Date post: | 18-Nov-2014 |
Category: |
Technology |
Upload: | tditechnologies |
View: | 329 times |
Download: | 6 times |
IT Foundation Management for Security
Your business is built on IT
Securing the IT Foundation of your Business
Page 2
What is the IT Foundation?
Servers… Network Gear… SANS… Operating Systems…
Networks…Databases… Appliances…Virtual Machines…
Blades…
Environment…
The IT Foundation includes all of your physical and virtual:
And is supported by:
I’m Joe…Solaris Systems Administrator
Steve,I’m a SANS Administrator
Cheryl,Oracle DBA…
Hi. Raphael.Network Administration
Hi I’m Tania,Linux Systems Administrator
Dave,Independent Consultant
Chris here…Tools Manager
Michael…VM Administrator
TDi Technologies Your business is built on IT
Page 3
IT Foundation Management
I’m Joe…Solaris Systems Administrator
Steve,I’m a SANS Administrator
Cheryl,Oracle DBA…
Hi. Raphael.Network Administration
Hi I’m Tania,Linux Systems Administrator
Dave,Independent Consultant
Chris here…Tools Manager
DELIVERS:
Persistent Security Model Unified Security Practice Automatic Forensics Capture Transparency & Oversight
DRIVING:
Comprehensive Security Coverage Simplified Management Model Common-Consistent Practices Transparency Reliability Quality
YIELDING:
Meeting of CISO Mandates Enhanced Information Assurance Improved Governance Reduced Risk Better Control
Michael…VM Administrator
TDi Technologies Your business is built on IT
Privileged Actors
Privileged Interfaces
Page 4
Siloed Operation. Multiple Applications.Many Methods. Labor Intensive.
The Challenges are Driven by Complexity
TDi Technologies Your business is built on IT
I’m Joe…Solaris Systems
Administrator
Steve,I’m a SANS
Administrator
Cheryl,Oracle DBA…
Hi. Raphael.Network Administration
Hi I’m Tania,Linux Systems Administrator
Michael…VM Administrator
Page 5
Simplified by IT Foundation Management
TDi Technologies Your business is built on IT
To a unified security solution over all privileged
users and interfaces.I’m Joe…Solaris Systems
Administrator
Steve,I’m a SANS
Administrator
Cheryl,Oracle DBA…
Hi. Raphael.Network Administration
Hi I’m Tania,Linux Systems Administrator
Michael…VM Administrator
Page 6
Secured in Normal Mode OnlyDocumentation is by hand
Persistence: Normal OperationDocumentation: Manual
Normal Operation
Persistent connectionFull security in all modesFull documentation in all modes including:
Normal OperationMaintenanceConfigurationFailure
Persistence: All ModesDocumentation: Automatic
With New Capabilities that Drive Success
TDi Technologies Your business is built on IT
Traditional Practices IT Foundation Management
Normal Operation Maintenance
Failure Configuration
Page 7
Command and Control
TDi Technologies Your business is built on IT
No Threat.No Action Required.
IT Foundation Management Delivers Real-time Policy Enforcement
Resulting in Real-Time Foundational Command and Control
Real-time scanning of Privileged User Activity
Script Engine for Complex and Wildcard Rules
Control over Sessions – including Termination
Configurable Alert Priorities
Custom Actions (email, text, terminate)
Unlimited Rules Support
Directly Embed Compliance Rules in Scans
Their activity is scanned in real-time
against Policies
Business Rules
Privileged Actors perform their
Work
Break/FixIncidentsConfigurationPatchingProgrammingHousekeepingMaintenanceInstall software
Threat!1. Generate Alert2. Terminate Access3. Etc…
Page 8
Simplification Example – Access Complexity
CMDB? SSH?
PuTTY?
Other records? HTTP?
TeraTerm?
Other DB? TELNET?
Absolute?
IP Address?
Other?
Terminal?
ZOC?
Tunnelier?
etc?
HOW? WHERE? WHAT? WHICH?
Log on?
Credentials?
Commands?
What syntax
applies?
With the Traditional Approach, Privileged Actors need to know…
With IT Foundation Management, Privileged Actors need to know…
NAME
Page 9
Maintenance is Managed Safely and Effectively
Patching
• Security• Performance• Features• Maintainability
Configuration
• Performance• Demand• New requirements• Issues• Expansion• Infrastructure changes
Housekeeping
• Disk clean-up• Update user/asset records• Run backups• Monitor/schedule jobs
Upgrading
• New software versions
Maintenance Includes:
Traditional Approach IT Foundation Management
Tools Multiple One
Methods Multiple One
Automation Varies by tool Common - powerful
Logging Limited or none Comprehensive
Issue Resolution Difficult Fully supported
Repetitive Actions Individual Up to 40 at a time
TDi Technologies Your business is built on IT
Maintenance occurs regularly – yet mistakes can take critical IT assets off-line or compromise security.
IT Foundation Management optimizes, automates, and centrally-manages all foundational maintenance
activities.
Page 10
Managing the IT Services Foundation
Application
Application
Application
Application
Service Starts
ServiceCompletes
This information is collected in real-time
Business logic is applied: Events, SLA Threats
Response/ Remediation actions are triggered
Business logic is updated as needed
(continuous improvement)
Page 11
Use Case – Electronic Funds Transfer (EFT)
Sending Bank WireTransfer Service
Federal ReserveTransfer Service
CurrencyExchange Service
Receiving Bank Transfer/Posting Service
Service Starts
ServiceCompletes
This information is collected in real-time
Business logic is applied: SLA Threats
Remediation actions are triggered
Business logic is updated as needed
(continuous improvement)
SLA Management:
1) Transactions (tracking) &
Applications (errors)
a. Work Bottlenecks
b. Monitor, Predict, Alert on
end-to-end processing time
c. Identify Issues (work
stoppage) in Real-Time
Page 12
CLO
UD
Customer DInstanceCustomer C
Instance
Customer AInstance
Customer BInstance
Customer EInstance
ITFM for Public Clouds:
1) Privileged Interfaces Secured
a. Isolated from other Cloud Customers
b. Isolated from Cloud Provider
2) Privileged Activity Automatically
Recorded (down to the keystroke)
3) IT Operations Simplified and Optimized
4) IT Services Effectively Managed
IT Foundation Management in Public Clouds
Page 13
Reducing Risk to the Business
TDi Technologies Your business is built on IT
Manual documentation
Siloed security tools and practices
Unnecessary complexity
Little or no control capability
No means of verification
Lack of accountability
When mistakes happen in the IT Foundation, the business is placed at risk.
RISK
Unified Privileged Interface Security
Automatic Documentation
Dramatic Simplification
Real-time Command & Control
Definitive Verification
Explicit Accountability
Reducing our risk exposure is always a good thing. When it includes addressing regulatory, security and operational challenges the value adds up fast.
CEO
“
Page 14
IT Security and Compliance Benefits
VP IT Operations
Access policy enforceable
Change records automatically captured
Verification easy
CISO expectations met point by point
IT Tools Manager
The right tool that does the whole job right
Reduction in workload
Increased internal customer satisfaction
Problem solved!
The Business
Assets better protected
Operations simplified
Oversight and transparency enabled
Risks reduced
CISO
Privileged user security in all modes
Strong, verifiable deterent
Comprehensive forensics records
TDi Technologies Your business is built on IT
Page 15
IT Foundation Management
Security Foundation
Closing the Foundation Gap• Role-based access and control• Record the 5 Ws• Complete forensic history
Compliance FoundationMeeting Intent & Interpretation• Control subsystems changes• Detect compliance events• Build auditable history
IT Operations Foundation
Doing More with LessUniversal, integrated
environment•Optimized automated process •
Secure remote management•
IT Services FoundationDelivering on CommitmentsSense and Respond in real-
time• Correlate across the
architecture• Proactively manage and
protect• TDi Technologies Your business is built on IT