Enterprise Reporter 2.0 Customer Presentation. Market Landscape.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Complete Event Log Viewing, Monitoring and Management.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Which server is right for you? Get in Contact with us
HP Quality Center Overview.
© 2012 Quest Software Inc. All rights reserved. Dell Software Group Windows Management.
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Migration Manager for Active Directory & File Servers
System Center Configuration Manager Push Software By, Teresa Behm.
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Maintaining and Updating Windows Server 2008
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
©2011 Quest Software, Inc. All rights reserved.. Manage, Migrate & Customize SharePoint Control Your SharePoint Chaos.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SecureAware Building an Information Security Management System.
HIPAA COMPLIANCE WITH DELL
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Dell Connected Security Solutions Simplify & unify.
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Introduction + Track Time is a enterprise grade web based software with robust features to simplify Time.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Module 7 Planning and Deploying Messaging Compliance.
Microsoft Management Seminar Series SMS 2003 Change Management.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Module 10: Implementing Administrative Templates and Audit Policy.
SAM for SQL Workloads Presenter Name.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Managing your IT Environment. Microsoft Operations Manager 2005 Overview.
Oracle’s EPM System and Strategy
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
GRC: Aligning Policy, Risk and Compliance
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
Maintaining and Updating Windows Server 2008 Lesson 8.
Administering Windows Server 2012 Question Answer.
OFFICE 365 APP BUILDER PROFILE: Druva
Get to know SQL Manager SQL Server administration done right 
Compliance with hardening standards
MCSA VCE
Speaker’s Name, SAP Month 00, 2017
Transforming IT Management
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Enterprise Program Management Office
Features Overview.
Contract Management Software from ContraxAware Simplify Your Contract Management Process.
SysKit Security Manager
Presentation transcript:

Enterprise Reporter 2.0 Customer Presentation

Market Landscape

5 IT Governance, Risk and Compliance (GRC) Mistakes Organizations Make 1.Lack of visibility into who has access to what in Windows environments 2.Underestimating user & organizational impact 3.Inconsistent or absence of a GRC strategy 4.Inadequate data protection 5.Failure to plan and manage external & internal audits

GRC Technical Challenges Not understanding rights and permissions can result in compromised security or this information may be needed for audit purposes to prove you can provide it when asked No process automation for periodically reviewing users and their privileges does not let IT focus on core business priorities Information that is out of date can be inaccurate and result in non- compliance to regulations without being aware of it Manually checking for changes in rights could result in missed changes which could spell a security violation Other individuals in the organization may have their own preference on the set and format of the reports

Consequences of Not Having a Proactive GRC Solution Failure stay in front of external regulations such as PCI DSS Lack of adherence to internal policies and standards Security breaches (internal and external offenders) Leaks of sensitive data (accidental and maliciously motivated) A failed IT audit System downtime

Dell Solutions

 We provide organizations visibility  We simplify audits and streamline operations  We reduce risk with proactive controls  We deliver superior results more quickly 7 Dell GRC Lifecycle Dell provides organizations with four core capabilities that are common between compliance and operational needs. The core capabilities are assess, audit/alert remediate and manage. Software

8 Confidential Software Dell IT Governance, Risk and Compliance Determine configuration settings Set baselines Automate reporting Track key performance and security indicators Track and report on access Enable real-time alerts Administer access rights and permissions Implement best-practice compliance reporting Retain and retrieve data Implement preventative controls Rectify deviations and security breaches Restore data

9 Confidential Software Enterprise Reporter Determine current system configuration and settings for AD, Exchange, SQL Server and file systems Set baselines for visibility of user activity and for compliance with internal policies and external regulations Automate operational reporting with anytime, anywhere access Track key performance and security indicators Track and report on access Enable real-time alerts Administer access rights and permissions with Security Explorer based on Enterprise Reporter data Implement best-practice compliance reporting Implement preventative controls Rectify deviations and security breaches Restore data

10 Confidential Software Enterprise Reporter

What is Enterprise Reporter Enterprise Reporter enables administrators, security officers and helpdesk staff to collect, store, and report on the data they need, whether for security assessments, Active Directory pre and post migration analysis or configuration change history auditing.

Why Enterprise Reporter Configuration Visibility How do I stay compliant with security best practices and compliance regulations? What software is installed on my servers? What local users and groups are present on servers? How are my servers configured? What logins exist in my SQL server database? Security Assessment How do I tighten up security and pass the audit? Who has administrative access to Windows servers and workstations? Where users have permissions to shares, folders and files on file servers and network filers? Who has Access to What? Who has delegated rights in Active Directory? Pre-migration Analysis How do I ensure a smooth migration project? How many domains, users and groups are there? What accounts can be excluded from migration? What needs to be migrated? What possible conflicts can happen during migration?

Visibility into the security and configuration of environments Gain visibility into configuration of critical IT assets: –Active Directory domains –SQL Servers –Windows File Servers –NAS devices Leverage pre-built reports for security best practices, internal polices and external regulations

Minimize unplanned disruptions with change history reports Capture how configuration changes over time for: –Group membership –Active Directory domains –Computers –NTFS files, folders or shares –Registry keys or values –SQL servers or databases Minimize risk of business disruptions due to unnoticed and unwanted changes with in-depth historical analysis

Tighten security with real-time access assessments Reduce risk of internal and external data breaches by determining who has access to what files, folders and shares Detect security violations such as identifying users with inappropriate access Provide access on a need to know basis Ensure successful IT audits and meet compliance requirements

Pre-migration and post-migration analysis companion Inventory Windows environments Identify unused assets for cleanup Determine the impact of consolidation and restructuring Find the best way to stage the migration project Verify migration is completed as planned

Achieve enterprise readiness with automated, scalable data collection Scale to environments of any size and geographic distribution Schedule collections during off- peak hours Satisfy reporting needs of multiple departments

Decrease workload with automated report generation Automate report generation and delivery for multiple consumers Honor departmental and business boundaries by letting auditors, help desk and IT managers get exactly the reports they asked for Control the status of data collection and report delivery from the screen of your mobile phone

Meet unique reporting needs with customizable reports Enable effective data analysis Multiple formats ( PDF, HTML, MHT, RTF, XLS, XLSX, CSV, text and images) with advanced filtering options

Unified reporting interface across Dell GRC solutions Consolidate and view data from multiple data sets and platforms into one single pane of glass for reporting at no additional cost Reduce training and infrastructure costs for multiple interfaces Save time with predefined security and compliance reports Simplifies decision making with dashboard reporting Provides end users control over what and how they want to receive reports without IT administrator intervention

Case Study

Snapshot Large enterprise hospitality company Challenge Needed to find a way to raise visibility into user permissions and configuration changes in order to comply with: SOX PCI-DSS Company policy Results Provides daily, weekly and monthly reports to stakeholders Is able to automatically report on and understand what is happening in Active Directory and Windows Servers Reduced workload by 50-75% Met compliance requirements Strengthened internal security controls Provided managers with evidence of IT controls Software

Enterprise Reporter for Active Directory

Discover, report and audit AD across the enterprise Answer tough questions such as: –Who can do what in my Active Directory? –What users, groups and computers exist in Active Directory? –What user accounts can be safely deleted before migrating to a new domain? –How does group membership change over time for domain, local and global groups?

Enterprise Reporter for Active Directory features Pre-migration assessment –Ensure a smooth domain migration or consolidation project by pinpointing user and group dependencies, matching conflicts and unused accounts before the migration starts. Delegated rights reporting –Ensure appropriate Active Directory delegation by reporting on who has access to Active Directory domains and OUs, users, groups and computers. Change review –Capture historical configuration information on users, groups, organizational units and permissions, and view detailed change history reports. Gain in-depth insight for historical analysis and compliance reporting.

Enterprise Reporter for Windows Servers

Windows Servers and NAS discovery, reporting and auditing across the enterprise Provide answers to questions often asked by IT auditors and management such as: –Where this user or group has access to critical unstructured data? –Who has administrative access to Windows servers and workstations? –How are servers configured – including general computer information, network settings, services running, installed programs and custom Registry keys? –How does the configuration of servers change over time?

Enterprise Reporter for Windows Servers Features Access assessment –Rapidly find out in real time where selected users and groups have permissions across the entire Windows file server and NAS environment. Windows file server access reporting enables tightened security and ensures access is provided on a business-need-to-know basis. Local policy assessment –Make sure local security configuration is aligned with domain-wide policies. Check local security policies, membership of local administrative groups and other security configuration stored in Registry keys. Permission reporting –Collect and report on permissions of shares, files and folders, printers, Registry keys and services for comprehensive Windows Server permission reporting. Identify access control entries (ACEs) explicitly set on files in a folder hierarchy of a specified depth.

Enterprise Reporter for SQL Server

Enhance database security with SQL Server discovery, reporting and change history auditing Have answers on hand to compliance and security questions such as: –What roles and logins are set across all SQL databases? –Who has administrative access to each SQL server? –How does the configuration of each SQL server change over time?

Enterprise Reporter for SQL Server Features Permission reporting –Collect and report on permissions to SQL databases, users, roles and logins for comprehensive SQL Server permission reporting. Change history review –Capture historical configuration information on database objects and view detailed change history reports. Gain in-depth insight for historical analysis and compliance reporting.

To learn more about Enterprise Reporter