Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IT Foundation Management Security

458 views

Published on

Human error, out-of-policy activity, and malicious insiders can compromise the very foundation the business is built on. Managing risk and protecting the business requires a comprehensive security practice that covers all foundational interfaces at all times. IT Foundation Management provides the security the business needs with the transparency to prove the practice.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

IT Foundation Management Security

  1. 1. IT Foundation Management for Security<br />Securing the IT Foundation of your Business<br />Your business is built on IT<br />
  2. 2. What is the IT Foundation?<br />The IT Foundation includes all of your physical and virtual:<br />Servers…<br />Network Gear…<br />SANS…<br />Operating Systems…<br />Blades…<br />Networks…<br />Databases…<br />Appliances…<br />Virtual Machines…<br />Environment…<br />And is supported by:<br />Michael…<br />VM Administrator<br />I’m Joe…<br />Solaris Systems Administrator<br />Steve,<br />I’m a SANS Administrator<br />Cheryl,<br />Oracle DBA…<br />Hi. Raphael.<br />Network Administration<br />Dave,<br />Independent Consultant<br />Chris here…<br />Tools Manager<br />Hi I’m Tania,<br />Linux Systems Administrator<br /> TDi Technologies Your business is built on IT<br />
  3. 3. IT Foundation Management<br />Privileged Interfaces<br />DELIVERS:<br /> Persistent Security Model<br /> Unified Security Practice<br /> Automatic Forensics Capture<br /> Transparency & Oversight<br />DRIVING:<br /> Comprehensive Security Coverage<br /> Simplified Management Model<br /> Common-Consistent Practices<br /> Transparency<br /> Reliability<br /> Quality<br />YIELDING:<br /> Meeting of CISO Mandates<br /> Enhanced Information Assurance<br /> Improved Governance<br /> Reduced Risk<br /> Better Control<br />Privileged Actors<br />Michael…<br />VM Administrator<br /> I’m Joe…<br />Solaris Systems Administrator<br />Steve,<br />I’m a SANS Administrator<br />Cheryl,<br />Oracle DBA…<br />Hi. Raphael.<br />Network Administration<br />Dave,<br />Independent Consultant<br />Chris here…<br />Tools Manager<br />Hi I’m Tania,<br />Linux Systems Administrator<br /> TDi Technologies Your business is built on IT<br />
  4. 4. The Challenges are Driven by Complexity<br /> TDi Technologies Your business is built on IT<br />Siloed Operation. Multiple Applications.<br />Many Methods. Labor Intensive.<br />I’m Joe…<br />Solaris Systems Administrator<br />Hi. Raphael.<br />Network Administration<br />Steve,<br />I’m a SANS Administrator<br />Hi I’m Tania,<br />Linux Systems Administrator<br />Cheryl,<br />Oracle DBA…<br />Michael…<br />VM Administrator<br />
  5. 5. Simplified by IT Foundation Management<br /> TDi Technologies Your business is built on IT<br />To a unified security solution over all privileged<br />users and interfaces.<br />I’m Joe…<br />Solaris Systems Administrator<br />Hi. Raphael.<br />Network Administration<br />Steve,<br />I’m a SANS Administrator<br />Hi I’m Tania,<br />Linux Systems Administrator<br />Cheryl,<br />Oracle DBA…<br />Michael…<br />VM Administrator<br />
  6. 6. IT Foundation Management<br />Traditional Practices<br /> Persistence: Normal Operation<br />Documentation: Manual<br /> Persistence: All Modes<br />Documentation: Automatic<br />Secured in Normal Mode Only<br />Documentation is by hand<br />Persistent connection<br />Full security in all modes<br />Full documentation in all modes including:<br />Normal Operation<br />Maintenance<br />Configuration<br />Failure<br />With New Capabilities that Drive Success <br /> TDi Technologies Your business is built on IT<br />
  7. 7. Command and Control<br /> TDi Technologies Your business is built on IT<br />IT Foundation Management Delivers Real-time Policy Enforcement<br />Business Rules<br />Threat!<br />Generate Alert<br />Terminate Access<br />Etc…<br />Their activity is scanned in real-time against Policies<br />Break/Fix<br />Incidents<br />Configuration<br />Patching<br />Programming<br />Housekeeping<br />Maintenance<br />Install software<br />Privileged Actors perform their Work<br />Resulting in Real-Time Foundational Command and Control<br /> Real-time scanning of Privileged User Activity<br /> Script Engine for Complex and Wildcard Rules<br /> Control over Sessions – including Termination<br /> Configurable Alert Priorities<br /> Custom Actions (email, text, terminate)<br /> Unlimited Rules Support<br /> Directly Embed Compliance Rules in Scans<br />No Threat.<br />No Action Required.<br />
  8. 8. Simplification Example – Access Complexity<br />With the Traditional Approach, Privileged Actors need to know…<br />Log on?<br />PuTTY?<br />Absolute?<br />Credentials?<br />TeraTerm?<br />ZOC?<br />IP Address?<br />SSH?<br />CMDB?<br />Commands?<br />Tunnelier?<br />WHERE?<br />WHICH?<br />WHAT?<br />HOW?<br />Terminal?<br />Other DB?<br />TELNET?<br />etc?<br />Other records?<br />HTTP?<br />Other?<br />What syntax applies?<br />With IT Foundation Management, Privileged Actors need to know…<br />NAME<br />
  9. 9. Maintenance is Managed Safely and Effectively<br />Maintenance occurs regularly – yet mistakes can take critical IT assets off-line or compromise security.<br />Maintenance Includes:<br />Patching<br /><ul><li>Security
  10. 10. Performance
  11. 11. Features
  12. 12. Maintainability</li></ul>Configuration<br /><ul><li>Performance
  13. 13. Demand
  14. 14. New requirements
  15. 15. Issues
  16. 16. Expansion
  17. 17. Infrastructure changes</li></ul>Housekeeping<br /><ul><li>Disk clean-up
  18. 18. Update user/asset records
  19. 19. Run backups
  20. 20. Monitor/schedule jobs</li></ul>Upgrading<br /><ul><li>New software versions</li></ul> TDi Technologies Your business is built on IT<br />IT Foundation Management optimizes, automates, and centrally-manages all foundational maintenance activities.<br />
  21. 21. Managing the IT Services Foundation<br />Application<br />Application<br />Application<br />Service<br />Completes<br />Application<br />Service Starts<br />Business logic is updated as needed<br />(continuous improvement)<br />This information is collected in real-time<br />Response/ Remediation actions are triggered<br />Business logic is applied: Events, SLA Threats<br />
  22. 22. Use Case – Electronic Funds Transfer (EFT)<br />Receiving Bank Transfer/Posting Service<br />Currency<br />Exchange Service<br />Federal Reserve<br />Transfer Service<br />Service<br />Completes<br />Sending Bank Wire<br />Transfer Service<br />Service Starts<br />Business logic is updated as needed<br />(continuous improvement)<br />SLA Management:<br />Transactions (tracking) & Applications (errors)<br />Work Bottlenecks<br />Monitor, Predict, Alert on end-to-end processing time<br />Identify Issues (work stoppage) in Real-Time<br />This information is collected in real-time<br />Remediation actions are triggered<br />Business logic is applied: SLA Threats<br />
  23. 23. Customer B<br />Instance<br />Customer A<br />Instance<br />Customer C<br />Instance<br />Customer D<br />Instance<br />Customer E<br />Instance<br />IT Foundation Management in Public Clouds<br />CLOUD<br />ITFM for Public Clouds:<br />Privileged Interfaces Secured<br />Isolated from other Cloud Customers<br />Isolated from Cloud Provider<br />Privileged Activity Automatically Recorded (down to the keystroke)<br />IT Operations Simplified and Optimized<br />IT Services Effectively Managed<br />
  24. 24. Reducing Risk to the Business<br /> TDi Technologies Your business is built on IT<br />“<br />Manual documentation<br />Automatic Documentation<br />Reducing our risk exposure is always a good thing. When it includes addressing regulatory, security and operational challenges the value adds up fast.<br />CEO<br />Unnecessary complexity<br />Dramatic Simplification<br />Unified Privileged Interface Security<br />Siloed security tools and practices<br />Real-time Command & Control<br />Little or no control capability<br />RISK<br />Definitive Verification<br />Explicit Accountability<br />No means of verification<br />Lack of accountability<br />When mistakes happen in the IT Foundation, the business is placed at risk.<br />
  25. 25. IT Security and Compliance Benefits<br />VP IT Operations<br />Access policy enforceable<br />Change records automatically captured<br />Verification easy<br />CISO expectations met point by point<br />IT Tools Manager<br />The right tool that does the whole job right<br />Reduction in workload<br />Increased internal customer satisfaction<br />Problem solved!<br />The Business<br />Assets better protected<br />Operations simplified<br />Oversight and transparency enabled<br />Risks reduced<br />CISO<br />Privileged user security in all modes<br />Strong, verifiable deterent<br />Comprehensive forensics records<br /> TDi Technologies Your business is built on IT<br />
  26. 26. IT Foundation Management<br />Security Foundation<br />Closing the Foundation Gap<br /><ul><li> Role-based access and control
  27. 27. Record the 5 Ws
  28. 28. Complete forensic history</li></ul>IT Operations Foundation<br />Doing More with Less<br />Universal, integrated environment•<br />Optimized automated process •<br /> Secure remote management•<br />Compliance Foundation<br />Meeting Intent & Interpretation<br /><ul><li> Control subsystems changes
  29. 29. Detect compliance events
  30. 30. Build auditable history</li></ul>IT Services Foundation<br />Delivering on Commitments<br />Sense and Respond in real-time•<br /> Correlate across the architecture•<br /> Proactively manage and protect•<br /> TDi Technologies Your business is built on IT<br />

×