© Softmark www.softmark.com www.softmark.com - 1 - Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Auditor.

Slides:



Advertisements
Similar presentations
Complete Event Log Viewing, Monitoring and Management.
Advertisements

© Softmark Continuous Availability Operational Simplicity Financial Advantage Replicate Your Stratus Data DRMS.
BalaBit Shell Control Box
© Softmark Continuous Availability Operational Simplicity Financial Advantage Manage Your Stratus Systems Software.
Complete Event Log Viewing, Monitoring and Management.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
NERC Security Requirements – What Vendors Should Provide James W. Sample, CISSP, CISM Manager of Information Security California ISO.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
© 1 Eran Mertens
© Softmark VOS C o n s o l e.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Security Controls – What Works
Information Security Policies and Standards
SYSchange for z/OS By Pristine Software April 2009 Thomas Phillips April 2009 SYSchange Pristine Software.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
© Softmark Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Encryption.
1 Action Automated Security Breach Reporting and Corrections.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
An Introduction to AlarmInsight
Presenting The Broker-Dealer Certification Tool The Compliance Department Inc. Broker Dealer Compliance Consultants Compliance SCORE Powered by Keane BRMS.
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
HIPAA COMPLIANCE WITH DELL
Case Study : Morcom Trading – P BSC 21
ACME ACME Solutions Inc. You Focus on Your Business & We Focus on Your IT.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
1 Authority on Demand Flexible Access Control Solution.
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
Ripple Technologies, Inc 7/98 LogCaster. Ripple Technologies, Inc 7/98 LogCaster NT Real Time System Monitoring.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
SOA Management Packs & Governance Cheat Sheet (Shared under OPN NDA - Last Updated: 8/3/2009)OPN NDA Target Account Profile Enterprises that: Have IT infrastructure.
1 Action Automated Security Breach Reporting and Corrections.
Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
HARRIET Hazard, Assessment, Risk Review Identification and Evaluation Tool.
ManageEngine ADManager Plus. AGENDA The aim of this presentation is to showcase: * how ADAudit Plus works. * how ADAudit Plus be configured to extract.
1 Command Control and Monitor CL Commands. 2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL.
Microsoft Management Seminar Series SMS 2003 Change Management.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
GRC: Aligning Policy, Risk and Compliance
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Education Solution.
© 2016 Catalyze, Inc. Go-To-Market Services HIPAA Compliance in the Cloud: Catalyze Provides Microsoft Azure Customers with a HITRUST Certified Platform-as-a-Service.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Encrypted from CDS Office Technologies
Cloud Firewall.
GRACE Governance, Risk and Control Evaluation.
Transforming IT Management
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
A 5-minute overview of ADAudit Plus
iSecurity AP Journal Training
Authority on Demand Control Authority Rights & Emergency Access
Presentation transcript:

© Softmark Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Auditor Capabilities

© Softmark Provide comprehensive, cost effective security program Satisfy internal audit requirements Satisfy corporate governance, regulatory and industry standards (PCI) Eliminate security threats and vulnerabilities Reduce cost by automation Protect your most important asset – your data Objectives

© Softmark A complete suite of solutions designed to facilitate administration and management of Stratus/VOS security The only solution that meets the latest PCI standards Modular solutions tailored to specific customer ’ s requirements What is VOS Auditor?

© Softmark Auditor’s Layered Design Configuration - definitions of all regulated data files, monitored objects, directories and user's access profiles. 24x7 Monitoring - real time monitoring of configured objects, with automated responses, blocks and alarms. Reporting - periodic or on-demand auditing reports of all security-related events.

© Softmark VOS Command Shells Designed to be used by system operators, developers and administrators Shields the system from unauthorized use - eliminates direct command line access Offers secure, comprehensive audit trail reports of all commands executed, user's identity and time of activities Authorizes command execution based on user's security profile Manages developers and system-administrators privileges without affecting their day-to-day activities. Monitors and terminates inactive sessions Incorporates comprehensive password protection

© Softmark VOS Command Shells

© Softmark Maintains access rights in a centralized configuration database for the entire system Assures that access rights are always up-to-date Incorporates simple scripts into powerful command macros Allows the system administrator to classify detailed security levels and easily promote or demote users from one level to another Scans all system directories reports and clears any deviation from standard configuration Works with standard VOS access-control-lists (acl/dcl) Access Control Manager

© Softmark Access Control Manager

© Softmark Security Alert Manager Offers real-time background and non intrusive operation Monitors of all security related activities Handles security breaches based on system controls & configuration Eliminates risk by automatically executing user-defined procedures Sends critical alerts to selected – terminals – pagers (numeric, text, SMS) – boxes – other systems Offers Operator’s Console and a Secure Privileged Shell Distributes detailed reports to any key personnel based on defined schedule

© Softmark Putting it all together

© Softmark Reporting User Registration report Activities and critical commands Incident and security events System Configuration changes VOS-Audit Admin VOS Security and System report Delivery: – By to any selected personnel – On-demand or by predefined schedules – WEB/HTTP based, easy to read reports

© Softmark Reports

© Softmark Registration report

© Softmark Activity report

© Softmark Incident report

© Softmark “Its extensive security features allowed us to reduce the risk of human error as well as audit our operators and end-user activities” Erick Mazariegos, DTCC, Director Application Development “It has also put us in good shape for our upcoming security audit. We can track everything that each operator does …there is no concern that someone can go into the application and damage the system. We now have the individual accountability and auditing which were lacking before.” Rob Aronson, Lead Design Analyst “The product assisted us in managing our production network. Job scheduling, nightly batch cycles and process management are now fully automated ” Alex Tulchinsky, Director AOL Corporate Business Systems Operations VOS-Auditor

© Softmark SoftMark solutions are exclusively distributed worldwide by Contact: Mr. Eran Mertens Telephone: ARI: SoftMark: