Basic Connectivity Web based Secure Collaboration Secure email Secure file transfer Advanced Connectivity cifs, ftp, smtp, http Inter-Business File Server Inter-Business FTP Server Inter-Business Web Server Inter-Business Mail Server Partners/Customer Inter-Business Connector Advanced Connectivity cifs, ftp, smtp, http Inter-Business File Server Inter-Business FTP Server Inter-Business Web Server Inter-Business Mail Server

The Inter-Business Vault Benefits Unrestricted Connectivity Unmatched Security Unmatched Performance Lower Administrative Overhead Unmatched Unrestricted Unmatched Lower Administrative Performance Security Connectivity Overhead Servers Caching, Blocked are Distributed within End-to-end protocols the perimeter are Admin. Compression not crossing and and Authentication the and network Vault Distributed are boundaries secured are Encryption viable from (Firewalls) end-to-end are built in Partners/Customer Internal Network The Internet Inter-Business Vault Partners/Customer

Sample Applications Connecting enterprises to their partners, customers and remote sites over the Internet: Treasury Management Vault Enabling Banks to exchange Lockbox, ACH and ARP Files with Corporate Customers over the Internet. CAD/CAM Vault Enabling Manufacturers to share and exchange design files with subcontractors over the Internet. Source Code Vault Enabling large enterprises to share software source code with software development subcontractors over the Internet.

Comerica and Vaulting Technology Requirement: A secure File Exchange Infrastructure for Treasury Management services such as Lockbox, Automated Clearing House (ACH) and Account Reconcilement Processing (ARP) between the bank and its corporate customers Challenges they faced: Too much time to enable a new Treasury Management customer to exchange files with the bank? Highly dependant on IT personnel to accomplish this - both within the bank and on the customer side? Infrastructure not flexible enough to support automation and integration with back-end systems?

Comerica was looking for a file exchange infrastructure that could: Enable electronic, Internet-based, file transfer as a replacement for couriers, faxes, Virtual private Networks (VPNs) and Value Added Network (VAN) Services. Shorten setup time by ensuring that no involvement of IT or programmers is required within the bank for new customers setup Enable small and medium customers, who often have no IT staff at all, to connect to the bank Provide a secure infrastructure that ensures the integrity and confidentiality as required by key regulations Enables full automation and smooth integration into the web infrastructure and back-end systems of the bank and its customers

The Solution: A Treasury Management Vault A Safe Haven over Comerica s extranet, to which corporate customers can connect for file exchange: Automate the information-exchange required for Lockbox, ACH and ARP services Reduce the cost and complexity of account set-up and support, by lessening dependence on IT resources Customers Customers Customers Enabling Comerica to profitably grow revenue and market share with new corporate customers while Treasury Management reducing operational System costs Vault Ensure compliance with key regulations, by protecting data both in transit and at rest. Internal Network

Lehman Brothers and Vaulting Technology Requirement: Connect all their distributed software development sites to create a secure Source Code sharing infrastructure that allows them to share file servers, ftp servers or to transfer emails without being impeded by network boundaries, network bandwidth and network security issues. Obstacles they faced: Network Boundaries - CIFS or NFS protocols were usually blocked by the firewall at the perimeter of each site Network Bandwidth - File servers sessions usually fail over low speed Internet connection Network Security - File servers do not have the basic security elements needed over the Internet. Data is not encrypted in transit nor at rest, OS is not hardened, auditing is basic, and anti-virus at the end-point is not supported

Limitations of Existing Solutions Trying to connect the entire development chain with VPNs and High-speed connections? Stay Disconnected and transfer copies by FTP Risking the security of the enterprise by opening it to subcontractors Very high TCO (total cost of ownership) Fit only to large and rich subcontractors Unproductive Unsecured Losing control over file versions

Lehman was looking for a Source Code sharing infrastructure that could: Enable Internet-based, collaborative development Enable the sharing of file servers, ftp servers, and mail systems as if part of a shared network, by overcoming the network-boundaries, network-bandwidth and Network-Security barriers that prevent it today. Ensure enterprise s security by eliminating the need to open the network to subcontractors. Ensure the Security of the shared information from end-to-end. Enable collaboration on slow and inexpensive communication lines. Provide extensive Auditing and Data Access Control. Provide comprehensive version control. Offer a broad of interfaces to support the needs of every subcontractor.

The Solution: A Software Code Vault A Safe Haven over your extranet, to which remote sites can connect for software code sharing and exchange: Enables the sharing of file servers, ftp servers, and email systems as if part of a shared network Eliminates the need to open the enterprise to subcontractors and remote sites. Removes the need for expensive highspeed Internet connections. Ensures the integrity and confidentiality of the shared data by providing end-to-end security, version control, and audit. Remote Sites Partners Vault Internal Network Partners Enables Lehman to improve productivity, reduce development costs and shorten development time

Thank You