Presentation is loading. Please wait.

Presentation is loading. Please wait.

BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData.

Similar presentations


Presentation on theme: "BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData."— Presentation transcript:

1 BUSINESS USER MONITORING OBSERVEIT 5.8

2 Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData

3 RISK = APPS+ USERS Systems Applications Data Maintain backend application systems, DBs, and infrastructure for business users Risks Remote Access Configuration Changes Audit & Compliance IT Users User variety of applications everyday to drive business Risks App Data Extraction Shadow IT Audit & Compliance Business Users

4 USER RISK LANDSCAPE Contractors Business Users IT App Admins Users ManufacturingHealthcare BankingInsurance Energy Retail Applications IAM FirewallsSIEM Infrastructure DLP Data

5 BUSINESS USER BUSINESS USER RISK Source: Gartner 2013 Key IT Metrics Report IT USER 5% 95% 84% of Insider based breaches involve users with no admin rights

6 ENTERPRISE SCALE FOR BUSINESS USER MONITORING  Scale Storage and Performance  Scale Management  Security Automation  Maintaining User Privacy

7 Scale STORAGE AND PERFORMANCE

8 IMPROVED PERFORMANCE  Over 10,000 concurrent users  1,500 screenshots per second  3,500 Unix system calls per second

9 Scale MANAGEMENT

10 ADMIN DASHBOARD Mini Dashboard – preview important stuff See what is currently deployed Recent agents installed / uninstalled Get status of critical services Application Server status Agent status: -Attempts to stop or kill -Offline, unreachable -Unregistered, uninstalled -Tampered with -Data loss

11 MONITORED DEVICE LIST  Show agent status  Tampering and data loss indications  Flexible filters  Drill down to specific events

12 EVENTS, AND NOTIFICATIONS  Large list of detailed events  Full support for Unix/Linux agent  Email notifications (per event, digest – similar to Alerts)  Integrate with SIEM via Monitor Log and API

13 SECURITY AUTOMATION User Context SIEMIAM ITSM

14 EVENT AND ACTIVITY API  Real-time event and activity stream via Direct DB connection  Support all user activities, alerts and system events  Fully supported and documented API  Partners and integrators can provide additional value to customers

15 MAINTAINING USER PRIVACY

16 NEW PRIVACY CONTROLS  Secure audit of critical configuration changes  Detailed auditing reports the changes  Unable to view any recorded data  Can also manage ‘Configuration Admin’ users Role for Configuration Only Configuration Change Auditing

17 ADDITIONAL ENHANCEMENTS

18 ENHANCED RECORDING  Common way to transfer data on hosted servers  SFTP application agnostic  Can search, report and alert Record SFTP  Time based recording, even without user activity  Now you also know what did the user sees  Configured via Server Policy Continuous Recording

19 NEW PLATFORMS  Solaris 11  RHEL/CentOS/Oracle Linux 5, 6 Support latest updates for:  SQL Server 2014  Citrix XenDesktop and Citrix XenApp 7.6  Amazon Linux  Fedora 19, 20  RHEL/CentOS/Oracle Linux 7  SLES SuSE 12, Ubuntu 14.04 Post GA (5.8 SP1 and beyond)

20 THANK YOU


Download ppt "BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData."

Similar presentations


Ads by Google