SlideShare a Scribd company logo
1
SolarWinds® Security Updates
Partner Training
Clare Kavanagh, Channel Accounts Manager
Aravind Kurapati, APAC Geek
June 2013
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
2
» Who we are!
» How to discovery security needs
» Firewall Security Manager (FSM)
» Log & Event Manager (LEM)
» Network Configuration Manager (NCM)
**We are trying to cover a lot in this presentation! Please use
the question box in the gotomeeting if anything needs
clarification or a question comes up.
2
Agenda
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
3
SolarWinds – Who we are
Provide IT management software
that is powerful, easy-to-use and
affordable
Company background
Timeline 1999 Founded in Tulsa, OK
2005 Professional Investment
2006 Hired Management Team
2009 IPO (NYSE:SWI)
Headquarters Austin, Texas; over 500
employees worldwide
Customers Over 95,000 – from SMB to
Fortune 500
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
4
HELP!!!
4
My firewall rules are getting out of control! I need to be sure there
are no holes in my configs! I need to know my network is protected!
Web server logs, OS logs, application logs, firewall
logs…it’s impossible to read through all of them!
Network configuration changes, device backups, inventory
maintenance, compliance reporting…I can’t keep up!
Mobile devices are everywhere! I can’t keep track
of which devices are safe and which aren’t!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
5
Firewall
Management
How often do you analyze your firewall configurations?
How do you know if your firewalls rules are optimized for both security & performance?
How do you test a firewall addition or change to ensure it doesn’t have a negative impact?
How do you perform security audits and compliance reporting?
Log Management
How many log file sources do you review and how often do you review them?
How do you know if a breach has occurred and can you respond immediately?
How do you handle multiple-event correlation to detect anomalous behavior?
How do you handle security and compliance reporting?
Configuration
Management
How often do you backup the configuration files on your devices?
How do you go about deploying configuration changes/updates to multiple devices?
How quickly can you recover a device from a failed updated or config change?
How are you alerted when a network change is made or a configuration policy violated?
Questions to Consider
5
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
6
Firewall Security Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
7
The Problem
As organizations grow and firewall rules become more and more complex, it’s
easy for engineers to overlook existing rules and inadvertently open security
holes simply by not knowing the full impact of their changes.
Let's be honest, some firewall rule sets have grown so large and unmanageable,
it's become virtually impossible to decipher what's going on with the naked eye.
7
“Through 2018, more
than 95% of firewall
breaches will be
caused by firewall
misconfigurations,
not firewall flaws.”
Gartner research,
November 28, 2012
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
8
The Need for Easy Firewall Management
Which way would you rather manage your firewall configurations?
Point-&-Click ManagementComplex Command Line
OR
8
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
9
Firewall Management Best Practices
 Document all firewall rules and changes
 Configure firewall rules with minimal access rights
 Ensure all rules have business justification
 Implement a change-control policy
 Remove unused and redundant rules
 Perform firewall rule audits on an ongoing basis
 Log all pertinent firewall activity
 Back up firewall configuration files and logs regularly
 Automate, automate, automate!
9
SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
10
5 Ways SolarWinds FSM Can Help
1. Clean up and remove redundant, unused and conflicting rules
2. Scan your inventory for high risk firewalls and assess your risk
profile in minutes
3. Understand network policy through a unified view of connectivity,
routing, and the security rules responsible for allowing or blocking
network access
4. Know beforehand how a rule change will impact rules/objects,
traffic flows, and security checks
5. Troubleshoot service availability problems without touching
production devices
10
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
11
Log & Event Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
12
The Problem
Log files are generated across almost all of your IT assets—web server
logs, operating system logs, application logs, firewall logs, and more.
And, all of these log files need to be collected, stored, analyzed, and
effectively correlated for security, compliance, and troubleshooting
purposes.
12
Trying to sort through and decipher all
these logs manually is virtually impossible!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
13
Log Management Best Practices
 Define your log management policies and procedures
 Log all relevant and required data (but don’t “over-log”)
 Centrally aggregate all logged data
 Review logs on a regularly scheduled basis
 Correlate events across all log sources
 Perform real-time monitoring and alerting
 Run regularly scheduled security and compliance reports
 Store logs securely and retain for the required amount of time
 Automate, automate, automate!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
14
5 Ways SolarWinds LEM Can Help
1. Centralized collection of network device, machine, and cloud logs with
real-time, in-memory log correlation to instantly view security breaches
2. Built-in active responses to immediately and automatically take action
to mitigate threats
3. Advanced, easy-to-use, search interface with data visualization tools
that go well beyond ineffective traditional search bars
4. Over 300 out-of-the-box, “audit-proven” security and compliance
templates including PCI, HIPAA, SOX, GLBA and many more
5. USB defender technology protects sensitive data from with real-time
monitoring, detection notification and the ability to block usage
14
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
15
Network Configuration Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
16
The Problem
As enterprise networks grow in both size and complexity, the difficulty in
managing all the device configuration changes that are happening
throughout the IT infrastructure grows exponentially.
Manually logging in to each device separately to make changes or updates
means the likelihood of human error that can lead to policy violations,
unauthorized network access, and the possibility of a security breach.
Can you afford to take that chance?
16
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
17
The Need for Easy Network Config Management
Which way would you rather manage your network devices?
OR
17
Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
18
Configuration Management Best Practices
 Create standards-based IT security and access policies
 Implement a change management process to document and track all
changes to the network
 Establish role-based permissions to control who can make what change
 Backup critical network device configurations nightly and have a device
recovery plan in place
 Perform continuous monitoring with real-time change detection alerts
 Enforce policies with regularly scheduled security and compliance audits
 Validate and maintain policies and procedures through ongoing data
analysis and reviews
 Automate, automate, automate!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
19
5 Ways SolarWinds NCM Can Help
1. Automated device configuration management and bulk change management
to save time, reduce errors, and reduce the risk of costly network downtime
2. Automatic, scheduled backups of network configurations so your critical
devices are always protected
3. Configuration comparison and immediate rollback of failed changes to
instantly recover a device to a previous “known good” state
4. Real-time change detection and alerts to protect against policy violations,
unauthorized, unscheduled, and erroneous configuration changes
5. Out-the-box compliance reports, along with automated network inventory
reports customizable to your networks needs
19
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
20
How to Promote and Sell
» Deals and Opportunities - Additional margin may be available for net new deals.
Contact us with your opportunities as soon as you have them for special pricing
PartnersAPAC@solarwinds.com
» Leads – Generate your own leads using custom coded download links for your customers.
Leads will be automatically tagged to you. Request custom links from
PartnersAPAC@solarwinds.com
» Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partners
Sales and Technical training
 Videos
 Sales cards
 Presentations
Current end-user price list
Demo License (NFR) application
Branding, logos, box shots, screenshots
What’s New section for up-to-date information
14
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
21
Demo Sites
» NCM
 http://configuration.demo.solarwinds.com
» FSM
 http://demo.solarwinds.com/flashdemo/fsm
» LEM
 http://demo.solarwinds.com/flashdemo/lem
21
22
© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Summary and Q & A
» Clare Kavanagh, Channel Accounts Manager
Clare.Kavanagh@solarwinds.com
» Aravind Kurapati, APAC Geek
» Aravind.Kurapati@solarwinds.com
» Join our community of 150,000+ IT pros at www.thwack.com
Thank you for attending!
22
23
Q&A
Questions?
23
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
24
Thank You
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered
with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other
SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United
States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or
are trademarks or registered trademarks of their respective companies.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
24

More Related Content

What's hot

Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Anton Chuvakin
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
Huntsman Security
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
IT Governance Ltd
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
centralohioissa
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
Dirk Cipido
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Andris Soroka
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Enterprise Management Associates
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
Anton Chuvakin
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
Priyanka Aash
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
Mike Saunders
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
UBM_Design_Central
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 

What's hot (20)

Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 

Similar to APAC Partner Update: SolarWinds Security

How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
bkbk37
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
SolarWinds
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
SolarWinds
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
ColorTokens Inc
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
Karla Sasser, CPA CITP, CIA, CGMA
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
WilheminaRossi174
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
Samuel Loomis
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 

Similar to APAC Partner Update: SolarWinds Security (20)

How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 

More from SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
SolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
SolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
SolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
SolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
SolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
SolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
SolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
SolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds
 

More from SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

APAC Partner Update: SolarWinds Security

  • 1. 1 SolarWinds® Security Updates Partner Training Clare Kavanagh, Channel Accounts Manager Aravind Kurapati, APAC Geek June 2013 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 2. 2 » Who we are! » How to discovery security needs » Firewall Security Manager (FSM) » Log & Event Manager (LEM) » Network Configuration Manager (NCM) **We are trying to cover a lot in this presentation! Please use the question box in the gotomeeting if anything needs clarification or a question comes up. 2 Agenda © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 3. 3 SolarWinds – Who we are Provide IT management software that is powerful, easy-to-use and affordable Company background Timeline 1999 Founded in Tulsa, OK 2005 Professional Investment 2006 Hired Management Team 2009 IPO (NYSE:SWI) Headquarters Austin, Texas; over 500 employees worldwide Customers Over 95,000 – from SMB to Fortune 500 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 4. 4 HELP!!! 4 My firewall rules are getting out of control! I need to be sure there are no holes in my configs! I need to know my network is protected! Web server logs, OS logs, application logs, firewall logs…it’s impossible to read through all of them! Network configuration changes, device backups, inventory maintenance, compliance reporting…I can’t keep up! Mobile devices are everywhere! I can’t keep track of which devices are safe and which aren’t! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 5. 5 Firewall Management How often do you analyze your firewall configurations? How do you know if your firewalls rules are optimized for both security & performance? How do you test a firewall addition or change to ensure it doesn’t have a negative impact? How do you perform security audits and compliance reporting? Log Management How many log file sources do you review and how often do you review them? How do you know if a breach has occurred and can you respond immediately? How do you handle multiple-event correlation to detect anomalous behavior? How do you handle security and compliance reporting? Configuration Management How often do you backup the configuration files on your devices? How do you go about deploying configuration changes/updates to multiple devices? How quickly can you recover a device from a failed updated or config change? How are you alerted when a network change is made or a configuration policy violated? Questions to Consider 5 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 6. 6 Firewall Security Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 7. 7 The Problem As organizations grow and firewall rules become more and more complex, it’s easy for engineers to overlook existing rules and inadvertently open security holes simply by not knowing the full impact of their changes. Let's be honest, some firewall rule sets have grown so large and unmanageable, it's become virtually impossible to decipher what's going on with the naked eye. 7 “Through 2018, more than 95% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.” Gartner research, November 28, 2012 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 8. 8 The Need for Easy Firewall Management Which way would you rather manage your firewall configurations? Point-&-Click ManagementComplex Command Line OR 8 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 9. 9 Firewall Management Best Practices  Document all firewall rules and changes  Configure firewall rules with minimal access rights  Ensure all rules have business justification  Implement a change-control policy  Remove unused and redundant rules  Perform firewall rule audits on an ongoing basis  Log all pertinent firewall activity  Back up firewall configuration files and logs regularly  Automate, automate, automate! 9 SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 10. 10 5 Ways SolarWinds FSM Can Help 1. Clean up and remove redundant, unused and conflicting rules 2. Scan your inventory for high risk firewalls and assess your risk profile in minutes 3. Understand network policy through a unified view of connectivity, routing, and the security rules responsible for allowing or blocking network access 4. Know beforehand how a rule change will impact rules/objects, traffic flows, and security checks 5. Troubleshoot service availability problems without touching production devices 10 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 11. 11 Log & Event Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 12. 12 The Problem Log files are generated across almost all of your IT assets—web server logs, operating system logs, application logs, firewall logs, and more. And, all of these log files need to be collected, stored, analyzed, and effectively correlated for security, compliance, and troubleshooting purposes. 12 Trying to sort through and decipher all these logs manually is virtually impossible! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 13. 13 Log Management Best Practices  Define your log management policies and procedures  Log all relevant and required data (but don’t “over-log”)  Centrally aggregate all logged data  Review logs on a regularly scheduled basis  Correlate events across all log sources  Perform real-time monitoring and alerting  Run regularly scheduled security and compliance reports  Store logs securely and retain for the required amount of time  Automate, automate, automate! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 14. 14 5 Ways SolarWinds LEM Can Help 1. Centralized collection of network device, machine, and cloud logs with real-time, in-memory log correlation to instantly view security breaches 2. Built-in active responses to immediately and automatically take action to mitigate threats 3. Advanced, easy-to-use, search interface with data visualization tools that go well beyond ineffective traditional search bars 4. Over 300 out-of-the-box, “audit-proven” security and compliance templates including PCI, HIPAA, SOX, GLBA and many more 5. USB defender technology protects sensitive data from with real-time monitoring, detection notification and the ability to block usage 14 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 15. 15 Network Configuration Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 16. 16 The Problem As enterprise networks grow in both size and complexity, the difficulty in managing all the device configuration changes that are happening throughout the IT infrastructure grows exponentially. Manually logging in to each device separately to make changes or updates means the likelihood of human error that can lead to policy violations, unauthorized network access, and the possibility of a security breach. Can you afford to take that chance? 16 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 17. 17 The Need for Easy Network Config Management Which way would you rather manage your network devices? OR 17 Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 18. 18 Configuration Management Best Practices  Create standards-based IT security and access policies  Implement a change management process to document and track all changes to the network  Establish role-based permissions to control who can make what change  Backup critical network device configurations nightly and have a device recovery plan in place  Perform continuous monitoring with real-time change detection alerts  Enforce policies with regularly scheduled security and compliance audits  Validate and maintain policies and procedures through ongoing data analysis and reviews  Automate, automate, automate! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 19. 19 5 Ways SolarWinds NCM Can Help 1. Automated device configuration management and bulk change management to save time, reduce errors, and reduce the risk of costly network downtime 2. Automatic, scheduled backups of network configurations so your critical devices are always protected 3. Configuration comparison and immediate rollback of failed changes to instantly recover a device to a previous “known good” state 4. Real-time change detection and alerts to protect against policy violations, unauthorized, unscheduled, and erroneous configuration changes 5. Out-the-box compliance reports, along with automated network inventory reports customizable to your networks needs 19 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 20. 20 How to Promote and Sell » Deals and Opportunities - Additional margin may be available for net new deals. Contact us with your opportunities as soon as you have them for special pricing PartnersAPAC@solarwinds.com » Leads – Generate your own leads using custom coded download links for your customers. Leads will be automatically tagged to you. Request custom links from PartnersAPAC@solarwinds.com » Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partners Sales and Technical training  Videos  Sales cards  Presentations Current end-user price list Demo License (NFR) application Branding, logos, box shots, screenshots What’s New section for up-to-date information 14 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 21. 21 Demo Sites » NCM  http://configuration.demo.solarwinds.com » FSM  http://demo.solarwinds.com/flashdemo/fsm » LEM  http://demo.solarwinds.com/flashdemo/lem 21
  • 22. 22 © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Summary and Q & A » Clare Kavanagh, Channel Accounts Manager Clare.Kavanagh@solarwinds.com » Aravind Kurapati, APAC Geek » Aravind.Kurapati@solarwinds.com » Join our community of 150,000+ IT pros at www.thwack.com Thank you for attending! 22
  • 23. 23 Q&A Questions? 23 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 24. 24 Thank You The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 24

Editor's Notes

  1. A firewall is considered a network’s “first line of defense” in protecting sensitive data from unauthorized access. It’s the entry point of the network—determining what is allowed in and out.Without the proper firewall rules in place, your network is left exposed and vulnerable. It’s like leaving your front door open for anyone to come in and take what they want.This is why firewall configuration management is so crucial. Without it, access to your network can become a free-for-all! And, it’s important to remember that SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT, which makes firewall management even more important!
  2. NCM provides automated network configuration and change management to reduce the risk of human error and save you time and money. No more having to manually SSH or Telnet to each device. Do everything from one easy-to-use, centralized web interface. Detect and report on configuration policy violations and deliver real-time alerts