Www.tectia.com COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

BalaBit Shell Control Box
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Copyright 2013 SSH Communications Security How to Prevent Data Loss and Monitor Your Encrypted Networks Samuli Siltanen VP, EMEA SSH Communications Security.
Privileged Account Management Jason Fehrenbach, Product Manager.
Secure Data Transmission James Matheke Information Security Architect Ohio Department of Job and Family Services.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Lexmark Print Management
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Understanding Active Directory
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Course 201 – Administration, Content Inspection and SSL VPN
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Intranet, Extranet, Firewall. Intranet and Extranet.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Dell Connected Security Solutions Simplify & unify.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
Today’s Lecture Covers < Chapter 6 - IS Security
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CPT 123 Internet Skills Class Notes Internet Security Session A.
The Changing World of Endpoint Protection
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Database Security and Data Protection Suseel Pachalla, CISSP.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
3 Do you monitor for unauthorized intrusion activity?
Working at a Small-to-Medium Business or ISP – Chapter 8
Securing the Network Perimeter with ISA 2004
Virtualization & Security real solutions
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Firewalls Routers, Switches, Hubs VPNs
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
How to Mitigate the Consequences What are the Countermeasures?
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Global One Communications
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote access to your critical data Kalle Jääskeläinen, CISSP Director, Solutions Management

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Customer and market challenges 2. Growing concern of insider threat and related data leakages 1. Growing pressure and need to secure existing legacy environments 3. Lack of visibility and control in outsourced and other external operations

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 1. Growing pressure and need to secure existing legacy environments 3 79% of victims subject to PCI-DSS had not achieved compliance Weakest level of compliance Encrypt transmission of cardholder data across open public networks (PCI-DSS req. 4) Where Data was Targeted 67% In Transit Methods used to enter target systems 55% Remote Access Applications Cyber-criminality against cardholder’s data. PCI-DSS council meeting, October 2010

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Solution: Tectia ConnectSecure The fastest track to securing legacy business applications and legacy file transfers 4 Legacy client application, e.g. CRM Legacy Server application Tectia ConnectSecure UserID and password sent in cleartext SSHv2 server UserID, password and application traffic secured through SSH SFTP server FTP converted to SFTP Legacy File Transfer client, FTP How to secure existing legacy environment fast and cost efficiently ?

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 2. Growing concern of data leakages and insider threat 48% of the data breaches were caused by insiders (+26% increase compared to last year) The attack pathway of 34% of breaches are related to remote access and control services. “Recently, many have hypothesized that insider crime would rise due to financial strain imposed by global economic conditions. Hard times breed hard crimes as they say” 5 Source: Verizon data breach report 2010

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Biggest challenges regarding data leakages and insider threat 6 Administrators have the biggest operational power with the least accountability In general, user activities are not effectively audited 90% of the time logs are available but discovery via log analysis remains under 5%. ”In general, we find that employees are granted more privileges than they need to perform their job duties and the activities of those that do require higher privileges are usually not monitored in any real way.” Source: Verizon data breach report 2010

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. The fastest track to enforce security controls and auditing meeting security standards ensuring business continuity DENIED! AUDIT Tectia Guardian End-to-end encrypted remote access,such as SSH and RDP No tools to audit and control the content of the secured connections How to audit and control remote system access, also the encrypted sessions?

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. How to prevent and notice data leakages? Business partner, Cloud service etc. Only File Transfers IPS DLP Only defined destinations, users and times

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Customer Challenge: Security and audit requirement to inspect all the traffic to critical services How to inspect encrypted connections? Solution: Tectia Guardian Deployment: Tectia combined with Intrusion Detection System provides a solution that enables customer to inspect and control all the connections, encrypted or not Customer ROI Fulfilled security requirement and passed audit Minimal impact to existing business processes and daily work Improved integrity and security of critical services and confidential information Space exploration and aeronautics research organization How to ensure integrity, security and availability of critical services? Example customer case:

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 3. Lack of visibility and control in outsourced and other external operations Increasing trend for outsourcing IT management and operations 47% of the breaches within partner agents were conducted by remote IT management Partners that manage systems are by far the most common offenders, whether their role is accidental or deliberate. 10 Source: Verizon data breach report 2010

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Biggest challenges in outsourced operations 11 End-to-end encryption of remote connections provides security, but prevents auditing or control No control or guarantees of the security level or processes of the external entity Systems are accessed by internal and external users Who did what, when and how? Organizations that outsource their IT management and support also outsource a great deal of trust to these partners. In the end, what we said last year remains true; poor governance, lax security, and too much trust is often the rule of the day. Outsourcing should not mean ”Out of sight, out of mind” Source: Verizon data breach report 2010

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. How to ensure visibility and control for oursourced and other external operations? 3rd party remote access to critical internal services Internal IT Security/ Auditing 4-EYES

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Customer 1 System integrators and service providers. How to ensure visibility and control? How to manage UserID/password nightmare (n x m)? Service provider adminstrators AD/ LDAP RADIUS User1 User2 User3 Admin1

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. 14 Tectia Guardian Your fastest track to... enforcing security controls meeting security standards ensuring business continuity

COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Tectia Guardian Comes as a pre-tested appliance or virtual appliance Supports multiple operation modes to fit any enterprise environment: router, bridge and bastion Host Transparent operation: minimal changes to existing operations Provides a true 3rd party for auditing: System administrators do not have access to Tectia Guardian or audit logs Comprehensive protocol support: SSH/SFTP, RDP, VMWare View, VNC, X11, Telnet, and TN3270 Real time IDS and DLP data feed Extensive security functions such as gateway authentication and 4-eyes authorization Tamperproof log and audit trails with extensive content search and reports 15 Key Functionalities Tectia Guardian Technical Overview