Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

eCSI - The Agile IT security

705 views

Published on

We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises.

Published in: Business
  • Be the first to comment

eCSI - The Agile IT security

  1. 1. The Agile IT security
  2. 2. Everything changed Mobile Outsource Social Consumerization Business IT User
  3. 3. Today: overweight of control Tomorrow: contextual security CONTROL OBSERVATION External Internal
  4. 4. The benefits of contextual security Bureaucracy Costs Staff Morale IT Agility Security Source: Gartner
  5. 5. eCSI principles 1 Transparency 2 Accountability 3 Responsibility 4 Proportionality 5 Adaptability WHAT YOU NEED IS: Real-time monitoring
  6. 6. How monitoring complements control? HIGH-QUALITY MONITORING REAL-TIME REACTION INTELLIGENT DATA ANALYSIS
  7. 7. Prevention by monitoring 1 2 3 4 5 6 7 8 9 Prevention Forensics
  8. 8. BalaBit eCSI Suite Blindspotter Syslog-ng Shell Control Box • Reliable logging • Wide range of sources • High-performance • Independent data source • Detailed footage • Control functions • Social network model • Real-time dashboards • Priority list • Zoom function • Run-on authentication • Privacy warranty
  9. 9. END

×