SlideShare a Scribd company logo
TDi DEFENSE FOUNDATION

                     TDi Defense Foundation
                     The Defense Foundation from TDi Technologies® is an integrated platform that
                     helps secure the organization from the Insider Threat (and outsiders who breach
                     perimeter defenses).
                      The Defense Foundation starts with the component layer of IT infrastructure in or-
der to secure IT infrastructure at its very foundation by establishing connection and control over privi-
leged component interfaces that are used to configure, repair, and maintain the systems layer of the ar-
chitecture regardless of the operation mode of the component. This means that even while systems and
components are “off the corporate network” the security model is still in place.

Business Challenges
The Defense Foundation helps organi-
zations:
       1. Protect their infrastructure
          from the Insider Threat
       2. Secure privileged interfaces
       3. Create a forensic record of
          what did, and did not, happen

Key Features
Key features are:
       1. Secures, controls and logs
          privileged interfaces
       2. Provides role-based, authenticated security to privileged interfaces
       3. Supports event and threat condition detection and creates matter-of-record forensic logs
          (legal, audit, regulatory)
       4. Provides remote, secure access anywhere an internet connection exists.

Technology Differentiators
Key technology differentiators are:
       1. Creates persistent connections, detecting events as they actually occur (milliseconds)
       2. Retains monitoring and control in all operating modes.
       3. Employs advanced pattern-matching for early warning and Threat remediation.
       4. Brokers one-click-by-event opening of component consoles for fast response
       5. Creates forensic logs of all events that occur and actions that are taken.
TDi DEFENSE FOUNDATION


       Foundation Management Server
       The Foundation Management Server provides information flow processing, business rule
       execution, pattern-matching execution,
       role-based security, and log file genera-
       tion for all modules. The Foundation
       Management Server handles all input
       and output for the foundation, serving
       this data up to Foundation modules as
       needed.
       The Foundation Management Server is a
       rigorously optimized processing engine
       specifically designed to handle extremely
       high volume I/O traffic. This gives TDi
       Foundation Management products the ability to “sense and respond” to events in real-time
       measured in milliseconds.

       Foundation Protocol Manager
       The Foundation Protocol Manager establishes and maintains connections to information
       flows that are generated by hardware, software and other intelligent devices. The Founda-
       tion Protocol Manager serves as the bridge between the many different types of communi-
       cation channels that exist in the I.T. Infrastructure and the Foundation Management Server.
       The Protocol Manager supports connections to hardware and software interfaces over a
       variety of digital communication proto-
       cols including:
          SNMP
          SSH
          SSL
          Syslog
          Telnet
          IPMI
          WMI-CIM
          and even custom serial interfaces.
       The flexibility of the Foundation Protocol Manager enables it to connect streams of informa-
       tion from virtually any point in the IT architecture to the Foundation Management Server.
       For bidirectional interfaces, the Foundation Protocol Manager connects outbound informa-
       tion flows to interfaces to perform remediation, maintenance and repair actions based on
       automated business rules and user-entered actions.
TDi DEFENSE FOUNDATION


       Defense Module
       The Defense Module helps protect organizations from the Insider Threat with respect
       to:
          Gaining access to, altering or destroying sensitive data
          Inappropriate actions that can compromise the privacy of private records
          Insertion of malicious code
          Disruption of critical services from improper configuration of components or sys-
       tems

       Features and Functions
       The Defense Module includes the following features and functions:
       1. Configure and deploy the role-based
          security model
       2. Monitor privileged interface events
          along with other infrastructure events
       3. Log definition of events and actions
          to be recorded
       4. Creation and assignment of business
          rules against events and event pat-
          terns.
       5. Creation and assignment of auto-
          mated notifications against events
          and event patterns
       6. Generation of reports and dashboard elements for inclusion in the Graphical User
          Interface (ConsoleWorks).

       Virtualization Module
       In addition to the Defense Module, the Virtualization Module can be used to extend the
       defense strategy to virtualization technologies. The Virtualization Module creates this
       extension to the Defense Foundation by including virtualization technologies in the De-
       fense strategy with support for hypervisors and Virtual Machines (XEN, VMware).
TDi DEFENSE FOUNDATION


     Intelligent Event Modules                               MESSAGE: “GMS_001”
     Intelligent Event Modules (IEMs) associate de-
     scriptive text directly from the respective vendor,
     industry recognized resources or product experts        IEM DESCRIPTION:
     to the cryptic event codes generated by devices,        Both DLM ENABLED and
     operating systems and other IT components to            GMS_ENABLED entries cannot be set
     expedite incident diagnosis. Where available,           to YES at the same time. Change one
     IEMs also associate recommended actions that            of them to NO.
     help further collapse the incident lifecycle and fur-
     ther improve IT operations efficiency.

     TDi offers more than 70 Intelligent Event Modules for the Foundation Management Suite
     including IEMs for:

        Operating Systems

        Network Components

        Hardware

        Storage

        Applications

        and Industry-specific use
        cases.

     Embedded Domain
     Knowledge
     Intelligent Event Modules
     serve as “on demand domain
     knowledge” for Foundation Services Modules. Each Foundation Service Module has access
     to installed IEMs through the Foundation Management Server so that descriptive event in-
     formation can be immediately presented to users for fast, accurate incident diagnosis.

     Adaptive Domain Knowledge
     In addition, IEMs can have additional information added to them during run-time to record
     remediation actions or other dispensation instructions when an incident is resolved. In this
     way, IEMs serve as a means to continually embed value-added domain knowledge directly
     into the Foundation.
TDi DEFENSE FOUNDATION


               Graphical User Interface
                                    ConsoleWorks is the authenticated and secured graphical user
CONSOLEWORKS
                                    interface to the Defense Foundation and is delivered as a web UI
 Secure, Remote access              that provides access anywhere an internet connection is available.
 Spans distributed infrastructure
                                    This is particularly important for situations where users are not
 Addresses outsourcing needs        physically present at the location of the IT assets being managed
 Works with Central Support         as with: an IT outsourcing model; centralized support dept.; or flex
                                    (home office) working arrangements.
 Supports Flex-work policies
               Business Intelligence
               The Defense Foundation also
               provides comprehensive Busi-
               ness Intelligence capabilities by
               presenting graphical Dashboards
               and Reports to users in Console-
               Works.
               Dashboards and reports are gen-
               erated from the data captured by
               the Foundation Management
               Server and the profile developed
               in the Defense Foundation Mod-
               ule.

               Learn More
               To learn more about Foundation Management from TDi Technologies® please visit us
               on the web at www.TDiTechnologies.com or contact us directly through our:




               Contact form: www.TDiTechnologies.com/contact
               Phone - Toll Free: 800.695.1258 International: 972.881.1553
               By email: sales@TDiTechnologies.com


                                                                                   TDi Technologies®
                                                                         TDi Foundation for Healthcare

                                                                            Your Business is Built on IT

More Related Content

What's hot

Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
solarisyougood
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
guestb099f64c
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
tsteh
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Private Cloud
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
Cisco Case Studies
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
Yury Chemerkin
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Private Cloud
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
Bob Rhubart
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
EMC
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
Ana González Monzón
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
Scott K. Wilder
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
Sentri
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
Entrust Datacard
 

What's hot (20)

Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Ramnish Singh Platform Security Briefing
Ramnish Singh Platform Security BriefingRamnish Singh Platform Security Briefing
Ramnish Singh Platform Security Briefing
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Security for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks EnterpriseSecurity for QuickBooks and QuickBooks Enterprise
Security for QuickBooks and QuickBooks Enterprise
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Viewers also liked

Cuatro bases para toma tu lecho y andar
Cuatro bases para toma tu lecho y andarCuatro bases para toma tu lecho y andar
Cuatro bases para toma tu lecho y andarLider de Red ICMS
 
Second Life Meeting Organisation Tools
Second Life Meeting Organisation ToolsSecond Life Meeting Organisation Tools
Second Life Meeting Organisation Tools
MobiusRyba
 
Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...
Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...
Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...
Aviroop Banik
 
Calendar
CalendarCalendar
Calendar
maryalice124
 
IOTW: Student Exchange Opportunities, by Erlyani Hamid
IOTW: Student Exchange Opportunities, by Erlyani HamidIOTW: Student Exchange Opportunities, by Erlyani Hamid
IOTW: Student Exchange Opportunities, by Erlyani Hamid
MENDAKI Club
 
Accountancy Day - Troy University
Accountancy Day - Troy UniversityAccountancy Day - Troy University
Accountancy Day - Troy University
Tammy Busby
 
Studio Guidi S.r.l. - Organizzazione e Consulenza congressuale
Studio Guidi S.r.l. - Organizzazione e Consulenza congressualeStudio Guidi S.r.l. - Organizzazione e Consulenza congressuale
Studio Guidi S.r.l. - Organizzazione e Consulenza congressuale
giovannalucherini
 
Let's head to the square
Let's head to the squareLet's head to the square
Let's head to the square
Pablo Calderón Salazar
 
Spring 2009 Known Artists
Spring 2009 Known ArtistsSpring 2009 Known Artists
Spring 2009 Known Artists
koiv
 
Acquiring new lands
Acquiring new landsAcquiring new lands
Acquiring new lands
ham97
 
Ypf[1]
Ypf[1]Ypf[1]
Ypf[1]
marmusic
 
007 unidade iv - pp.284-final
007   unidade iv - pp.284-final007   unidade iv - pp.284-final
007 unidade iv - pp.284-final
Giovani Comerlatto
 
Design & Politix Do Not Mix
Design & Politix Do Not MixDesign & Politix Do Not Mix
Design & Politix Do Not Mix
Pablo Calderón Salazar
 
Alexander the great clicker quiz
Alexander the great clicker quizAlexander the great clicker quiz
Alexander the great clicker quiz
ham97
 
I personaggi più famosi del Web 2.0
I personaggi più famosi del Web 2.0I personaggi più famosi del Web 2.0
I personaggi più famosi del Web 2.0
Reputation Manager
 
Anno 2013: la Rete ti vede così
Anno 2013: la Rete ti vede cosìAnno 2013: la Rete ti vede così
Anno 2013: la Rete ti vede così
Reputation Manager
 
Life sciences regulations in Russia - 2015
Life sciences regulations in Russia - 2015Life sciences regulations in Russia - 2015
Life sciences regulations in Russia - 2015
Andrey Zelenin
 
World war 2
World war 2World war 2
World war 2
ham97
 
Dead civilizations
Dead civilizationsDead civilizations
Dead civilizations
ham97
 
The cold war heats up
The cold war heats upThe cold war heats up
The cold war heats up
ham97
 

Viewers also liked (20)

Cuatro bases para toma tu lecho y andar
Cuatro bases para toma tu lecho y andarCuatro bases para toma tu lecho y andar
Cuatro bases para toma tu lecho y andar
 
Second Life Meeting Organisation Tools
Second Life Meeting Organisation ToolsSecond Life Meeting Organisation Tools
Second Life Meeting Organisation Tools
 
Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...
Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...
Viral Marketing By Aviroop Banik{Rizvi Institutes of Management Studies,Bandr...
 
Calendar
CalendarCalendar
Calendar
 
IOTW: Student Exchange Opportunities, by Erlyani Hamid
IOTW: Student Exchange Opportunities, by Erlyani HamidIOTW: Student Exchange Opportunities, by Erlyani Hamid
IOTW: Student Exchange Opportunities, by Erlyani Hamid
 
Accountancy Day - Troy University
Accountancy Day - Troy UniversityAccountancy Day - Troy University
Accountancy Day - Troy University
 
Studio Guidi S.r.l. - Organizzazione e Consulenza congressuale
Studio Guidi S.r.l. - Organizzazione e Consulenza congressualeStudio Guidi S.r.l. - Organizzazione e Consulenza congressuale
Studio Guidi S.r.l. - Organizzazione e Consulenza congressuale
 
Let's head to the square
Let's head to the squareLet's head to the square
Let's head to the square
 
Spring 2009 Known Artists
Spring 2009 Known ArtistsSpring 2009 Known Artists
Spring 2009 Known Artists
 
Acquiring new lands
Acquiring new landsAcquiring new lands
Acquiring new lands
 
Ypf[1]
Ypf[1]Ypf[1]
Ypf[1]
 
007 unidade iv - pp.284-final
007   unidade iv - pp.284-final007   unidade iv - pp.284-final
007 unidade iv - pp.284-final
 
Design & Politix Do Not Mix
Design & Politix Do Not MixDesign & Politix Do Not Mix
Design & Politix Do Not Mix
 
Alexander the great clicker quiz
Alexander the great clicker quizAlexander the great clicker quiz
Alexander the great clicker quiz
 
I personaggi più famosi del Web 2.0
I personaggi più famosi del Web 2.0I personaggi più famosi del Web 2.0
I personaggi più famosi del Web 2.0
 
Anno 2013: la Rete ti vede così
Anno 2013: la Rete ti vede cosìAnno 2013: la Rete ti vede così
Anno 2013: la Rete ti vede così
 
Life sciences regulations in Russia - 2015
Life sciences regulations in Russia - 2015Life sciences regulations in Russia - 2015
Life sciences regulations in Russia - 2015
 
World war 2
World war 2World war 2
World war 2
 
Dead civilizations
Dead civilizationsDead civilizations
Dead civilizations
 
The cold war heats up
The cold war heats upThe cold war heats up
The cold war heats up
 

Similar to Defense Foundation Product Brief

What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdf
Nukala Gopala Krishna Murthy
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
Creus Moreira Carlos
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
Ronald Jackson, Jr
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptx
BluechipComputerSyst
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
Intel IoT
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy
Jeff Davis
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
Tom - Creed
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
David J Rosenthal
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
IOSR Journals
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
Julie Beuselinck
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
Ghassan Chahine
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
J Hartig
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
adeel hamid
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
Susan Wu
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
Agora Group
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 

Similar to Defense Foundation Product Brief (20)

What Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdfWhat Is an IT Infrastructure_ Types and Components.pdf
What Is an IT Infrastructure_ Types and Components.pdf
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptx
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 

Defense Foundation Product Brief

  • 1. TDi DEFENSE FOUNDATION TDi Defense Foundation The Defense Foundation from TDi Technologies® is an integrated platform that helps secure the organization from the Insider Threat (and outsiders who breach perimeter defenses). The Defense Foundation starts with the component layer of IT infrastructure in or- der to secure IT infrastructure at its very foundation by establishing connection and control over privi- leged component interfaces that are used to configure, repair, and maintain the systems layer of the ar- chitecture regardless of the operation mode of the component. This means that even while systems and components are “off the corporate network” the security model is still in place. Business Challenges The Defense Foundation helps organi- zations: 1. Protect their infrastructure from the Insider Threat 2. Secure privileged interfaces 3. Create a forensic record of what did, and did not, happen Key Features Key features are: 1. Secures, controls and logs privileged interfaces 2. Provides role-based, authenticated security to privileged interfaces 3. Supports event and threat condition detection and creates matter-of-record forensic logs (legal, audit, regulatory) 4. Provides remote, secure access anywhere an internet connection exists. Technology Differentiators Key technology differentiators are: 1. Creates persistent connections, detecting events as they actually occur (milliseconds) 2. Retains monitoring and control in all operating modes. 3. Employs advanced pattern-matching for early warning and Threat remediation. 4. Brokers one-click-by-event opening of component consoles for fast response 5. Creates forensic logs of all events that occur and actions that are taken.
  • 2. TDi DEFENSE FOUNDATION Foundation Management Server The Foundation Management Server provides information flow processing, business rule execution, pattern-matching execution, role-based security, and log file genera- tion for all modules. The Foundation Management Server handles all input and output for the foundation, serving this data up to Foundation modules as needed. The Foundation Management Server is a rigorously optimized processing engine specifically designed to handle extremely high volume I/O traffic. This gives TDi Foundation Management products the ability to “sense and respond” to events in real-time measured in milliseconds. Foundation Protocol Manager The Foundation Protocol Manager establishes and maintains connections to information flows that are generated by hardware, software and other intelligent devices. The Founda- tion Protocol Manager serves as the bridge between the many different types of communi- cation channels that exist in the I.T. Infrastructure and the Foundation Management Server. The Protocol Manager supports connections to hardware and software interfaces over a variety of digital communication proto- cols including: SNMP SSH SSL Syslog Telnet IPMI WMI-CIM and even custom serial interfaces. The flexibility of the Foundation Protocol Manager enables it to connect streams of informa- tion from virtually any point in the IT architecture to the Foundation Management Server. For bidirectional interfaces, the Foundation Protocol Manager connects outbound informa- tion flows to interfaces to perform remediation, maintenance and repair actions based on automated business rules and user-entered actions.
  • 3. TDi DEFENSE FOUNDATION Defense Module The Defense Module helps protect organizations from the Insider Threat with respect to: Gaining access to, altering or destroying sensitive data Inappropriate actions that can compromise the privacy of private records Insertion of malicious code Disruption of critical services from improper configuration of components or sys- tems Features and Functions The Defense Module includes the following features and functions: 1. Configure and deploy the role-based security model 2. Monitor privileged interface events along with other infrastructure events 3. Log definition of events and actions to be recorded 4. Creation and assignment of business rules against events and event pat- terns. 5. Creation and assignment of auto- mated notifications against events and event patterns 6. Generation of reports and dashboard elements for inclusion in the Graphical User Interface (ConsoleWorks). Virtualization Module In addition to the Defense Module, the Virtualization Module can be used to extend the defense strategy to virtualization technologies. The Virtualization Module creates this extension to the Defense Foundation by including virtualization technologies in the De- fense strategy with support for hypervisors and Virtual Machines (XEN, VMware).
  • 4. TDi DEFENSE FOUNDATION Intelligent Event Modules MESSAGE: “GMS_001” Intelligent Event Modules (IEMs) associate de- scriptive text directly from the respective vendor, industry recognized resources or product experts IEM DESCRIPTION: to the cryptic event codes generated by devices, Both DLM ENABLED and operating systems and other IT components to GMS_ENABLED entries cannot be set expedite incident diagnosis. Where available, to YES at the same time. Change one IEMs also associate recommended actions that of them to NO. help further collapse the incident lifecycle and fur- ther improve IT operations efficiency. TDi offers more than 70 Intelligent Event Modules for the Foundation Management Suite including IEMs for: Operating Systems Network Components Hardware Storage Applications and Industry-specific use cases. Embedded Domain Knowledge Intelligent Event Modules serve as “on demand domain knowledge” for Foundation Services Modules. Each Foundation Service Module has access to installed IEMs through the Foundation Management Server so that descriptive event in- formation can be immediately presented to users for fast, accurate incident diagnosis. Adaptive Domain Knowledge In addition, IEMs can have additional information added to them during run-time to record remediation actions or other dispensation instructions when an incident is resolved. In this way, IEMs serve as a means to continually embed value-added domain knowledge directly into the Foundation.
  • 5. TDi DEFENSE FOUNDATION Graphical User Interface ConsoleWorks is the authenticated and secured graphical user CONSOLEWORKS interface to the Defense Foundation and is delivered as a web UI Secure, Remote access that provides access anywhere an internet connection is available. Spans distributed infrastructure This is particularly important for situations where users are not Addresses outsourcing needs physically present at the location of the IT assets being managed Works with Central Support as with: an IT outsourcing model; centralized support dept.; or flex (home office) working arrangements. Supports Flex-work policies Business Intelligence The Defense Foundation also provides comprehensive Busi- ness Intelligence capabilities by presenting graphical Dashboards and Reports to users in Console- Works. Dashboards and reports are gen- erated from the data captured by the Foundation Management Server and the profile developed in the Defense Foundation Mod- ule. Learn More To learn more about Foundation Management from TDi Technologies® please visit us on the web at www.TDiTechnologies.com or contact us directly through our: Contact form: www.TDiTechnologies.com/contact Phone - Toll Free: 800.695.1258 International: 972.881.1553 By email: sales@TDiTechnologies.com TDi Technologies® TDi Foundation for Healthcare Your Business is Built on IT