Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cutting-Edge Network Behavior Audit Technology from BMST


Published on

Brief introduction of technologies and products from BMST Co. which is the leading company at transparent network behavior audit and forensics.

Published in: Technology
  • Be the first to comment

Cutting-Edge Network Behavior Audit Technology from BMST

  1. 1. Advanced Network Behavior Analysis , <br />Record and Audit<br />Last Modified: Dec.8 2009<br />Introduction of BMST Technologies<br />
  2. 2. Agenda<br />1. Opportunity and Business Overview<br />2. Technology and Products <br />3. Scenarios and Solutions<br />4. Our Customers<br />5. About BMST<br />2<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  3. 3. What Gartner Top 10 and NSA Say?<br />Gartner TOP 10 2010<br />1 Cloud computing, 2 Advanced analytics, 3 Client computing, 4 IT for Green,5 Reshaping the data center 6 Social computing, 7 Security - activity monitoring.  …Information security professionals face the challenge of detecting malicious activity in a constant stream of discrete events that are usually associated with an authorized user and are generated from multiple network, system and application sources. At the same time, security departments are facing increasing demands for ever-greater log analysis and reporting to support audit requirements... <br />8 Flash memory, 9 Virtualization for availability, 10 Mobile applications. <br />Security is not just the perimeter; layered defenses must be inside of the network and on the applications and databases if we really want to protect information. We haven’t done nearly enough to protect applications and databases…and the magnitude of loses around insider threats are underreported. <br />William (Bill) Crowell – former Deputy Director of the NSA<br />3<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  4. 4. Cloud Flight Needs Cyber “Black Box”<br /><ul><li>How to do forensics in case of a security incident?
  5. 5. Are you outsourcing? How to handle potential contractual dispute in case of an IT issue?
  6. 6. Don’t you need compliance? What to show external auditors on complete organization IT operation records?
  7. 7. How to monitor and find the violation of authorized users in real time?
  8. 8. How to guarantee the security policy are followed correctly?</li></ul>4<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  9. 9. Answers from BMST<br /><ul><li>Complete record and replay
  10. 10. Real time monitoring
  11. 11. Smart behavior analysis and Audit
  12. 12. Comprehensive protocol support
  13. 13. Transparent deployment
  14. 14. Intuitive “flight” administration
  15. 15. Tampering-proof authentic “data” management</li></ul>5<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  16. 16. Session Auditor System Architecture<br />Session Auditor is consist of three components: SAS, SAD and SAC<br />Session Auditor Sensor<br /><ul><li>Transparent deployment
  17. 17. Bridge-model run
  18. 18. Session based data recording
  19. 19. Complete protocol support
  20. 20. Send recorded data to SAD</li></ul>Session Auditor Datacenter<br /><ul><li>Sea-volume storage
  21. 21. Respond to SAC orders
  22. 22. Smart audit and search
  23. 23. Security and maintenance</li></ul>Session Auditor Console<br /><ul><li>Centralized operations and audit
  24. 24. Flexible reporting system
  25. 25. Policy-based real-time monitoring, alert and response</li></ul>6<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  26. 26. Session-Auditor Deployment<br />SSH<br />RDP<br />Telnet<br />ICA<br />Rlogin<br />VNC<br />FTP<br />Oracle<br />Sybase<br />……<br />Administrator<br />WebApp& Web Services<br />Enterprise Apps<br />(ERP/CRM)<br />SAS<br />Traffic<br />IT系统管理员/<br />兼职安全管理<br />Recorded<br />Servers<br />Unix/Linux<br />Console<br />Windows<br />Network<br />Security<br />SAD<br />Auditor<br />Mission critical<br />企业应用<br />(SAP, Oracle等)<br />
  27. 27. Critical System<br />Critical System<br />Critical System<br />Critical System<br />SAS<br />SAS<br />SAS<br />SAS<br />Administrator<br />SAD<br />SAD<br />Administrator<br />SAC<br />Auditor<br />Distributed and Hierarchical Deployment <br />
  28. 28. Unique Value of BMST SA Products<br />Transparent audit for RDP, SSH, Citrix/ICA, Oracle, DB2...<br />Complete recording and replay<br />Transparent bridge deployment<br />High availability and distributed deployment<br />It’s a long list and growing…<br />1<br />2<br />GENERAL<br /><ul><li>HTTPS, HTTP, SMTP, POP3, FTP, Telnet, CIFS, Samba...</li></ul>REMOTE ADMIN<br /><ul><li>RDP, SSH, VNC,SFTP/SCP, Rlogin, X11…</li></ul>DATABASE<br /><ul><li>MSSQL, Oracle, Sybase, DB2…</li></ul>INDUSTRY SPECIFIC<br /><ul><li>Citrix ICA, HP RGS…</li></ul>3<br />4<br />ENCRYPTED? <br />NO PROBLEM!<br />Great expandability by open SCRIPTINTERFACE <br />For more details, please refer to<br />9<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  29. 29. Session Auditor Product Family<br />Session Auditor Lite is one 2-in-1 appliance, integrated SAS and SAD<br />Storage<br />SAS and SAD support distributed and hierarchical deployment, bringing users further flexibility<br />Network Throughput <br />10<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  30. 30. Scenarios and Solutions<br />Cloud Computing and IT Outsourcing<br />Complete and authentic organization records<br />Potential contractual dispute in case of security incident and IT issue<br /><ul><li>Compliance
  31. 31. PCI-DSS, SOX, ISO27001, HIPAA, GLBA, SB1836, …
  32. 32. “Audit”, “Records”, “e-Discovery” are essential to all of them
  33. 33. Virtual Asset Protection for Online Gaming
  34. 34. Internal abuse and theft
  35. 35. Potential lawsuit for virtual assets</li></ul>11<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  36. 36. Our Customers<br />Session Auditor has been widely adopted by industry leading customers from telco, finance, service providers, consulting firms, governments and etc. Please visit for more details.<br />12<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  37. 37. About BMST Co.<br />Founded at March 2006<br />BMST, which is located at ZGC High-Tech District, Beijing, China, focuses on innovation and development on network security products and technologies. <br />The founders have profound experience at network security, telco, finance and various industries.<br />,%2BHuatong%2BMansion<br /><ul><li> (General query)
  38. 38. (Sales)
  39. 39. (Partnership) </li></ul>@bmstdotnet<br />13<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />
  40. 40. 14<br />©Copyright, BMST Co. 2009<br />December 13, 2009<br />