Download presentation
Presentation is loading. Please wait.
Published byLorraine Atkinson Modified over 9 years ago
1
BUSINESS USER MONITORING OBSERVEIT 5.8
2
Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData
3
RISK = APPS+ USERS Systems Applications Data Maintain backend application systems, DBs, and infrastructure for business users Risks Remote Access Configuration Changes Audit & Compliance IT Users User variety of applications everyday to drive business Risks App Data Extraction Shadow IT Audit & Compliance Business Users
4
USER RISK LANDSCAPE Contractors Business Users IT App Admins Users ManufacturingHealthcare BankingInsurance Energy Retail Applications IAM FirewallsSIEM Infrastructure DLP Data
5
BUSINESS USER BUSINESS USER RISK Source: Gartner 2013 Key IT Metrics Report IT USER 5% 95% 84% of Insider based breaches involve users with no admin rights
6
ENTERPRISE SCALE FOR BUSINESS USER MONITORING Scale Storage and Performance Scale Management Security Automation Maintaining User Privacy
7
Scale STORAGE AND PERFORMANCE
8
IMPROVED PERFORMANCE Over 10,000 concurrent users 1,500 screenshots per second 3,500 Unix system calls per second
9
Scale MANAGEMENT
10
ADMIN DASHBOARD Mini Dashboard – preview important stuff See what is currently deployed Recent agents installed / uninstalled Get status of critical services Application Server status Agent status: -Attempts to stop or kill -Offline, unreachable -Unregistered, uninstalled -Tampered with -Data loss
11
MONITORED DEVICE LIST Show agent status Tampering and data loss indications Flexible filters Drill down to specific events
12
EVENTS, AND NOTIFICATIONS Large list of detailed events Full support for Unix/Linux agent Email notifications (per event, digest – similar to Alerts) Integrate with SIEM via Monitor Log and API
13
SECURITY AUTOMATION User Context SIEMIAM ITSM
14
EVENT AND ACTIVITY API Real-time event and activity stream via Direct DB connection Support all user activities, alerts and system events Fully supported and documented API Partners and integrators can provide additional value to customers
15
MAINTAINING USER PRIVACY
16
NEW PRIVACY CONTROLS Secure audit of critical configuration changes Detailed auditing reports the changes Unable to view any recorded data Can also manage ‘Configuration Admin’ users Role for Configuration Only Configuration Change Auditing
17
ADDITIONAL ENHANCEMENTS
18
ENHANCED RECORDING Common way to transfer data on hosted servers SFTP application agnostic Can search, report and alert Record SFTP Time based recording, even without user activity Now you also know what did the user sees Configured via Server Policy Continuous Recording
19
NEW PLATFORMS Solaris 11 RHEL/CentOS/Oracle Linux 5, 6 Support latest updates for: SQL Server 2014 Citrix XenDesktop and Citrix XenApp 7.6 Amazon Linux Fedora 19, 20 RHEL/CentOS/Oracle Linux 7 SLES SuSE 12, Ubuntu 14.04 Post GA (5.8 SP1 and beyond)
20
THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.