SlideShare a Scribd company logo
Privileged Management
Eliminate the “keys to the kingdom” problem,
and get ahead of your security incidents.
Ronny Stavem | Enterprise Security Specialist
#DellST14
The connected world
creates massive
opportunity.
And IT needs to
be the enabler.
Enter new markets
Drive efficiency
Create new products
Use new technologies
But current approaches
to security are siloed,
creating risk and
impeding innovation.
Fragmented Reactive
Intrusive
Dell delivers
a better way,
with security
that works together
across your whole
business.
Holistic Proactive
Transparent
The Dell Security difference
Connected
end-to-end
Shared, context-
aware intelligence
Built for humans
Makes it easy for
people to do the
right thing
Stands in the way of
threats, not people and
productivity
Enables proactive
protection
everywhere
Share real-time
threat information
system-wide
Closes gaps,
reduces
complexity and
mitigates risk
Secure your business
from device to
datacenter to cloud
The result: better security, better business
Enable
the enterprise to embrace
new technologies faster
than the competition
Comply
with regulations and
achieve consistent,
reliable governance
Protect
the whole enterprise –
outside in and inside out –
efficiently and proactively
Delivering best-in-class security solutions
Identity & Access Mgmt
Identity Governance
Privileged Mgmt
Access Mgmt
Compliance & IT Gov
Security Services
Incident Response
Managed Security Svcs
Security & Risk Consult
Threat Intelligence
Data/Endpoint
Encryption
Protected Workspace
Configuration &
Patch Management
Secure Cloud Client
Network
Next Gen Firewall
Secure Mobile Access
Email Security
Who do you trust?
Who in your organisation
has access to the Keys to
your IT Kingdom?
Administrators
Contractors
Vendors
Service providers
DBAs
Terminated employees
Applications
Developers
10 Software
Difficult questions
Can you honestly say you have:
 Enterprisewide control of administrative
access
 Good enough efficiency, security and
compliance
 Simple tracking and auditing for all
privileged activities
 Granular, policy-based delegation of
superuser credentials and secure
workflows
 Privileged accounts and access are
managed in the manner that best
supports business objectives and can
easily expand into governance
How do you achieve governance for
privileged accounts and admin access?
How many administrators share those
passwords?
How many administrative accounts
exist in your organization?
How do you track who has been
accessing systems with admin level?
How do you assign individual
accountability?
11 Software
Security and risk mitigation
How do breaches occur?
—Verizon
52% used some form of hacking (-)
76% of network intrusions exploited week or stolen credentials (-)
40% incorporated malware (-)
35% involved physical attacks (+)
29% leveraged social tactics (+)
13% resulted from privilege misuse and abuse (+)
A plus (+) sign indicates either a 10% or greater
increase from the previous year’s report
A minus(-) sign indicates a 10% or greater
decrease from the previous year’s report
79% of surveyd companies
experienced security incidents within
the past year with a financial and/or
reputational impact
- McAfee
Cyber incidents increased by 782%
between 2006 and 2012.
-- US Government Accountability Office
Risk of unsecured Privileged Identities
• You do not know of all logins that exist in your network
• You have no record of which credentials are known to who
• You have no proof of who has logins to gain access, when and why
• There is no way to verify that each password i strong enough, sufficiently
unique, and are changed often enough
• You have no reliable list of logins stored within your applications, and no
way to know which in-house and vendor personell can use these credentials
to access sensitive information
• Shared account and passwords usage
• Excessive privilege/No granularity
• Hidden/Sleeping accounts
• No revocation of access
• Unenforced access controls
• No monitoring and auditing
• Infrequent replacement of credentials
Why does it happen?
Today’s management practice with
Privileged users is a high risk activity.
“We have an IAM system but privileged
management is the forgotten arm.”
Know your Jedi’s
Control and
monitor their
forces!
Privileged Management
The Privileged Appliance and Modules TPAM
• Privileged Password Manager (PPM)
Enables secure storage, release control and change control of privileged
passwords across a heterogeneous deployment of systems and applications,
including passwords that are hardcoded in scripts, procedures and
programs.
• Privileged Session Manager (PSM)
Enables you to issue privileged access for a specific period or session to
administrators, remote vendors and high-risk users, with full recording and
replay for auditing and compliance.
Highly Available Architecture
Scalable Clustering
Small 1u footprint
Hardware redundancy
Secure audit backup
SYSLOG integration
Hardened Appliance
Full AES Disk encryption
FIPS 140-2 & ISO 27001
Embedded hardware firewall
Purpose built for security
No direct access of any kind
Dell Privileged management -The solution
18
Workflow – password request
Initiate
password
request
Filter & select
account(s)
Enter
Date/Time/Duration/Reason
Code/Request Reason as
needed
Ticket System
Validation.
Mandatory or
Optional
Retrieve
password
Enter date/time/duration/reason
password is needed
Optional ticket field. Can be active
(check ticket) or passive
Workflow – session request
Initiate
session
request
Filter &
select
account(s)
Enter date/time/duration/reason
code/request reason as
needed
Ticket system
validation.
mandatory or
optional
Once session is
approved (or auto-
approved) simply
Connect.
Workflow – session request
• A session can be configured for
interactive or auto-login
• Every action on the target
system will be recorded
• If a session extends beyond the
requested time, configurable
alert notifications of session
overrun can be sent
• Active sessions can be manually
terminated by authorized
administrators Connection proxy
created to selected
System and Account
User connects and
performs required work
Intuitive administration
Key drivers for Privileged
Account and Session
Management
Insider threats
Risk and compliance
Moving to the cloud
Targeted Cyber attacks
Summary: What measures to take
Minimze the
number of logins
with privileged
access. Reduces
RISKS.
Monitor the
privileged users and
Log all changes.
Enforce use of
complex passwords;
that nobody knows.
Implement check
in/check out routines
for extracting
passwords.
No sharing
of privileged
accounts. Assign
individual
accountability.
Monitor
the activites of
privileged users.
Enforce least
privileges.
Sweden dst tpam 2014

More Related Content

What's hot

Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
Per Larsen
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
Per Larsen
 
Amarjeet_Updated_Resume
Amarjeet_Updated_ResumeAmarjeet_Updated_Resume
Amarjeet_Updated_ResumeAmarjeet Kumar
 
Kailash Kapal Resume v5
Kailash Kapal Resume v5Kailash Kapal Resume v5
Kailash Kapal Resume v5Kailash Kapal
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
Kalyana Sundaram
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
Hitachi ID Systems, Inc.
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
Joel Oleson
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
Aidy Tificate
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Grant Reveal
 
Ewug 1811 break the glass
Ewug 1811   break the glassEwug 1811   break the glass
Ewug 1811 break the glass
Per Larsen
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
Precisely
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
Ajit Dadresa
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
ILANTUS Technologies
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
jasonlan
 

What's hot (20)

Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Amarjeet_Updated_Resume
Amarjeet_Updated_ResumeAmarjeet_Updated_Resume
Amarjeet_Updated_Resume
 
Kailash Kapal Resume v5
Kailash Kapal Resume v5Kailash Kapal Resume v5
Kailash Kapal Resume v5
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
 
Ewug 1811 break the glass
Ewug 1811   break the glassEwug 1811   break the glass
Ewug 1811 break the glass
 
Resume
ResumeResume
Resume
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 

Similar to Sweden dst tpam 2014

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
AaDi Malik
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
AaDi Malik
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
Dell EMC World
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
Sneha .
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Servicestsaiblake
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
Dan Morrill
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
Rahul Neel Mani
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
Core Security Technologies
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
Ronny Stavem
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Andris Soroka
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
Fahad Al-Hasan
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
Al Balqa Applied University
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - Security
Connected Futures
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 

Similar to Sweden dst tpam 2014 (20)

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - Security
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 

Recently uploaded

Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 

Recently uploaded (20)

Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 

Sweden dst tpam 2014

  • 1. Privileged Management Eliminate the “keys to the kingdom” problem, and get ahead of your security incidents. Ronny Stavem | Enterprise Security Specialist #DellST14
  • 2. The connected world creates massive opportunity. And IT needs to be the enabler. Enter new markets Drive efficiency Create new products Use new technologies
  • 3. But current approaches to security are siloed, creating risk and impeding innovation. Fragmented Reactive Intrusive
  • 4. Dell delivers a better way, with security that works together across your whole business. Holistic Proactive Transparent
  • 5. The Dell Security difference Connected end-to-end Shared, context- aware intelligence Built for humans Makes it easy for people to do the right thing Stands in the way of threats, not people and productivity Enables proactive protection everywhere Share real-time threat information system-wide Closes gaps, reduces complexity and mitigates risk Secure your business from device to datacenter to cloud
  • 6. The result: better security, better business Enable the enterprise to embrace new technologies faster than the competition Comply with regulations and achieve consistent, reliable governance Protect the whole enterprise – outside in and inside out – efficiently and proactively
  • 7. Delivering best-in-class security solutions Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence Data/Endpoint Encryption Protected Workspace Configuration & Patch Management Secure Cloud Client Network Next Gen Firewall Secure Mobile Access Email Security
  • 8. Who do you trust?
  • 9. Who in your organisation has access to the Keys to your IT Kingdom? Administrators Contractors Vendors Service providers DBAs Terminated employees Applications Developers
  • 10. 10 Software Difficult questions Can you honestly say you have:  Enterprisewide control of administrative access  Good enough efficiency, security and compliance  Simple tracking and auditing for all privileged activities  Granular, policy-based delegation of superuser credentials and secure workflows  Privileged accounts and access are managed in the manner that best supports business objectives and can easily expand into governance How do you achieve governance for privileged accounts and admin access? How many administrators share those passwords? How many administrative accounts exist in your organization? How do you track who has been accessing systems with admin level? How do you assign individual accountability?
  • 11. 11 Software Security and risk mitigation How do breaches occur? —Verizon 52% used some form of hacking (-) 76% of network intrusions exploited week or stolen credentials (-) 40% incorporated malware (-) 35% involved physical attacks (+) 29% leveraged social tactics (+) 13% resulted from privilege misuse and abuse (+) A plus (+) sign indicates either a 10% or greater increase from the previous year’s report A minus(-) sign indicates a 10% or greater decrease from the previous year’s report 79% of surveyd companies experienced security incidents within the past year with a financial and/or reputational impact - McAfee Cyber incidents increased by 782% between 2006 and 2012. -- US Government Accountability Office
  • 12. Risk of unsecured Privileged Identities • You do not know of all logins that exist in your network • You have no record of which credentials are known to who • You have no proof of who has logins to gain access, when and why • There is no way to verify that each password i strong enough, sufficiently unique, and are changed often enough • You have no reliable list of logins stored within your applications, and no way to know which in-house and vendor personell can use these credentials to access sensitive information
  • 13.
  • 14. • Shared account and passwords usage • Excessive privilege/No granularity • Hidden/Sleeping accounts • No revocation of access • Unenforced access controls • No monitoring and auditing • Infrequent replacement of credentials Why does it happen? Today’s management practice with Privileged users is a high risk activity. “We have an IAM system but privileged management is the forgotten arm.” Know your Jedi’s Control and monitor their forces!
  • 16. The Privileged Appliance and Modules TPAM • Privileged Password Manager (PPM) Enables secure storage, release control and change control of privileged passwords across a heterogeneous deployment of systems and applications, including passwords that are hardcoded in scripts, procedures and programs. • Privileged Session Manager (PSM) Enables you to issue privileged access for a specific period or session to administrators, remote vendors and high-risk users, with full recording and replay for auditing and compliance. Highly Available Architecture Scalable Clustering Small 1u footprint Hardware redundancy Secure audit backup SYSLOG integration Hardened Appliance Full AES Disk encryption FIPS 140-2 & ISO 27001 Embedded hardware firewall Purpose built for security No direct access of any kind
  • 17. Dell Privileged management -The solution
  • 18. 18 Workflow – password request Initiate password request Filter & select account(s) Enter Date/Time/Duration/Reason Code/Request Reason as needed Ticket System Validation. Mandatory or Optional Retrieve password Enter date/time/duration/reason password is needed Optional ticket field. Can be active (check ticket) or passive
  • 19. Workflow – session request Initiate session request Filter & select account(s) Enter date/time/duration/reason code/request reason as needed Ticket system validation. mandatory or optional Once session is approved (or auto- approved) simply Connect.
  • 20. Workflow – session request • A session can be configured for interactive or auto-login • Every action on the target system will be recorded • If a session extends beyond the requested time, configurable alert notifications of session overrun can be sent • Active sessions can be manually terminated by authorized administrators Connection proxy created to selected System and Account User connects and performs required work
  • 22. Key drivers for Privileged Account and Session Management Insider threats Risk and compliance Moving to the cloud Targeted Cyber attacks
  • 23. Summary: What measures to take Minimze the number of logins with privileged access. Reduces RISKS. Monitor the privileged users and Log all changes. Enforce use of complex passwords; that nobody knows. Implement check in/check out routines for extracting passwords. No sharing of privileged accounts. Assign individual accountability. Monitor the activites of privileged users. Enforce least privileges.

Editor's Notes

  1. PRIVACY AND COMPLIANCE ISSUES. Given the value of the information that most businesses have on line, it is key that you can secure your data, network, and applications from the threat of attack or loss. FACT: In a McAfee survey, 79% of surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact. Loss of data costs companies an average of $1.1M if they are not proactively securing their systems. Hackers are more sophisticated, your data is increasingly accessed anytime and anywhere and often resides in the cloud.   Fewer access points are corporately-controlled, and there is a growing digital data explosion while the compliance demands on staff and systems escalate.   Organizations of all sizes are at risk.    A company’s secrets are only a tweet away.  And chances are, your infrastructure has already been compromised.
  2. Hvorfor er det slik at alle sikkerhetstilltak gjøres for våre brukere. De som kan det går gjerne Default: under radaren. Kan gjøre som de vil Litt stygt sagt: Jeg er havren hvilket nek er du? Eller Jeg er IT administrator hvilken bruker er du? Risiko driverne er mange: Har du kontroll på de eksterne tilgangene til priviligerte? Er alle administratorene en del av et tiltrodd team? Kjenner du de godt og har kontroll på hvilke tilganger de allerede innehar ? Utdeling av nye tilganger gjøres gjennom en prosess så DU får oversikten over hvem som har hvilke system tilganger. Hva med systemkontoer. Når byttet du passordet på de sist? Er det kjente fjesløse brukere som kan benyttes til ulike tilganger? Hvordan kan man spore og se hva en priviligert bruker gjør eller har gjort. Kan du fordele ansvaret dersom det er gjort handlinger eller endringer på servere som har fått store konsekvenser. I dagens store forventinger til samhandlende IT løsninger stiller man større krav til samhandling og dermed øker sikkerhetsrisikoen. Spore hva en broker gjør eller har gjort.
  3. Vi har en selvsagt en løsning som håndterer de priviligerte brukerene.
  4. En løsning med 2 software moduler: PPM – Utsjekking rutiner for password til systemer og løsninger som er under kontroll. Kan ha automatisk godkjenning basert på hvem du er (Autentisering og autorisasjon) mot Eks Active Directory grupper. PSM: Tildeler direkte sesjoner som kan kontrolleres helt ned på key-logging og man kan skrive policier for hva som er tilatt å kjøre for den enkelte. Kan foreksempel sperre for kjøring av commando Regedit eller sperre applikasjoner i Window/Unix/Linux osv. Eller enda mer spennende. Gjøre en recording av en session automatisk bare når det utføres gitte kommandoer. F.eks hver gang Sudo kjøres av en systemadmin. Alle sesjoner kan spores og man kan realtime se aktiviteter på en server eller gå tilbake I tid å se hva som er blitt utført av den enkelte priviligerte bruker.
  5. Dell One Identity løsninger gjør det mulig å SIKRE, DELEGERE, KONTROLLERE og REVIDERE tilganger for superbruk-konti og delte administrative tilganger – på tvers av ulike platformer og systemer. Nettverksbaserte løsninger: Privileged Password Manager Privileged Session Manager Host-baserte løsninger Privileged manager for SUDO Authentication Services Privileged Manager for UNIX Active Roles Server Privileged Manager
  6. Oppsummert, hvilke tiltak som kan gjøres for å håndtere de priviligerte brukerne. Minimere antall priviligerte brukere, ta kontroll på de og innføre sjekk ut/inn rutiner for passord (Tar bort kunnskapen om passord til systemer) Monitorering: Se på aktiviteter og innføre strengere krav til logginger. Vurdere policys og regler som kontrollerer de ulike admin brukerne. Vær I forkant Innfør sikkerhetsrutiner der de gir mening og kan forebygge