Date post: | 15-Apr-2017 |
Category: |
Software |
Upload: | is-decisions |
View: | 47 times |
Download: | 1 times |
© Copyright 2016 - IS Decisions S.A - All right reservedUserLock and FileAudit are trademarks of IS Decisions S.AAll numbers are from IS Decisions’ research into the access security priorities of 500 IT Security Managers in the US and UK. http://www.isdecisions.com/user-security-versus-user-productivity/
Transparent security that does not impede end users and
hinder productivity
Fast implementation and easy to manage
Non-disruptive technology that doesn’t frustrate
IT departments
www.fileaudit.com
FileAudit monitors and alerts on all file access and access attempts. Contextual functions help detect any malicious access and alteration of sensitive information on
Windows systems.
FileAudit
www.userlock.com
With context-aware user login rules, real-time monitoring and risk detection tools, UserLock works alongside Active Directory to guard against compromised
logins on Windows systems.
UserLock
TWO SOFTWARE SOLUTIONS FOR WINDOWS ACTIVE DIRECTORY NETWORKS
Make sure authenticated users are who they say they are, identify any ‘risky’ behavior and put a stop to it before it ends up costing capital, customers and your company’s reputation.
Compromised credentials can happen to everyone - Don't let it be you
Attackers are after data, and for that they must access it before they can extract it. Visibility is key. If the adversary had valid, authorized credentials, it becomes critical to monitor all access to sensitive data. Not only unauthorized, but authorized as well.
31% of companies’ currently monitor user behavior to guard against compromised credentials
MONITOR ALL ACCESS TO SENSITIVE DATA
4
report
Set rules that automatically allow or deny a login connection requested. Set restrictions on location, IP address, time of day, number of simultaneous sessions, number of initial access points. Modified at any time all changes should be applied in real-time and effective immediately.
31% of companies’ currently use contextual access restrictions to guard against compromised credentials
SET CONTEXTUAL ACCESS CONTROLS TO LIMIT END
USERS ACCESS
3
rules
Set real-time alerts on specific events so you can identify if authenticated credentials have been compromised and immediately stop network access.
54% of companies’ currently use abnormal logon activity alerts to guard against compromised credentials
SET ALERTS ON ABNORMAL
LOGON ACTIVITY
2
access denied!
Your users will have already been assigned logins, but you won’t know if abnormal behavior is happening if you don’t know who is connected from which workstation or device and since when.
47% of companies’ currently use real-time monitoringto guard against compromised credentials
IMPLEMENT REAL TIME MONITORING OF ACCOUNT
LOGON ACTIVITY
1
Stop blaming users and start better protecting users’ authenticated access.
TO STOP COMPROMISEDLOGIN ACCESS
EASYSTEPS4
connectedfrom home
11:23 pm
copyingcopying
copyingcopying
For example: Simultaneous logins from locations too far apart
to make any sense, or sequential logins with different credentials being used from an existing
impossible journeys46%
For example: Login attempts from outside normal business hours
sudden change in working/office hours48%
For example: A repetition of failed login attempts
or password resets.
password resets
resetpASSWORD 48%
For example: Login attempts from an unlikely session
type, location or device.
Implausible remote access58%
LOGgedLOGin
For example: Copying, deleting or moving
of a large number of files en-mass.
Unusual resource usage59%
The top five signs are top for a reason — because they are the usual suspects when it comes to identifying if someone uninvited has breached your network.
WARNING SIGNS OF COMPROMISED CREDENTIALSYOU SHOULD BE LOOKING OUT FOR 5
hacked database including user credentials22%
password duplication29%PrivatePasswordxabc3
CorporatePassword
xabc3
social engineering35%E-mailSPAM
key-logging malware37%
password sharing with colleagues38%PASSWORD
phishing58% LOGINPASSWORD
But users are human. They are flawed, careless and often exploited.
Security must be there to protect users from both careless and malicious behavior and to protect the business from outsiders trying to gain access by pretending to be employees.
It’s easy to blame your users.
It’s your end-users that are often endangering your network.HOW LOGIN CREDENTIALS ARE EFFORTLESSLY COMPROMISED
Compromised credentials are key to avoiding network breach detection. They belong to an authenticated user with authorized access!
45%of data breaches are as a result
of compromised credentials
----------------80%of organizations believe detecting possible compromised credentials is important
How to bolster your defense against security breaches that stem from stolen and shared user login credentials
STOP BLAMING YOUR USERS FOR COMPROMISED CREDENTIALS