+ All Categories
Home > Technology > IT Foundation Management Security

IT Foundation Management Security

Date post: 18-Nov-2014
Category:
Upload: tditechnologies
View: 329 times
Download: 6 times
Share this document with a friend
Description:
Human error, out-of-policy activity, and malicious insiders can compromise the very foundation the business is built on. Managing risk and protecting the business requires a comprehensive security practice that covers all foundational interfaces at all times. IT Foundation Management provides the security the business needs with the transparency to prove the practice.
Popular Tags:
15
IT Foundation Management for Security Your business is built on IT Securing the IT Foundation of your Business
Transcript
Page 1: IT Foundation Management Security

IT Foundation Management for Security

Your business is built on IT

Securing the IT Foundation of your Business

Page 2: IT Foundation Management Security

Page 2

What is the IT Foundation?

Servers… Network Gear… SANS… Operating Systems…

Networks…Databases… Appliances…Virtual Machines…

Blades…

Environment…

The IT Foundation includes all of your physical and virtual:

And is supported by:

I’m Joe…Solaris Systems Administrator

Steve,I’m a SANS Administrator

Cheryl,Oracle DBA…

Hi. Raphael.Network Administration

Hi I’m Tania,Linux Systems Administrator

Dave,Independent Consultant

Chris here…Tools Manager

Michael…VM Administrator

TDi Technologies Your business is built on IT

Page 3: IT Foundation Management Security

Page 3

IT Foundation Management

I’m Joe…Solaris Systems Administrator

Steve,I’m a SANS Administrator

Cheryl,Oracle DBA…

Hi. Raphael.Network Administration

Hi I’m Tania,Linux Systems Administrator

Dave,Independent Consultant

Chris here…Tools Manager

DELIVERS:

Persistent Security Model Unified Security Practice Automatic Forensics Capture Transparency & Oversight

DRIVING:

Comprehensive Security Coverage Simplified Management Model Common-Consistent Practices Transparency Reliability Quality

YIELDING:

Meeting of CISO Mandates Enhanced Information Assurance Improved Governance Reduced Risk Better Control

Michael…VM Administrator

TDi Technologies Your business is built on IT

Privileged Actors

Privileged Interfaces

Page 4: IT Foundation Management Security

Page 4

Siloed Operation. Multiple Applications.Many Methods. Labor Intensive.

The Challenges are Driven by Complexity

TDi Technologies Your business is built on IT

I’m Joe…Solaris Systems

Administrator

Steve,I’m a SANS

Administrator

Cheryl,Oracle DBA…

Hi. Raphael.Network Administration

Hi I’m Tania,Linux Systems Administrator

Michael…VM Administrator

Page 5: IT Foundation Management Security

Page 5

Simplified by IT Foundation Management

TDi Technologies Your business is built on IT

To a unified security solution over all privileged

users and interfaces.I’m Joe…Solaris Systems

Administrator

Steve,I’m a SANS

Administrator

Cheryl,Oracle DBA…

Hi. Raphael.Network Administration

Hi I’m Tania,Linux Systems Administrator

Michael…VM Administrator

Page 6: IT Foundation Management Security

Page 6

Secured in Normal Mode OnlyDocumentation is by hand

Persistence: Normal OperationDocumentation: Manual

Normal Operation

Persistent connectionFull security in all modesFull documentation in all modes including:

Normal OperationMaintenanceConfigurationFailure

Persistence: All ModesDocumentation: Automatic

With New Capabilities that Drive Success

TDi Technologies Your business is built on IT

Traditional Practices IT Foundation Management

Normal Operation Maintenance

Failure Configuration

Page 7: IT Foundation Management Security

Page 7

Command and Control

TDi Technologies Your business is built on IT

No Threat.No Action Required.

IT Foundation Management Delivers Real-time Policy Enforcement

Resulting in Real-Time Foundational Command and Control

Real-time scanning of Privileged User Activity

Script Engine for Complex and Wildcard Rules

Control over Sessions – including Termination

Configurable Alert Priorities

Custom Actions (email, text, terminate)

Unlimited Rules Support

Directly Embed Compliance Rules in Scans

Their activity is scanned in real-time

against Policies

Business Rules

Privileged Actors perform their

Work

Break/FixIncidentsConfigurationPatchingProgrammingHousekeepingMaintenanceInstall software

Threat!1. Generate Alert2. Terminate Access3. Etc…

Page 8: IT Foundation Management Security

Page 8

Simplification Example – Access Complexity

CMDB? SSH?

PuTTY?

Other records? HTTP?

TeraTerm?

Other DB? TELNET?

Absolute?

IP Address?

Other?

Terminal?

ZOC?

Tunnelier?

etc?

HOW? WHERE? WHAT? WHICH?

Log on?

Credentials?

Commands?

What syntax

applies?

With the Traditional Approach, Privileged Actors need to know…

With IT Foundation Management, Privileged Actors need to know…

NAME

Page 9: IT Foundation Management Security

Page 9

Maintenance is Managed Safely and Effectively

Patching

• Security• Performance• Features• Maintainability

Configuration

• Performance• Demand• New requirements• Issues• Expansion• Infrastructure changes

Housekeeping

• Disk clean-up• Update user/asset records• Run backups• Monitor/schedule jobs

Upgrading

• New software versions

Maintenance Includes:

Traditional Approach IT Foundation Management

Tools Multiple One

Methods Multiple One

Automation Varies by tool Common - powerful

Logging Limited or none Comprehensive

Issue Resolution Difficult Fully supported

Repetitive Actions Individual Up to 40 at a time

TDi Technologies Your business is built on IT

Maintenance occurs regularly – yet mistakes can take critical IT assets off-line or compromise security.

IT Foundation Management optimizes, automates, and centrally-manages all foundational maintenance

activities.

Page 10: IT Foundation Management Security

Page 10

Managing the IT Services Foundation

Application

Application

Application

Application

Service Starts

ServiceCompletes

This information is collected in real-time

Business logic is applied: Events, SLA Threats

Response/ Remediation actions are triggered

Business logic is updated as needed

(continuous improvement)

Page 11: IT Foundation Management Security

Page 11

Use Case – Electronic Funds Transfer (EFT)

Sending Bank WireTransfer Service

Federal ReserveTransfer Service

CurrencyExchange Service

Receiving Bank Transfer/Posting Service

Service Starts

ServiceCompletes

This information is collected in real-time

Business logic is applied: SLA Threats

Remediation actions are triggered

Business logic is updated as needed

(continuous improvement)

SLA Management:

1) Transactions (tracking) &

Applications (errors)

a. Work Bottlenecks

b. Monitor, Predict, Alert on

end-to-end processing time

c. Identify Issues (work

stoppage) in Real-Time

Page 12: IT Foundation Management Security

Page 12

CLO

UD

Customer DInstanceCustomer C

Instance

Customer AInstance

Customer BInstance

Customer EInstance

ITFM for Public Clouds:

1) Privileged Interfaces Secured

a. Isolated from other Cloud Customers

b. Isolated from Cloud Provider

2) Privileged Activity Automatically

Recorded (down to the keystroke)

3) IT Operations Simplified and Optimized

4) IT Services Effectively Managed

IT Foundation Management in Public Clouds

Page 13: IT Foundation Management Security

Page 13

Reducing Risk to the Business

TDi Technologies Your business is built on IT

Manual documentation

Siloed security tools and practices

Unnecessary complexity

Little or no control capability

No means of verification

Lack of accountability

When mistakes happen in the IT Foundation, the business is placed at risk.

RISK

Unified Privileged Interface Security

Automatic Documentation

Dramatic Simplification

Real-time Command & Control

Definitive Verification

Explicit Accountability

Reducing our risk exposure is always a good thing. When it includes addressing regulatory, security and operational challenges the value adds up fast.

CEO

Page 14: IT Foundation Management Security

Page 14

IT Security and Compliance Benefits

VP IT Operations

Access policy enforceable

Change records automatically captured

Verification easy

CISO expectations met point by point

IT Tools Manager

The right tool that does the whole job right

Reduction in workload

Increased internal customer satisfaction

Problem solved!

The Business

Assets better protected

Operations simplified

Oversight and transparency enabled

Risks reduced

CISO

Privileged user security in all modes

Strong, verifiable deterent

Comprehensive forensics records

TDi Technologies Your business is built on IT

Page 15: IT Foundation Management Security

Page 15

IT Foundation Management

Security Foundation

Closing the Foundation Gap• Role-based access and control• Record the 5 Ws• Complete forensic history

Compliance FoundationMeeting Intent & Interpretation• Control subsystems changes• Detect compliance events• Build auditable history

IT Operations Foundation

Doing More with LessUniversal, integrated

environment•Optimized automated process •

Secure remote management•

IT Services FoundationDelivering on CommitmentsSense and Respond in real-

time• Correlate across the

architecture• Proactively manage and

protect• TDi Technologies Your business is built on IT


Recommended