balabit scb
DESCRIPTION
Privileged Account Management - BalaBit SCBTRANSCRIPT
Zoltan Bakos // Presales Engineer
88 % 71 %
Internal
misuseby
privilege abuse
21 %
Internal
misusevia
LAN
Internal
misusevia
remote access
• Use of stolen credentials was the top threat action in 2013
• Only 1% of security breaches is discovered through log reviews
Privileged User Fraud
* Source: Verizon 2014 Data Breach Investigations Report
A Leading Solution for Privileged Activity Monitoring
TRANSPARENT
PROXY SOLUTION
IT Staff
Outsourcing
partners
Managers• Firewall,
• Network devices,
• Databases,
• Web/file servers,
• Citrix server…VDI users
USE
STANDARD TOOLS
TRANSPARENT
PROXY SOLUTION
IT Staff
Outsourcing
partners
Managers• Firewall,
• Network devices,
• Databases,
• Web/file servers,
• Citrix server…VDI users
NO AGENTS
TRANSPARENT
PROXY SOLUTION
IT Staff
Outsourcing
partners
Managers• Firewall,
• Network devices,
• Databases,
• Web/file servers,
• Citrix server…VDI users
TAMPET-PROOF
EVIDENCE
GRANULAR
CONTROL
ENHANCED
AUDITEASY
DEPLOYMENT
MULTI PROTOCOL
TRANSPARENT
INDEPENDENT
PROXY GATEWAY
4 EYES
AUTOLOGON
CHANNEL CONTROL
FILE TRANSFER
ANALYZE
REAL TIME
BLOCKING &
ALERTING
MALICIOUS
ACTIONS
MOVIE-LIKE PLAYBACK
FULL-TEXT SEARCH
PCAP EXPORT
FILE RETRIEVAL
KEY // BENEFITS
AD/LDAP
Gateway Authorization
Client
Target Server
Cred. Store
Authorizer
Auditor
4-eyes Authorization with Real-time
Monitoring
Administrator
Real-time Prevention
Seamless Enterprise Integration
THANK
YOU
///