SlideShare a Scribd company logo
GestãoPrivilégios e                  Custódia de Senhas
Desktops-Issues TODOS SAUDÁVEIS ALGUNS SAUDÁVEIS
Servers-Issues PRIVILÉGIOS CONHECIDOS PRIVILÉGIOS DESCONHECIDOS ? ? ? ? ? ?
ConceitoSAPM HOWACCOUNTS HOW  GROUPS HOW  SERVERS and/or DESKTOPS HOW  OFTEN …
USE CASES & BEST PRATICES Stock Exchange SingapureAutomatizarprocessosManuaise ReduzirCustos. Brazilian Telecom Company Controle dos Desktops (System Center, Anti-virus, Configuração, Local Admin, Grupos) US Datacenter Hosting ServicesAmbienteDinâmico, MudançasRápidas e tempo paraexecutá-las e identificá-las Germany IT Services Responder ao SLA (forma que é contabilizida) BancoEUACompliance, RelatóriosparaProvar (de facto) o Controle Militar Organization Complexidade de Gerenciar 70.000 devices Profitable Education Discovery Many Others…
Lieberman Software Fundadaem 1978, com focoem Privileged Identity Management Parceiros: Cisco, HP, IBM, Microsoft, Novell,                                Oracle, Red Hat, RSA, Sybase ImportantesClientes no Brasil e Mundo
Porque? Privileged Account Password Management “… shared account password management tools will be used by more than 50% of large enterprises by year end 2010 to manage passwords for shared accounts.” Market Overview: Shared-Account/Software-Account Password Management Tools  “In any organization, the use of every platform and device ultimately relies on superuser accounts, which are the most powerful in the organization.“ Best Practices for Managing Shared Superuser and Firecall Accounts  “SAPM tools enable organizations to manage passwords for shared and software accounts more effectively and efficiently than manual processes.” Market Overview: Shared-Account/Software-Account Password Management Tools
Analyst & Media Coverage “The Enterprise Random Password Manager from Lieberman Software is an extremely powerful tool which automatically discovers, updates, stores and allows secure recovery of every privileged account password throughout the enterprise.“   SC Magazine Group Test: Password Management - August 2009
Contas de PrivilégioElevadoTudonaEmpresa Servers & Workstations Todososhardwares TodososS.O.s Banco de Dados Datacenter Appliances Routers & switches Aceleradores Securança Aplicações Line-of-business Web services Database & middleware Backup Gerenciamento de Identidade e Acesso Gerenciamento de Sistemas
Contas de PrivilégioElevadoOndeAplicar ? MudançasPlanejadasMudançasnão-Planejadas Rollouts de Aplicações Hardware Deploy Corporate mergers Outsourcing Guest Accounts Mudanças de Funções (Employment) Delegação e Overlap de Funções MudançaPessoas Falhas de defaults Falta de Expiração Complexidade AtaquesSociais Ataques de “Nomes” Serv1, Serv2, Serv3
Contas de PrivilégioElevadoComo Resolver? Identificae documentatodososativos de TI, privileged accounts e interdependências. Delegaapenasosacessos de privileged accounts de forma temporal (time basis), usandomínimo de privilege, com propósito de documentação. Fortaleceregras de tamanho, unicidade e frequência de mudanças, sincronizando as mudanças e dependências. Monitorae alerta, além de documentartodososacessos: usuais e não.
SoluçãoERPMArquitetura Web Application IIS  6.0 or greater SSL Clients OleDB Secure Data Store SQL Server or Oracle 11g Security Information and  Event Management (SIEM) BMC Remedy, IBM Tivoli ,  MS SCOM, … SDK, Web Services,  Middleware ,[object Object]
 Management Reporting
 User RightsDelegationOleDB ManagementConsole Windows Server ,[object Object]
Workflows
 Ticket Management
 Setup and Configuration
Job Scheduling
 Advanced Reporting,[object Object]
Password Change Synchronization Prevents Lockouts and Service DisruptionsApplications IIS, ASP.NET, SharePoint, scripts, configuration files, … Databases MS SQL Server, Oracle, MySQL, Sybase ASE, IBM DB2 SMB, SSH, … OleDB Directories MS Active Directory,  Oracle Internet Directory and all LDAP-compliant directories LDAP ManagementConsole Windows Computers Windows Server 2008, 2003, 2000, NT4, Windows 7, Vista, XP SMB SSH Linux, UNIX, and Mainframe Sun Solaris, HP-UX, IBM AIX, Red Hat Linux, IBM AS/400, OS/390, … SSH Network Devices Cisco IOS devices and other routers, switches, firewalls, …
IdentificarContinuous Auto-Discovery Servers Desktops Aplicações Hdw WebServers Appliances Databases Backup ERPM
DelegarSecure Password Recovery Role Based Time Based Auditoria e Alerta DuplaCustótia MudançasComitadas & Propagadas ERPM Console Web
FortalecerPolítica de Senhas ERPM ,[object Object]

More Related Content

What's hot

DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
Array Networks
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Omega Peripherals
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
Hitachi ID Systems, Inc.
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
Kalyana Sundaram
 
Project 1 final power point presentation spa
Project  1 final power point presentation spaProject  1 final power point presentation spa
Project 1 final power point presentation spa
Candy Bahr Weitz
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
zayedalji
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
Ryan Gallavin
 
CyberArk
CyberArkCyberArk
CyberArk
Jimmy Sze
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
Hitachi ID Systems, Inc.
 
Sapphire_by_Veros-Overview_2016
Sapphire_by_Veros-Overview_2016Sapphire_by_Veros-Overview_2016
Sapphire_by_Veros-Overview_2016
Jeff Colbert
 
Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..
Muhammad Haris Sheikh
 
Kailash Kapal Resume v5
Kailash Kapal Resume v5Kailash Kapal Resume v5
Kailash Kapal Resume v5
Kailash Kapal
 
eRMS
eRMSeRMS

What's hot (13)

DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Project 1 final power point presentation spa
Project  1 final power point presentation spaProject  1 final power point presentation spa
Project 1 final power point presentation spa
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
CyberArk
CyberArkCyberArk
CyberArk
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Sapphire_by_Veros-Overview_2016
Sapphire_by_Veros-Overview_2016Sapphire_by_Veros-Overview_2016
Sapphire_by_Veros-Overview_2016
 
Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..Haris Sheikh(system administrator)..
Haris Sheikh(system administrator)..
 
Kailash Kapal Resume v5
Kailash Kapal Resume v5Kailash Kapal Resume v5
Kailash Kapal Resume v5
 
eRMS
eRMSeRMS
eRMS
 

Viewers also liked

Cisco TIP Presentation
Cisco TIP PresentationCisco TIP Presentation
Cisco TIP Presentation
IMTC
 
Citrix netscaler administration guide
Citrix netscaler administration guideCitrix netscaler administration guide
Citrix netscaler administration guide
Kendhe Deligny
 
Voice of the customer training
Voice of the customer trainingVoice of the customer training
Voice of the customer training
Nicolai van Wylich-Muxoll
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systems
Sandeep Kumar
 
Basic Economic Questions
Basic Economic QuestionsBasic Economic Questions
Basic Economic Questions
Kevin A
 
Rtds & thermistors
Rtds & thermistorsRtds & thermistors
Rtds & thermistors
Zeeshan Akhtar
 
IT Operating Model
IT Operating ModelIT Operating Model
IT Operating Model
anusharaju38
 
HW09 Hadoop Vaidya
HW09 Hadoop VaidyaHW09 Hadoop Vaidya
HW09 Hadoop Vaidya
Cloudera, Inc.
 
Online Consumer Behavior
Online Consumer BehaviorOnline Consumer Behavior
Online Consumer Behavior
Graham Garner
 
Big Data Technology Stack : Nutshell
Big Data Technology Stack : NutshellBig Data Technology Stack : Nutshell
Big Data Technology Stack : Nutshell
Khalid Imran
 
Hotel structure and staff.pptx(ruth ann hrt)
Hotel structure and staff.pptx(ruth ann hrt)Hotel structure and staff.pptx(ruth ann hrt)
Hotel structure and staff.pptx(ruth ann hrt)
Shania Mae L. Arradaza
 
Big Data Readiness Assessment
Big Data Readiness AssessmentBig Data Readiness Assessment
Big Data Readiness Assessment
Christopher Bradley
 
Assembly Line Balancing
Assembly Line BalancingAssembly Line Balancing
Assembly Line Balancing
Joseph Konnully
 
Order management, provisioning and activation
Order management, provisioning and activationOrder management, provisioning and activation
Order management, provisioning and activation
VijayIndra Shekhawat
 
Introduction to ETL and Data Integration
Introduction to ETL and Data IntegrationIntroduction to ETL and Data Integration
Introduction to ETL and Data Integration
CloverDX (formerly known as CloverETL)
 
API Business Models
API Business ModelsAPI Business Models
API Business Models
John Musser
 
The Emerging Customer Experience Platform Trend
The Emerging Customer Experience Platform TrendThe Emerging Customer Experience Platform Trend
The Emerging Customer Experience Platform Trend
Backbase
 
Tax planning
Tax planningTax planning
Tax planning
Inderjeet Roy
 
Hadoop and OpenStack
Hadoop and OpenStackHadoop and OpenStack
Hadoop and OpenStack
DataWorks Summit
 

Viewers also liked (19)

Cisco TIP Presentation
Cisco TIP PresentationCisco TIP Presentation
Cisco TIP Presentation
 
Citrix netscaler administration guide
Citrix netscaler administration guideCitrix netscaler administration guide
Citrix netscaler administration guide
 
Voice of the customer training
Voice of the customer trainingVoice of the customer training
Voice of the customer training
 
Voice recognition security systems
Voice recognition security systemsVoice recognition security systems
Voice recognition security systems
 
Basic Economic Questions
Basic Economic QuestionsBasic Economic Questions
Basic Economic Questions
 
Rtds & thermistors
Rtds & thermistorsRtds & thermistors
Rtds & thermistors
 
IT Operating Model
IT Operating ModelIT Operating Model
IT Operating Model
 
HW09 Hadoop Vaidya
HW09 Hadoop VaidyaHW09 Hadoop Vaidya
HW09 Hadoop Vaidya
 
Online Consumer Behavior
Online Consumer BehaviorOnline Consumer Behavior
Online Consumer Behavior
 
Big Data Technology Stack : Nutshell
Big Data Technology Stack : NutshellBig Data Technology Stack : Nutshell
Big Data Technology Stack : Nutshell
 
Hotel structure and staff.pptx(ruth ann hrt)
Hotel structure and staff.pptx(ruth ann hrt)Hotel structure and staff.pptx(ruth ann hrt)
Hotel structure and staff.pptx(ruth ann hrt)
 
Big Data Readiness Assessment
Big Data Readiness AssessmentBig Data Readiness Assessment
Big Data Readiness Assessment
 
Assembly Line Balancing
Assembly Line BalancingAssembly Line Balancing
Assembly Line Balancing
 
Order management, provisioning and activation
Order management, provisioning and activationOrder management, provisioning and activation
Order management, provisioning and activation
 
Introduction to ETL and Data Integration
Introduction to ETL and Data IntegrationIntroduction to ETL and Data Integration
Introduction to ETL and Data Integration
 
API Business Models
API Business ModelsAPI Business Models
API Business Models
 
The Emerging Customer Experience Platform Trend
The Emerging Customer Experience Platform TrendThe Emerging Customer Experience Platform Trend
The Emerging Customer Experience Platform Trend
 
Tax planning
Tax planningTax planning
Tax planning
 
Hadoop and OpenStack
Hadoop and OpenStackHadoop and OpenStack
Hadoop and OpenStack
 

Similar to Lieb Soft

Delegation
DelegationDelegation
Delegation
NetBR
 
Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)
pramod singh
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
Tom Laszewski
 
Osmius: Monitoring Made Easy
Osmius: Monitoring Made EasyOsmius: Monitoring Made Easy
Osmius: Monitoring Made Easy
osmius
 
Fusion - IBANK
Fusion - IBANKFusion - IBANK
Fusion - IBANK
ibankuk
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
Amit Gatenyo
 
Implementing Private Clouds
Implementing Private CloudsImplementing Private Clouds
Implementing Private Clouds
John Pritchard
 
Layer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and ComplexityLayer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and Complexity
CA API Management
 
Introducing PagerDuty Process Automation
Introducing PagerDuty Process AutomationIntroducing PagerDuty Process Automation
Introducing PagerDuty Process Automation
Rundeck
 
A Managed Platform Will Change Your Business
A Managed Platform Will Change Your BusinessA Managed Platform Will Change Your Business
A Managed Platform Will Change Your Business
WP Engine
 
Sap basisoverviewv11
Sap basisoverviewv11Sap basisoverviewv11
Sap basisoverviewv11
André Almeida de França
 
System Center
System CenterSystem Center
System Center
Blauge
 
Enteras io Introduction
Enteras io IntroductionEnteras io Introduction
Enteras io Introduction
Sanjay Dhar
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
Amazon Web Services
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
tsteh
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
Amazon Web Services
 
ORACLE FUSION - IBANK
ORACLE FUSION - IBANKORACLE FUSION - IBANK
ORACLE FUSION - IBANK
ibankuk
 
What's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMSWhat's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMS
Asaf Nakash
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
Jessica Myers
 

Similar to Lieb Soft (20)

Delegation
DelegationDelegation
Delegation
 
Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
Osmius: Monitoring Made Easy
Osmius: Monitoring Made EasyOsmius: Monitoring Made Easy
Osmius: Monitoring Made Easy
 
Fusion - IBANK
Fusion - IBANKFusion - IBANK
Fusion - IBANK
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
 
Implementing Private Clouds
Implementing Private CloudsImplementing Private Clouds
Implementing Private Clouds
 
Layer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and ComplexityLayer 7: Getting Your SOA to Production Without Cost and Complexity
Layer 7: Getting Your SOA to Production Without Cost and Complexity
 
Introducing PagerDuty Process Automation
Introducing PagerDuty Process AutomationIntroducing PagerDuty Process Automation
Introducing PagerDuty Process Automation
 
A Managed Platform Will Change Your Business
A Managed Platform Will Change Your BusinessA Managed Platform Will Change Your Business
A Managed Platform Will Change Your Business
 
Sap basisoverviewv11
Sap basisoverviewv11Sap basisoverviewv11
Sap basisoverviewv11
 
System Center
System CenterSystem Center
System Center
 
Enteras io Introduction
Enteras io IntroductionEnteras io Introduction
Enteras io Introduction
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
 
ORACLE FUSION - IBANK
ORACLE FUSION - IBANKORACLE FUSION - IBANK
ORACLE FUSION - IBANK
 
What's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMSWhat's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMS
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 

More from NetBR

Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
NetBR
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
NetBR
 
Santo Digital
Santo DigitalSanto Digital
Santo Digital
NetBR
 
Compliance
ComplianceCompliance
Compliance
NetBR
 
System Man
System ManSystem Man
System Man
NetBR
 
Virtualization Consolidation Slide
Virtualization Consolidation SlideVirtualization Consolidation Slide
Virtualization Consolidation Slide
NetBR
 

More from NetBR (6)

Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Santo Digital
Santo DigitalSanto Digital
Santo Digital
 
Compliance
ComplianceCompliance
Compliance
 
System Man
System ManSystem Man
System Man
 
Virtualization Consolidation Slide
Virtualization Consolidation SlideVirtualization Consolidation Slide
Virtualization Consolidation Slide
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Lieb Soft

  • 1. GestãoPrivilégios e Custódia de Senhas
  • 3. Servers-Issues PRIVILÉGIOS CONHECIDOS PRIVILÉGIOS DESCONHECIDOS ? ? ? ? ? ?
  • 4. ConceitoSAPM HOWACCOUNTS HOW GROUPS HOW SERVERS and/or DESKTOPS HOW OFTEN …
  • 5. USE CASES & BEST PRATICES Stock Exchange SingapureAutomatizarprocessosManuaise ReduzirCustos. Brazilian Telecom Company Controle dos Desktops (System Center, Anti-virus, Configuração, Local Admin, Grupos) US Datacenter Hosting ServicesAmbienteDinâmico, MudançasRápidas e tempo paraexecutá-las e identificá-las Germany IT Services Responder ao SLA (forma que é contabilizida) BancoEUACompliance, RelatóriosparaProvar (de facto) o Controle Militar Organization Complexidade de Gerenciar 70.000 devices Profitable Education Discovery Many Others…
  • 6. Lieberman Software Fundadaem 1978, com focoem Privileged Identity Management Parceiros: Cisco, HP, IBM, Microsoft, Novell, Oracle, Red Hat, RSA, Sybase ImportantesClientes no Brasil e Mundo
  • 7. Porque? Privileged Account Password Management “… shared account password management tools will be used by more than 50% of large enterprises by year end 2010 to manage passwords for shared accounts.” Market Overview: Shared-Account/Software-Account Password Management Tools “In any organization, the use of every platform and device ultimately relies on superuser accounts, which are the most powerful in the organization.“ Best Practices for Managing Shared Superuser and Firecall Accounts “SAPM tools enable organizations to manage passwords for shared and software accounts more effectively and efficiently than manual processes.” Market Overview: Shared-Account/Software-Account Password Management Tools
  • 8. Analyst & Media Coverage “The Enterprise Random Password Manager from Lieberman Software is an extremely powerful tool which automatically discovers, updates, stores and allows secure recovery of every privileged account password throughout the enterprise.“ SC Magazine Group Test: Password Management - August 2009
  • 9. Contas de PrivilégioElevadoTudonaEmpresa Servers & Workstations Todososhardwares TodososS.O.s Banco de Dados Datacenter Appliances Routers & switches Aceleradores Securança Aplicações Line-of-business Web services Database & middleware Backup Gerenciamento de Identidade e Acesso Gerenciamento de Sistemas
  • 10. Contas de PrivilégioElevadoOndeAplicar ? MudançasPlanejadasMudançasnão-Planejadas Rollouts de Aplicações Hardware Deploy Corporate mergers Outsourcing Guest Accounts Mudanças de Funções (Employment) Delegação e Overlap de Funções MudançaPessoas Falhas de defaults Falta de Expiração Complexidade AtaquesSociais Ataques de “Nomes” Serv1, Serv2, Serv3
  • 11. Contas de PrivilégioElevadoComo Resolver? Identificae documentatodososativos de TI, privileged accounts e interdependências. Delegaapenasosacessos de privileged accounts de forma temporal (time basis), usandomínimo de privilege, com propósito de documentação. Fortaleceregras de tamanho, unicidade e frequência de mudanças, sincronizando as mudanças e dependências. Monitorae alerta, além de documentartodososacessos: usuais e não.
  • 12.
  • 14.
  • 17. Setup and Configuration
  • 19.
  • 20. Password Change Synchronization Prevents Lockouts and Service DisruptionsApplications IIS, ASP.NET, SharePoint, scripts, configuration files, … Databases MS SQL Server, Oracle, MySQL, Sybase ASE, IBM DB2 SMB, SSH, … OleDB Directories MS Active Directory, Oracle Internet Directory and all LDAP-compliant directories LDAP ManagementConsole Windows Computers Windows Server 2008, 2003, 2000, NT4, Windows 7, Vista, XP SMB SSH Linux, UNIX, and Mainframe Sun Solaris, HP-UX, IBM AIX, Red Hat Linux, IBM AS/400, OS/390, … SSH Network Devices Cisco IOS devices and other routers, switches, firewalls, …
  • 21. IdentificarContinuous Auto-Discovery Servers Desktops Aplicações Hdw WebServers Appliances Databases Backup ERPM
  • 22. DelegarSecure Password Recovery Role Based Time Based Auditoria e Alerta DuplaCustótia MudançasComitadas & Propagadas ERPM Console Web
  • 23.
  • 28.
  • 30.
  • 32. Ajuda a Colaboradores Executive Management Controle dos Ativos Corporativos Requerimentos Regulatórios Melhorar a Agilidade, sem correr riscos Diretor de TI Aumentar Eficiência Alinar Processos de TI com Política Controle das Mudanças: Planejadas e Não Administrador Automatiza tarefas tediosas e propensa a erros Controle com Discovery Contínuo Eliminar a conformidade “incerta”
  • 33. Use Cases & Demo
  • 34. Lieberman & Microsoft Product Development Relationship Recognized innovator and leader in Privileged Password Protection and Random Password Management “Managed” Gold Certified Partner since 1999 System Center Strategic Alliance Partner Most Microsoft Windows Product Certifications of Any Management Vendor Six certified products with nearly 20 Windows 7, Server 2008, Hyper-V, Vista, XP & 2000 certifications Industry Focus Public Sector Financial Services Healthcare
  • 35. Lieberman & VendorsJoint Marketing Relationship

Editor's Notes

  1. Lieberman Software was founded in 1978 and had its roots as a software consultancy. We are literally the pioneers of Privileged Identity Management, having released the first software solution to this problem more than 10 years ago.Our company is based in Los Angeles with a support and marketing office in Austin, Texas, and satellite sales offices across the United States.We’re entirely owned by our US-based management team, and you’ll find that we have a track record of delivering products that are focused on long-term customer value.Our software integrates with the industry leaders in directory services, data access and management frameworks including Cisco, HP, IBM, Microsoft, Novell, Oracle, and others.And, according to Gartner Group…
  2. Lieberman Software was founded in 1978 and had its roots as a software consultancy. We are literally the pioneers of Privileged Identity Management, having released the first software solution to this problem more than 10 years ago.Our company is based in Los Angeles with a support and marketing office in Austin, Texas, and satellite sales offices across the United States.We’re entirely owned by our US-based management team, and you’ll find that we have a track record of delivering products that are focused on long-term customer value.Our software integrates with the industry leaders in directory services, data access and management frameworks including Cisco, HP, IBM, Microsoft, Novell, Oracle, and others.And, according to Gartner Group…
  3. Lieberman Software was founded in 1978 and had its roots as a software consultancy. We are literally the pioneers of Privileged Identity Management, having released the first software solution to this problem more than 10 years ago.Our company is based in Los Angeles with a support and marketing office in Austin, Texas, and satellite sales offices across the United States.We’re entirely owned by our US-based management team, and you’ll find that we have a track record of delivering products that are focused on long-term customer value.Our software integrates with the industry leaders in directory services, data access and management frameworks including Cisco, HP, IBM, Microsoft, Novell, Oracle, and others.And, according to Gartner Group…
  4. Lieberman Software was founded in 1978 and had its roots as a software consultancy. We are literally the pioneers of Privileged Identity Management, having released the first software solution to this problem more than 10 years ago.Our company is based in Los Angeles with a support and marketing office in Austin, Texas, and satellite sales offices across the United States.We’re entirely owned by our US-based management team, and you’ll find that we have a track record of delivering products that are focused on long-term customer value.Our software integrates with the industry leaders in directory services, data access and management frameworks including Cisco, HP, IBM, Microsoft, Novell, Oracle, and others.And, according to Gartner Group…
  5. Lieberman Software was founded in 1978 and had its roots as a software consultancy. We are literally the pioneers of Privileged Identity Management, having released the first software solution to this problem more than 10 years ago.Our company is based in Los Angeles with a support and marketing office in Austin, Texas, and satellite sales offices across the United States.We’re entirely owned by our US-based management team, and you’ll find that we have a track record of delivering products that are focused on long-term customer value.Our software integrates with the industry leaders in directory services, data access and management frameworks including Cisco, HP, IBM, Microsoft, Novell, Oracle, and others.And, according to Gartner Group…
  6. Lieberman Software was founded in 1978 and had its roots as a software consultancy. We are literally the pioneers of Privileged Identity Management, having released the first software solution to this problem more than 10 years ago.Our company is based in Los Angeles with a support and marketing office in Austin, Texas, and satellite sales offices across the United States.We’re entirely owned by our US-based management team, and you’ll find that we have a track record of delivering products that are focused on long-term customer value.Our software integrates with the industry leaders in directory services, data access and management frameworks including Cisco, HP, IBM, Microsoft, Novell, Oracle, and others.And, according to Gartner Group…
  7. As you probably know, privileged identities are accounts that have elevated permission to access potentially sensitive data, run programs, or change configuration settings. To put it simply, privileged accounts like the keys to the kingdom of IT.And, privileged accounts are found virtually everywhere…On every server and workstation platform…On networking and datacenter appliances like routers and switches, load balancers, security appliances…And on almost every type of software you can name, including line-of-business applications, Web services, databases and middleware.Not only are privileged accounts powerful and widespread, but if not controlled these credentials become accessible to more and more personnel over time…
  8. New application rollouts and hardware deployments, changes in corporate structure (say, mergers), outsourcing to independent contractors, and changes in employee roles are examples of ways that access can spread in planned ways.There are also unplanned ways that access can spread. For example, as people leave the company they often take password secrets with them. Or, if passwords aren’t changed frequently enough, lack adequate complexity, or are reused across independent hardware and software assets they become more vulnerable over time.As we’ll discuss next, failure to adequately control privileged account access carries a number of risks…
  9. It takes just four, basic steps to regain control of privileged identities. These steps are easy to remember because they’re abbreviated as I.D.E.A….First, it’s essential to identify all of the privileged identities that are present on critical IT assets in your infrastructure, whether on server or desktop operating systems, network appliances, line-of-business applications, and so on. And, you’ve got to understand which of these identities are interdependent, so that when you change the credentials of one account you know to update the dependent accounts to avoid lockouts and service disruptions.Next, you’ll want to delegate access to these accounts so that only appropriate personnel can login to critical IT assets, always in a timely manner whenever needed, over a secure communication channel, using the least privilege required (to reduce the potential for damaging errors), with a documented purpose, only during designated times.It’s also essential to enforce rules for password strength, uniqueness (so that a password isn’t reused except where absolutely necessary) and change frequency, synchronizing all of those changes across dependent processes.Finally, having right auditing and alerting processes makes individuals accountable for privileged access, sets the right organizational tone, and alerts management to any unusual events. Let’s take a closer look at how Enterprise Random Password Manager, the privileged identity management solution from Lieberman Software, makes it possible to accomplish these four steps…
  10. Enterprise Random Password Manager is distinguished for its ability to discover privileged accounts throughout your infrastructure……on a wide range of server and desktop operating systems; on databases including SQL Server, Oracle, Sybase, and DB2; on Web services platforms, line-of-business applications, network and security appliances, backup systems, and more.After you install Enterprise Random Password Manager, whenever authorized users need access to these systems they get unique passwords, issued on-demand for one-time use, over a secure Web console…
  11. … Access is role-based, time-controlled so that the passwords expire and are changed after a configured period, audited and alert-generating so that there’s full accountability, and there’s full support for industry-standard, two-factor authentication like RSA SecurID.Enterprise Random Password Manager generates each new password…
  12. … according to configured rules for complexity, uniqueness (to avoid reuse), and change frequency, and it stores these passwords in a secure vault.All password changes are synchronized…
  13. … according to configured rules for complexity, uniqueness (to avoid reuse), and change frequency, and it stores these passwords in a secure vault.All password changes are synchronized…
  14. … these are examples of how Enterprise Random Password Manager helps our customers comply with PCI-DSS standards.As you can imagine, Enterprise Random Password Manager provides value to many different job roles within IT. For example, we help executive management…
  15. … these are examples of how Enterprise Random Password Manager helps our customers comply with PCI-DSS standards.As you can imagine, Enterprise Random Password Manager provides value to many different job roles within IT. For example, we help executive management…
  16. For example, we help executive management…… protect corporate assets by ensuring that only the right personnel have access to sensitive data and can make changes to IT assets that could impact critical business processes…… and, as we’ve discussed, we help assure compliance with critical industry initiatives like Sarbanes-Oxley, HIPAA, Gramm-Leach-Bliley, and many others…… and, as was the case the financial institution that needed an immediate, decisive response when its domain credentials were exposed online, we help our customers to be more agile in the face of new security threats.For IT directors and other managers……we help improve the efficiency of IT staff so they’re spending less time granting access, changing passwords, and documenting the result….… we provide the reporting features they need to show that IT processes are working to support the company’s security policies…… and, we help these managers to mitigate the risks that privileged accounts otherwise introduce in the organization’s day-to-day business as new systems and applications are brought online, changes are made in the infrastructure, or employees join and leave the company.Finally, for the IT administrator…… our products eliminate so many of the cumbersome, error-prone tasks that they face in administering and documenting account access, allowing them to focus on more strategic work that can further their careers…… the products improve security and accountability so that administrators can react more quickly and avoid the blame for service disruptions and security issues…… and, they make it far easier for administrators to provide their managers the detailed information they need, without impacting day-to-day productivity.With that, let’s move on to a live demonstration of Enterprise Random Password Manager.