Presentation is loading. Please wait.

Presentation is loading. Please wait.

Microsoft 2016 6/20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher.

Similar presentations


Presentation on theme: "Microsoft 2016 6/20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher."— Presentation transcript:

1 Microsoft 2016 6/20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher Stoneff Lieberman Software – VP of Technical Management © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 100% of victims have Firewalls and Intrusion Protection
Why Privilege Management? Traditional Defenses Are Not Enough ANTIVIRUS 100% of victims have Firewalls and Intrusion Protection

3 Checkmate In 5 Moves What Today’s Attacks Look Like
External Reconnaissance Identify a weak link 1 Initial Compromise Initial breach via spear-phishing, social engineering, etc. 2 Foothold Established Obtain privileged identities (e.g. Domain Admin) 3 We stop them at step 3 Internal Reconnaissance Spread laterally to gather IP 4 Mission Completed Exfiltrate data 5 Cybersecurity’s Maginot Line: A Real-world Assessment of the Defense-in-Depth Model

4 6/20/2018 9:26 AM Lieberman uses automation at scale to protect the privileged credentials the bad guys want and the insiders abuse. © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Privilege Challenge: Identity Sprawl

6 We Mitigate the Risks via Automation
TRACK DISCOVER Audit and alert so that the requester, purpose, and duration of each privileged access request is DELEGATE Identify and document critical IT assets, their privileged accounts and their interdependencies REMEDIATE Enforce rules for password complexity, diversity and change frequency, Delegate access to privileged credentials so that only appropriate personnel, documented and monitored and synchronize changes across all dependencies using the least privilege required, can login to IT assets You can’t manage what you don’t know

7 Continuous Password Rotation Stops Lateral Movement It’s Tough for Attackers to Hit a Moving Target
Controlled password lifetimes limit the value of compromised credentials Scale and automation can change credentials as often as every day or even every hour

8 Enterprise Random Password Manager (ERPM)
Privilege Management Platform Systems, Network Devices, Databases, and Applications Deploy On-Premises, In the Cloud, or Both Privileged Identity Management Privileged Access Management SSH Key Management Service Account Management Cloud Platform Management Orchestration via Web Services & PowerShell

9 Platforms Supported Virtually Every IT Asset, On-prem and in the Cloud
Computer Hardware Windows UNIX Linux Dell DRAC HP Ilo Xerox Printers Mainframes… Databases SQL Server Oracle MySQL DB2 Sybase Teradata Applications Microsoft System Center SharePoint McAfee ePO IBM BigFix SAP … Network Appliances CheckPoint Cisco IOS EMC Foundry Juniper NetApp … Cloud Platforms Microsoft Azure Amazon Web Services Rackspace Force.com IBM SoftLayer Middleware Proxy Accounts Gateway Accounts WebSphere WebLogic … VM Environments VMware IBM System Z Microsoft Hyper-V …

10 What Differentiates Our Solution?
More than a vault Highly Extensible Solution Rapid time to value Automation at scale

11 About Lieberman Software
6/20/2018 9:26 AM About Lieberman Software © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Who is Lieberman Software?
Flagship Enterprise Random Password Manager (ERPM™) product automatically discovers and manages cross-platform privileged accounts at scale, and throughout the enterprise, thereby securing access to sensitive data, reducing internal and external security threats, improving IT productivity and ensuring regulatory compliance. Available Today

13 1400+ Enterprise Customers
And many more!

14 Demo!

15 Next Steps See a demo (right now)
Talk to a representative (right here) Sign up for a Free Risk Assessment Visit our website to learn more liebsoft.com

16 Please evaluate this session
6/20/2018 9:26 AM Please evaluate this session Your feedback is important to us! From your PC or Tablet visit MyIgnite at From your phone download and use the Ignite Mobile App by scanning the QR code above or visiting © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 Q&A Visit us at Booth 1404: See a Demo | Meet our Team
Learn more:

18 Thank You Visit us at Booth 1404: See a Demo | Meet our Team
Learn more:

19


Download ppt "Microsoft 2016 6/20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher."

Similar presentations


Ads by Google