Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRIVILEGED ACCOUNT ABUSE

Similar presentations


Presentation on theme: "PRIVILEGED ACCOUNT ABUSE"— Presentation transcript:

1 PRIVILEGED ACCOUNT ABUSE
Why it’s your #1 security threat and how you can stop it today.

2 Introduction Standard speaker slide Headshot Name/Title

3 Offices: DC, London, Sydney
Founded in 1996 Offices: DC, London, Sydney

4 47 of the Fortune 500 including:
Thycotic eliminates privileged account abuse for more than 3,000 organizations world-wide. 47 of the Fortune 500 including: Our security tools vault and securely manage privileged account credentials while monitoring the users accessing them daily.

5 Why is privileged account abuse so relevant in today’s data breaches?

6 Play insider threat video
The obligatory Snowden slide. Whether you agree or disagree with his politics, Snowden has certainly raised awareness to the insider threat problem. Just how relevant is Insider Threat to companies today?

7 Human Accounts Accounts Non-Human VS Service accounts
Unix ROOT Windows Local Admin Tied to an end-user Active Directory LDAP accounts People accounts -AD -LDAP Non-People Accounts -Service accounts -Windows local admin -Unix root -CISCO enable

8 Global Data Breach Landscape: 2013 - 2014
2014 Verizon Data Breach investigations report 50 contributing organizations 1,367 data breaches 63,437 incidents on record Spanning 95 countries Source: 2014 Verizon Data Breach Investigations Report

9

10 RISK ASSESSMENT Are you following SANS CSC recommendations per the DBIR?

11 SANS CSC: Quick Wins Provide solid risk reduction without major procedural, architectural, or technical changes to an environment Provide such substantial and immediate risk reduction against very common attacks that most security-aware organizations prioritize these key controls. Source: SANS CSC Controls – website definitions

12 Vault Credentials

13 Discover Inventory Audit

14 Rotate Passwords

15 Monitor Admins Monitor Activity

16 Thycotic Secret Server: Eliminates Privileged Account abuse for global organizations.
Securely vaults and centralizes privileged credentials for IT. Automatically rotates strong passwords on non-human privileged accounts (Unix, Windows Local Admin, Service Accounts, Database Admin Accounts). Monitors privileged user activity through session recording, keylogging and live session monitoring. Produces custom reports for auditing and compliance mandates such as PCI, SOX and HIPAA.

17 Why do organizations choose Thycotic?
Largest Privileged Account Management provider: 3,000+ global customers. Rated #1 in customer satisfaction by Forrester Research. The #1 adoption rate with 180,000+ users world-wide. Fastest enterprise-class PAM tool to install: all software, no appliance Deploys in hours, not months. Immediate ROI eliminating password and privileged account abuse from Day 1.

18 Questions? Questions?


Download ppt "PRIVILEGED ACCOUNT ABUSE"

Similar presentations


Ads by Google