balabit scb

Post on 06-Apr-2016

244 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Privileged Account Management - BalaBit SCB

TRANSCRIPT

Zoltan Bakos // Presales Engineer

88 % 71 %

Internal

misuseby

privilege abuse

21 %

Internal

misusevia

LAN

Internal

misusevia

remote access

• Use of stolen credentials was the top threat action in 2013

• Only 1% of security breaches is discovered through log reviews

Privileged User Fraud

* Source: Verizon 2014 Data Breach Investigations Report

A Leading Solution for Privileged Activity Monitoring

TRANSPARENT

PROXY SOLUTION

IT Staff

Outsourcing

partners

Managers• Firewall,

• Network devices,

• Databases,

• Web/file servers,

• Citrix server…VDI users

USE

STANDARD TOOLS

TRANSPARENT

PROXY SOLUTION

IT Staff

Outsourcing

partners

Managers• Firewall,

• Network devices,

• Databases,

• Web/file servers,

• Citrix server…VDI users

NO AGENTS

TRANSPARENT

PROXY SOLUTION

IT Staff

Outsourcing

partners

Managers• Firewall,

• Network devices,

• Databases,

• Web/file servers,

• Citrix server…VDI users

TAMPET-PROOF

EVIDENCE

GRANULAR

CONTROL

ENHANCED

AUDITEASY

DEPLOYMENT

MULTI PROTOCOL

TRANSPARENT

INDEPENDENT

PROXY GATEWAY

4 EYES

AUTOLOGON

CHANNEL CONTROL

FILE TRANSFER

ANALYZE

REAL TIME

BLOCKING &

ALERTING

MALICIOUS

ACTIONS

MOVIE-LIKE PLAYBACK

FULL-TEXT SEARCH

PCAP EXPORT

FILE RETRIEVAL

KEY // BENEFITS

AD/LDAP

Gateway Authorization

Client

Target Server

Cred. Store

Authorizer

Auditor

4-eyes Authorization with Real-time

Monitoring

Administrator

Real-time Prevention

Seamless Enterprise Integration

THANK

YOU

///

top related