Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Chapter 20 Oracle Secure Backup.
Privileged Identity Management ISV Partner Alliance Value.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Privileged Identity Management Enterprise Password Vault
Audit Issues regarding Passwords on Elevated Privilege Accounts Gene Scheckel Global Internal Audit.
Planning Server Deployments
WSUS Presented by: Nada Abdullah Ahmed.
Module 5: Creating and Configuring Group Policy
Managing User Settings with Group Policy
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
VMware vCenter Server Module 4.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Module 16: Software Maintenance Using Windows Server Update Services.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Lieberman Software Random Password Manager & Workflow Delegation.
Chapter 12: Additional Active Directory Server Roles
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Module 7: Configuring TCP/IP Addressing and Name Resolution.

Module 13: Configuring Availability of Network Resources and Content.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Windows 2003 Overview Lecture 1. Windows Networking Evolution Windows for Workgroups – peer-to-peer networking built into the OS Windows NT – separate.
Module 13: Maintaining Software by Using Windows Server Update Services.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Security Planning and Administrative Delegation Lesson 6.
Maintaining Active Directory Domain Services
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Avira Endpoint Security. Introduction of Avira Management Center (AMC)
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Microsoft Management Seminar Series SMS 2003 Change Management.
1 Chapter Overview Planning to Install SQL Server 2000 Deciding SQL Server 2000 Setup Configuration Options Running the SQL Server 2000 Setup Program Using.
Service Account Manager Centralized Management and Reporting of Windows Services.
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
COMP1321 Digital Infrastructure Richard Henson March 2016.
CIS 221 Lesson 2. What is the first phase of the of the Installation of Windows XP? MS-DOS phase Why is the MS-DOS phase needed? the computer required.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Linux Systems Administration
Unit 27: Network Operating Systems
Information Security Awareness
A 5-minute overview of ADAudit Plus
Windows Server Administration Fundamentals
Features Overview.
6. Application Software Security
IT Management, Simplified
Presentation transcript:

Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer

The Problem: Common Account Credentials Most organizations deploy servers and workstations with identical local account credentials If even one local password is cracked an unauthorized user can gain peer-level access throughout the network Compromises IT assets, disrupts business continuity, causes non-compliance with security best practices and regulatory standards “One of the neglected security holes in a Windows network is the local administrator password for your users’ desktop machines. Many organizations synchronize these, so that the same password can be used for each.” Dave Kearns Editor, Network World

The Solution: Unique Account Credentials Regularly deploying unique account credentials on each machine prevents one compromised system from threatening the entire network Manually randomizing passwords on every system is impractical Scripting limitations – no logging, no documentation, difficult to update, maintain, support

Random Password Manager Periodically randomizes local administrator and root account passwords throughout the enterprise, including firecall accounts Centrally managed, randomization conducted according to schedules established by IT Multi-threaded, SQL server-based application that deploys without installing agents to client systems or requiring additional hardware Supports Windows NT, 2000, XP, Server 2003, Vista, Server 2008, and Linux, UNIX, SQL Server, Cisco IOS devices Certified for Microsoft Windows Vista

Requirements Windows 2000, XP, Server 2003, Vista, Server 2008 Administrative rights over host machine and target machines NetBIOS over TCP/IP (ports or 445) for Windows management Port 22-SSH for Linux\Unix management Port 135-Automated installation of password recovery website SQL 2000\SQL Express\MSDE IIS 5.0 or later\Personal Web Server Active Server Pages enabled COM identity-domain account with admin rights on web server and access to the SQL database SSL certificate recommended

Win32 Application Demonstration

Win32 Review Create groups of machines Populate groups with machines Select machines you wish to include in a password change job Schedule password change job Delegate remote secure recovery of passwords in your machine groups to user entities

Password Creation/Encryption Passwords can be controlled for length, complexity, special characters Passwords stored in SQL relational database, can be clustered and replicated Data secured using AES-256 bit encryption

Demonstration Web Application

Password Recovery Local passwords recovered on demand by delegated users for routine systems management tasks Controls who can recover passwords and how long they remain active (2 hours by default) Passwords automatically randomized after temporary period expires Periodic password verification checks that random passwords still work on each machine “The product randomizes passwords for each machine and allows non-privileged users to gain temporary access through a web portal for essential jobs.” Ericka Chickowski Editor, SC Magazine

Password Vault Proliferation of passwords leads to frequently lost or forgotten passwords Insecure or inadequate solutions – writing passwords down, automatically logging in all users, Single Sign-On Password Vault allows users to securely store all passwords in AES encrypted database Delegated users can retrieve own passwords through secure web interface “The Password Vault module enables administrative users who forget their credentials and cannot access a system or application to quickly retrieve their own passwords through the Web interface…” Dave Kearns Editor, Network World

Logging All password randomizations, verifications, and recoveries, as well as program logons, are logged into relational database Information can be sorted and extracted to CSV files Logs can be provided to security auditors to prove compliance with Sarbanes-Oxley, HIPAA, PCI, and other regulatory standards …government regulations such as SOX, HIPAA, and PCI with their requirements for companies to keep tabs on who does what on their systems, are prompting more interest in Random Password Manager from companies in every industry.” Renee Munshi Senior Editor, Windows IT Pro

Licensing & Availability Licensed by managed system Academic, GSA, non-profit, and volume discounts available No separate server/workstation pricing Available now Free, fully functional evaluation for download now from

Conclusion Questions? Joe Vachon Sales Engineer