Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University. manzano@cs.fsu.



Similar documents
Current IBAT Endorsed Services

How To Manage Security On A Networked Computer System

Security management solutions White paper. Extend business reach with a robust security infrastructure.

Provide access control with innovative solutions from IBM.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

How To Achieve Pca Compliance With Redhat Enterprise Linux

NetIQ FISMA Compliance & Risk Management Solutions

Best Practices for Building a Security Operations Center

Clavister InSight TM. Protecting Values

What is Security Intelligence?

How To Use The Dcml Framework

Leveraging security from the cloud

Q1 Labs Corporate Overview

The SIEM Evaluator s Guide

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

IBM Security & Privacy Services

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

White paper September Realizing business value with mainframe security management

Total Protection for Compliance: Unified IT Policy Auditing

Device Lifecycle Management

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Reducing the cost and complexity of endpoint management

IBM Internet Security Systems products and services

IBM QRadar Security Intelligence April 2013

Lumension Endpoint Management and Security Suite

Managed Security Services for Data

Monitoring Windows Workstations Seven Important Events

Sygate Secure Enterprise and Alcatel

Strengthen security with intelligent identity and access management

Kaseya IT Automation Framework

IBM Global Technology Services Preemptive security products and services

The Challenges of Administering Active Directory

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

RSA Identity Management & Governance (Aveksa)

How To Secure Your System From Cyber Attacks

Payment Card Industry Data Security Standard

How To Buy Nitro Security

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Using NetIQ Security and Administration Products to Ensure HIPAA Compliance March 25, Contents

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Eftrust Solutions - An Introduction to Enterprise Security

Securely maintaining sensitive financial and

IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.

Simply Sophisticated. Information Security and Compliance

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Avoiding the Top 5 Vulnerability Management Mistakes

How To Monitor Your Entire It Environment

PCI DSS Reporting WHITEPAPER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

AD Management Survey: Reveals Security as Key Challenge

Information Technology Policy

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

PortWise Access Management Suite

Vulnerability Management

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

How To Manage Sourcefire From A Command Console

How To Protect Your Network From Attack From A Network Security Threat

Get what s right for your business. Technologies.

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Proven LANDesk Solutions

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

THE THEME AREA. This situation entails:

Ovation Security Center Data Sheet

HP and netforensics Security Information Management solutions. Business blueprint

Document ID. Cyber security for substation automation products and systems

PCI DSS Top 10 Reports March 2011

WHITE PAPER Oracle Enterprise Manager Ops Center Enables Datacenter Life-Cycle Automation

Centrify Server Suite Management Tools

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Solving the Security Puzzle

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

20 Critical Security Controls

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Trend Micro. Advanced Security Built for the Cloud

Symphony Plus Cyber security for the power and water industries

CA Service Desk Manager

See all, manage all is the new mantra at the corporate workplace today.

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Net Report s PCI DSS Version 1.1 Compliance Suite

Why Free Patch Management Tools Could Cost You More

Alcatel-Lucent Services

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Enhance visibility into and control over software projects IBM Rational change and release management software

Agio Remote Monitoring and Management

Solution Brief for HIPAA HIPAA. Publication Date: Jan 27, EventTracker 8815 Centre Park Drive, Columbia MD 21045

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Transcription:

Enterprise Security Moving from Chaos to Control with Integrated Security Management Yanet Manzano Florida State University manzano@cs.fsu.edu manzano@cs.fsu.edu 1 Enterprise Security Challenges Implementing consistent enterprise wide security policies Maintaining OS environments (patch level updates) Firewalls at a consistent level of protection and permission Managing growth of user access to computer resources Monitoring and responding to security events (IDS) Protecting against new and more sophisticated viruses and blended threat manzano@cs.fsu.edu 2 1

Security Managers Solutions Home grown or ad hoc security processes Security processes conformed to technology in place Labor-intensive procedures linked specific products Fragmented security solutions Result: inefficiencies inevitably plague day-to-day operations Solution: design security processes and technology based on business requirements and a coherent management approach Problem: too much to do + too little time + too few people manzano@cs.fsu.edu 3 Security Management: Complex Mergers and acquisitions highly complex, heterogeneous IT environments Rapid introduction of e-business applications not always fit into a corporate standard for best security practices Growth of trusted users among partners, consultants, suppliers must access core resources online on a regular basis Growing awareness of the necessity of host-based, and network or perimeter security measures manzano@cs.fsu.edu 4 2

Enterprise Security Goals Moving from chaos to better management control requires organizations to re-think and re-organize traditional approaches to security management. Growing consensus: Best practice essentials that involve four consistent threads Integrated security policy management Self-service and more efficient user provisioning Business-driven controls of vulnerabilities and configurations Event consolidation and control manzano@cs.fsu.edu 5 Needs: Integrated Security Policy Management Best practice essentials Develop/adapt policies to meet industry, regulatory and audit requirements Implement policies quickly and effectively across the enterprise Translate into practical and enforceable technical controls that can be implemented across a heterogeneous IT infrastructure Verifying policies compliance more effectively manzano@cs.fsu.edu 6 3

Self-service and more efficient user provisioning Best practice essentials Needs: Automating the provisioning of accounts Administering users more effectively and efficiently Enabling self-service to reduce help desk costs and enhance availability manzano@cs.fsu.edu 7 Business-driven controls of vulnerabilities and configurations Needs: Best practice essentials Establish security baselines based on most appropriate configurations Automate the assessment of vulnerabilities based on latest threats Correct exposures immediately with automated controls and patch management tools Maintain security controls that are scalable, auditable and consistent across the enterprise manzano@cs.fsu.edu 8 4

Event consolidation and control Best practice essentials Needs: Detect and prevent intrusions in real time from multiple sources Manage and analyze security events across the enterprise to improve resource allocation and decision making Provide rapid, coordinated response and appropriate forensic follow up to incidents manzano@cs.fsu.edu 9 Enterprise Solutions Needs Solutions provide automated and integrated management tools improve the effectiveness and efficiency of enterprise security posture Automation assure consistent, streamlined administrative processes eliminate the need for additional headcount Integration required to deliver consistent reporting and management across complex, heterogeneous IT environments multiple operating systems, security devices, and dynamic web-based services and applications manzano@cs.fsu.edu 10 5

VigilEnt Integrated Security Management NetIQ Solution Solutions provide tools to: automate best practice security processes integrating security management across multiplatform, heterogeneous IT environments Ensure security technology automates processes according to corporate security policies Integrates people s roles with policy driven processes that are automated by proven technology manzano@cs.fsu.edu 11 Key Areas of Security Management manzano@cs.fsu.edu 12 6

Policy & Compliance Management provide built-in knowledge for creating, updating, distributing and tracking security policy compliance across the enterprise VigilEnt Policy Center acts as the engine security managers can extend their policies and standards out to their security technology infrastructure Content Modules provide significant efficiencies in developing policies for highly regulated industries such as government agencies manzano@cs.fsu.edu 13 Policy & Compliance Management VigilEnt Policy Center contains a library of policies and standards allows security managers to assign policy standards based on roles certify people in roles have read and agreed to abide by the policy standards security policies and standards can be translated into groupings of technical and business rules applied to the key technologies that protect information assets manzano@cs.fsu.edu 14 7

Administration & Identity Management Automate the process for a wide variety of administrative tasks self-service user password resets password synchronization, role-based user provisioning, eliminate expensive manual administration minimize downtime and business interruption Provide authorized users access to critical applications swiftly and securely 24x7 manzano@cs.fsu.edu 15 Administration & Identity Management VigilEnt Password Manager: self-service for password resets via any online web browser automatic and consistent monitor and maintain password policy VigilEnt User Manager secure and efficient manage user access to corporate applications from a common facility centralized user administration and automated user provisioning for heterogeneous platform environments manzano@cs.fsu.edu 16 8

Administration & Identity Management Security Administration Suite highly secure and automated delegation of Windows account administration planning, managing, troubleshooting and reporting for Windows Group Policy from central, easy-to-use console innovative Windows Active Directory permissions management capabilities: powerful role-based security auditing and advanced analysis manzano@cs.fsu.edu 17 Administration & Identity Management File Security Administrator delivers a complete file security management and reporting solution for Windows NT 4 and Windows 2000 environments Migration Suite accelerates the transition between platforms while minimizing the impact on IT and user resources. manzano@cs.fsu.edu 18 9

Vulnerability & Configuration Management Many Organizations: where and how they are vulnerable? what information assets to protect? how to go about correcting exposures when found? Struggling to develop accepted practices for establishing a baseline standard of protection configuring and maintaining systems to meet standards manzano@cs.fsu.edu 19 Vulnerability & Configuration Management VigilEnt Security Manager automated centralize vulnerability management across heterogeneous systems proactively ensures system availability by establishing security configuration baselines, continuously auditing for security vulnerabilities helping correct exposures manzano@cs.fsu.edu 20 10

Vulnerability & Configuration Management Security Analyzer provides a flexible, enterprise-scale vulnerability assessment solution for Windows, Solaris and Linux computers scans computers across the network for the latest vulnerabilities provides reports to help correct vulnerabilities and comply with company security policies. manzano@cs.fsu.edu 21 Incident & Event Management Helps solve business security problems: managing security events in real-time consolidating security event logs for effective log analysis managing multiple firewall reporting system improve efficiency and reduce staff time by preventing intrusions automating event management and response manzano@cs.fsu.edu 22 11

Incident & Event Management VigilEnt Log Analyzer provides archival and historical analysis of logs across the enterprise collects logs using a distributed and hierarchical architecture Ex: OS, web servers, third-party event source normalizes logged events from disparate sources enabling query and analysis of logs over a period of time archive logs and perform sophisticated intrusion trend and forensic analysis manzano@cs.fsu.edu 23 Incident & Event Management Security Manager provides real-time monitoring across multiple IDS, firewall and anti-virus devices of security threats intrusions and policy violations delivers automated controls do not require security knowledge for deployment and customization manzano@cs.fsu.edu 24 12

Incident & Event Management Firewall Reporting Products Provide essential info about activity around popular firewall appliance products in easy-to-interpret reports Use reports to: Assess the state of network Eliminate security threats and network abuses manzano@cs.fsu.edu 25 Conclusion Policy-driven approach to managing info security helps assure continuous policy compliance for people and technology across the enterprise Automate technology implementation and ongoing maintenance of key security management functions to minimize personal leverage the value of investments Comprehensive security management integration and coverage of heterogeneous e-business IT environments deliver the benefits of a common security infrastructure and architecture with superior functionality manzano@cs.fsu.edu 26 13