We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byChristiana Lamb
Modified about 1 year ago
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote access to your critical data Kalle Jääskeläinen, CISSP Director, Solutions Management
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Customer and market challenges 2. Growing concern of insider threat and related data leakages 1. Growing pressure and need to secure existing legacy environments 3. Lack of visibility and control in outsourced and other external operations
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 1. Growing pressure and need to secure existing legacy environments 3 79% of victims subject to PCI-DSS had not achieved compliance Weakest level of compliance Encrypt transmission of cardholder data across open public networks (PCI-DSS req. 4) Where Data was Targeted 67% In Transit Methods used to enter target systems 55% Remote Access Applications Cyber-criminality against cardholder’s data. PCI-DSS council meeting, October 2010
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Solution: Tectia ConnectSecure The fastest track to securing legacy business applications and legacy file transfers 4 Legacy client application, e.g. CRM Legacy Server application Tectia ConnectSecure UserID and password sent in cleartext SSHv2 server UserID, password and application traffic secured through SSH SFTP server FTP converted to SFTP Legacy File Transfer client, FTP How to secure existing legacy environment fast and cost efficiently ?
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 2. Growing concern of data leakages and insider threat 48% of the data breaches were caused by insiders (+26% increase compared to last year) The attack pathway of 34% of breaches are related to remote access and control services. “Recently, many have hypothesized that insider crime would rise due to financial strain imposed by global economic conditions. Hard times breed hard crimes as they say” 5 Source: Verizon data breach report 2010
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Biggest challenges regarding data leakages and insider threat 6 Administrators have the biggest operational power with the least accountability In general, user activities are not effectively audited 90% of the time logs are available but discovery via log analysis remains under 5%. ”In general, we find that employees are granted more privileges than they need to perform their job duties and the activities of those that do require higher privileges are usually not monitored in any real way.” Source: Verizon data breach report 2010
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. The fastest track to enforce security controls and auditing meeting security standards ensuring business continuity DENIED! AUDIT Tectia Guardian End-to-end encrypted remote access,such as SSH and RDP No tools to audit and control the content of the secured connections How to audit and control remote system access, also the encrypted sessions?
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. How to prevent and notice data leakages? Business partner, Cloud service etc. Only File Transfers IPS DLP Only defined destinations, users and times
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Customer Challenge: Security and audit requirement to inspect all the traffic to critical services How to inspect encrypted connections? Solution: Tectia Guardian Deployment: Tectia combined with Intrusion Detection System provides a solution that enables customer to inspect and control all the connections, encrypted or not Customer ROI Fulfilled security requirement and passed audit Minimal impact to existing business processes and daily work Improved integrity and security of critical services and confidential information Space exploration and aeronautics research organization How to ensure integrity, security and availability of critical services? Example customer case:
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 3. Lack of visibility and control in outsourced and other external operations Increasing trend for outsourcing IT management and operations 47% of the breaches within partner agents were conducted by remote IT management Partners that manage systems are by far the most common offenders, whether their role is accidental or deliberate. 10 Source: Verizon data breach report 2010
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Biggest challenges in outsourced operations 11 End-to-end encryption of remote connections provides security, but prevents auditing or control No control or guarantees of the security level or processes of the external entity Systems are accessed by internal and external users Who did what, when and how? Organizations that outsource their IT management and support also outsource a great deal of trust to these partners. In the end, what we said last year remains true; poor governance, lax security, and too much trust is often the rule of the day. Outsourcing should not mean ”Out of sight, out of mind” Source: Verizon data breach report 2010
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. How to ensure visibility and control for oursourced and other external operations? 3rd party remote access to critical internal services Internal IT Security/ Auditing 4-EYES
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Customer 1 System integrators and service providers. How to ensure visibility and control? How to manage UserID/password nightmare (n x m)? Service provider adminstrators AD/ LDAP RADIUS User1 User2 User3 Admin1
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 14 Tectia Guardian Your fastest track to... enforcing security controls meeting security standards ensuring business continuity
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Tectia Guardian Comes as a pre-tested appliance or virtual appliance Supports multiple operation modes to fit any enterprise environment: router, bridge and bastion Host Transparent operation: minimal changes to existing operations Provides a true 3rd party for auditing: System administrators do not have access to Tectia Guardian or audit logs Comprehensive protocol support: SSH/SFTP, RDP, VMWare View, VNC, X11, Telnet, and TN3270 Real time IDS and DLP data feed Extensive security functions such as gateway authentication and 4-eyes authorization Tamperproof log and audit trails with extensive content search and reports 15 Key Functionalities Tectia Guardian Technical Overview
© 2011 Verdasys, Inc. All Rights Reserved. CONFIDENTIAL AND PROPRIETARY - DO NOT REPRODUCE. Enterprise Information Protection When DLP is Not Enough? Graham.
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
Introduction to Network Security INFSCI 1075: Network Security Amir Masoumzadeh.
Mastering Network Security (MNS101) Week 01: Introduction & Survivability Discussion Matthew W. Stephan: CISM, CISSP, CGEIT, CRISC, PMP.
John Clark COO, PCI Security and Compliance CCIA Fall Meeting – 7 th October 2011.
Files Matter … to Users and Administrators. Files Matter … IT Directors and Administrators.
ViPNt ViPNet Product Presentation Infotecs GmbH 2008.
Where firewalls fit in the corporate landscape. Firewall topics Why firewall? What is a firewall? What is the perfect firewall? What types of firewall.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
UNIT 2: Firewalls Content : Firewalls in general basic operation and architecture Main border firewalls using stateful inspection Screening firewalls.
Common types of online attacks Dr.Talal Alkharobi.
Trends in Endpoint Security by Richard Lau Trends in Endpoint Security by Richard Lau 29 September 2005.
Bank of America Merchant Services ASTRA Meeting Shirley Davis, Relationship Manager JD Wilks, Technical Relationship Manager Melinda Speer, Strategic Account.
Dealing with Web Application Security, Regulation Style Andrew Weidenhamer 11/10/2010.
PCI Boot Camp Presented by the PCI Compliance Task Force.
PCTI Limited - A Unique Name For Quality Education CS-75 INTRANET ADMINISTRATION By: Vinay Aggarwal.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.
Network Systems Sales LLC Value-Added Reseller Started in 2006 Focus: Offer deliverable, supported software and hardware-based technologies to solve business.
Communication for the open minded Study on user identification methods in card payments, e-payments and mobile payments Summary of recommendations (WP5)
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
Securing a Virtualized Environment Stefano Alei Senior Systems Engineer.
E-Procurement for Improving Governance Session 5: Integrity Protection of eProcurement systems A World Bank live e-learning event addressing the design.
1 Copyright © 2010, Oracle. All rights reserved. Cyber Security / Cyber Warfare Hype or underestimated? Bert Oltmans Director Defence, Justice and Public.
Information Security Microsoft Legal Spotlight Presented by LawNet and Microsoft Alan Hakimi US Lead Architect for Security Microsoft Services Scott D.
Logical IT Security By Prashant Mali.
Tag line, tag line Operations Manager 4.0 Customer Strategic Presentation March 2010.
© 2016 SlidePlayer.com Inc. All rights reserved.