© 2012 Lathrop & Gage LLP ILTA SOS Webinar: Remove Administrator Rights and Secure a Law Firm’s Greatest Asset- Its Reputation Sean M. Power Chief Information.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
ISV Partner Alliance Value Policy Policy Management for Microsoft® System Center.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Privileged Account Management Jason Fehrenbach, Product Manager.
Lesson 17: Configuring Security Policies
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Unified Logs and Reporting for Hybrid Centralized Management
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Customer confidential 1 Privilege Management Sean Moore Solutions Specialist.
Macintosh Configuration Management Will Jorgensen 1.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Microsoft ® Official Course Module 9 Configuring Applications.
ICONICS 2008 Worldwide Customer Summit - Boston, MA.
GROUP POLICY An overview of Microsoft Windows Group Policy.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Information Security Technological Security Implementation and Privacy Protection.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Computer Basics   Active Directory and Domain   Profiles   Storage Services   Naming Conventions and File Management   Laptop Use.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
The Microsoft Baseline Security Analyzer A practical look….
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Novell NetMail 3.1 Date Presenter, Title. © 2002 Novell Inc, Confidential & Proprietary A business necessity.
NT4 SP4 Security Jack Schmidt - Fermilab
Microsoft Management Seminar Series SMS 2003 Change Management.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
CyberArk Security for the Heart of the Enterprise
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
User and Device Management
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Chapter 6: Securing the Cloud
Configuring Windows Firewall with Advanced Security
HARDENING CLIENT COMPUTERS
BOMGAR REMOTE SUPPORT Karl Lankford
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Cloud Security for Endpoints
Local Administrator Rights
Managing Services with VMM and App Controller
Deploy Software with Group Policy
Systems Management Privilege Management User Migration.
Presentation transcript:

© 2012 Lathrop & Gage LLP ILTA SOS Webinar: Remove Administrator Rights and Secure a Law Firm’s Greatest Asset- Its Reputation Sean M. Power Chief Information Officer April 2013

© 2012 Lathrop & Gage LLP About Lathrop & Gage, LLP  Founded in 1873, known as the oldest law firm west of the Mississippi River  Approximately 850 desktops and laptops  315 Attorneys  Highly-mobile, distributed work force: 11 offices across the US

© 2012 Lathrop & Gage LLP Desktop Environment Challenges  850 desktops and laptops running multiple configurations  Nearly 200 applications, many customized  Extensive mobile workforce  Previously all users ran with administrator rights  Much trepidation by some about removing administrator rights.  Moved to a fully locked down desktop environment with all users running as limited users.  Attorney’s need flexible user control of PCs

© 2012 Lathrop & Gage LLP The Solution  Very effective reporting on what precisely needs privilege elevation especially third party legal review websites with Active X add-ins.  Ability to control and manage our distributed PCs over a secure internet connection  Elevate privileges on the fly regardless of attorney’s work location  Policies are propagated immediately  No need to initiate remote desktop and use RUN AS Significant when running and installing programs as the user, not in the administrator context  Ability to flexibly manage our locked-down environment  Easy discovery of what rights are needs to run challenging applications  Recording of privilege elevation events for auditing

© 2012 Lathrop & Gage LLP The Results  Manage user access privileges effectively, efficiently, extremely timely manner  User still does not require admin rights  Increased productivity immensely for IT staff and end users  Much better control for software compliance considerations  Significant reduction in malware incidence or severe limitation in the effect of malware if it gains a foothold, often constrained to individual profile – this is very useful if someone is travelling and out of the office  Application configuration files and the registry can be effectively controlled  Allows people to focus on the job  Case study: Resources/CaseStudies/LathropGage.aspx

Leading the Privilege Management Sector Eliminate Admin Rights with Viewfinity

Viewfinity Worldwide Leader in Least Privilege Management Only PM Vendor to offer GPO, SaaS, and Server options HQ in Boston with offices in The Netherlands, Germany, Israel and Ukraine Strategic partnerships with Microsoft, CA, McAfee, Centrify Our Mantra: Eliminate administrative rights without disrupting end user productivity! Viewfinity Inc. Confidential

Users with Admin Rights can…. Install kernel-mode root kits Install system-level level key loggers Install ActiveX controls, including IE and Explorer extensions Install spyware and adware Install and start services Stop existing services (such as the firewall) Access data belonging to other users Cause code to run whenever anybody else logs on to that system Replace OS and other program files with Trojan horses Disable/uninstall anti-virus virus Create and modify user accounts Reset local passwords Render the machine unbootable …

Private Cloud * Viewfinity Server – optional deployment in DMZ Public Cloud GPO Architecture Flexible Delivery Methods

Quick Preview Discover users with local administrative rights Discover applications requiring administrative rights Privilege elevation policies Auditing & reporting for compliance validation

Discover User Accounts that Have Local Administrative Rights

Visit our website for resources and to begin your product evaluation 2 minute flash video overview of the Viewfinity product