SlideShare una empresa de Scribd logo
1 de 40
Is your company protected against
confidential data leakage?
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Jan Petculescu
General Manager - IT SECURE PRO
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
About It Secure Pro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
2010 – new partnership
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Avecto Privilege Guard
Avecto Privilege Guard
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Avecto Privilege Guard enables organizations to adopt the principle of
least privilege.
It is no longer necessary to assign admin rights to users, as these rights
can now be assigned dynamically to applications, tasks and scripts.
Privilege Guard enables users to log on with minimal rights and empowers
them to perform their day to day role, without compromising the integrity
and security of the corporate systems.
Avecto Privilege Guard
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Simple Policy Configuration
Enabling an application to run with elevated rights couldn’t be simpler.
Define the application in the Privilege Guard Policies and set its
identification options, such as filename, file hash, trusted publisher or
command line.
Next, assign the application to the users who require elevated rights over
the application and set up any additional options, such as end user
messaging, auditing and privilege monitoring.
The policies are automatically committed to Active Directory Group Policy
and will be deployed during the next Group Policy refresh cycle.
Avecto Privilege Guard
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Privilege Monitoring
To assist in policy definition, Privilege Guard can be deployed in “passive
mode” to users who have local admin or power user rights.
Privilege monitoring will analyze application behaviour and log events for
any application that would fail to run under a standard user account. More
detailed activity logs can also be captured, which enable closer inspection
of any privileged operations performed by applications.
Once this information is collated, suitable policies may be defined to
elevate the individual applications, enabling users to be removed from the
local administrators or power users groups.
Avecto Privilege Guard
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Application Control
In addition to controlling the privileges assigned to applications, Privilege
Guard may also be used to control the applications that a user is allowed
to install or run.
Policies may be configured that whitelist the trusted applications on a
system, by identifying applications based on a combination of trusted
folders, files, publishers or hashes. Any unauthorized applications,
including software installers and scripts may be blocked and audited.
The end user is informed with a fully customizable message, including the
option for the user to email a request for a blocked application. More
advanced users may be allowed to run unauthorized applications, and in
this scenario the user can simply be warned and their actions audited.
Avecto Privilege Guard
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Privilege Guard Supported Platforms:
Windows XP
Windows Vista
Windows 7
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Both 32-bit and 64-bit versions are available for all platforms
Avecto Privilege Guard
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Device Control
Lumension® Device Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Device Control:
Centrally manages security policies regarding use of removable devices
(e.g., USB flash drives) and media (e.g., DVDs/CDs) using a whitelist /
"default deny" approach
Enforces encryption policies when copying data to removable devices /
media
Prevents malware intrusion via removable devices / media, adding a layer
of protection to your network
Provides the visibility, forensics and reporting needed to demonstrate
compliance with applicable laws
Lumension® Device Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
1.Discover - Identify all removable devices that are now or have ever been
connected to your endpoints through the use of a “learning” mode that
allows you to collect information without disrupting business.
2.Assess - Define rules at both default and machine-specific levels for
groups and individual users with regards to device access by class, model
and/or specific ID, and uniquely identify and authorize specific media.
These permissions can be linked to the user and user group information
stored in Microsoft Active Directory or Novell eDirectory.
Lumension® Device Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
3.Implement - Enforce device and data usage policies by: file copy
limitations (amount per day, time of day) and file type filtering. You can also
enforce the encryption of data moved onto removable devices / media and
apply permissions to specific and/or groups of endpoints, ports, devices
and users (both on- and off-line), including scheduled / temporary access.
4.Monitor - Continuously monitor the effectiveness of device and data
usage policies in real time and identify potential security threats by logging
all device connections, recording all policy changes and administrator
activities, and tracking all file transfers by file name and content type. You
can even keep a copy of every file that is transferred to or from a
removable device using our patented bi-directional shadowing technology.
Lumension® Device Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
5.Report - Create both standard and customized reports on all device and
data activity showing allowed and blocked events, which can be saved into
a repository, shared via email, and/or imported into 3rd party applications
Lumension® Device Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Device Control features:
Per-Device Permissions
Flexible Policy with Granular Control
Temporary / Scheduled Access
File Type Filtering
Data Copy Restriction
256-bit AES Encryption
Lumension® Device Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Application
Control
Lumension® Application Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
The threats aren’t going to stop and antivirus software alone cannot control
the problem as malware threats are being developed faster than the
necessary fixes and organizations need a product that prevents the
execution of malicious code.
Centrally manage, monitor, and control applications with a whitelist
approach that allows only authorized applications to run ensuring no
malware, spyware, keyloggers, Trojans, worms, viruses, zero-day threats
and unwanted or unlicensed software will execute on your network and
disrupt your business.
Lumension® Application Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
1.Discover - Identify all executable files and devices, collect profiles and
organize into pre-defined file groups.
2.Implement - Assign permissions for applications to run based on
executable, user, or user group attributes. Use an application whitelist
approach to ensure that only authorized and legal applications can run on
a computer. When a user wants to run an application, the OS request at
the kernel level is intercepted by the Lumension driver. If the user has
rights, then access will be granted. If the application is not known or the
user does not have rights, then access will be denied
Lumension® Application Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
3.Monitor - Monitor the effectiveness of endpoint security policies in real
time and identify potential threats by logging all application execution
attempts and recording all policy changes and administrator activities.
4.Report - Demonstrate policy compliance and ensure software license
compliance to meet Sarbanes Oxley, NERC, HIPAA, PCI, and GLBA
requirements by drilling down on suspicious behavior for security or legal
follow-up.
Lumension® Application Control
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Endpoint
Management and Security
Suite
Patch and Remediation
LEMSS - Patch and Remediation
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
As IT environments have become increasingly complex, supporting virtual,
distributed, and disparate platforms, companies must ensure that they
maintain control of their endpoints.
Ensuring secure and standard endpoint configurations and patch
management for third party applications and operating systems is
paramount to reducing IT risk and improving endpoint operations.
LEMSS - Patch and Remediation
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
LEMSS - Patch and Remediation is part of Lumension® Vulnerability
Management which has been rated by analyst firms such as Forrester and
IDC as a "leader" in vulnerability management because of its robust
feature-set and broad support and provides broad support for multiple
platforms, including Windows, Unix, Linux and Mac OS, and for third party
applications, with the largest repository of Adobe vulnerability content
LEMSS - Patch and Remediation
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
1. Discover - Gain complete visibility of your heterogeneous network
environment. Proactively discover all of your IT assets, both managed and
unmanaged, through in-depth scans and flexible grouping and
classification options.
2. Assess - Proactively identify known issues before they can be
exploited. Perform a deep analysis and thorough OS, application and
security configuration vulnerability assessments.
LEMSS - Patch and Remediation
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
3. Prioritize - Focus on your most critical security risks first.
4. Remediate - Automatically deploy patches to an entire network. Simplify
the process of maintaining a secure environment by continuously
monitoring, detecting and remediating policy-driven environments across
all major platforms and applications.
5. Report - Gain a holistic view your environmental risk. Access a full
range of operational and management reports that consolidate discovery,
assessment and remediation information on a single management
console.
LEMSS - Patch and Remediation
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Compliance and IT
Risk Management
Lumension® Compliance and IT Risk Management
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Compliance and IT Risk Management
In today’s fast paced business environment, organizations face the
challenge of complying with numerous regulations but still employ manual
and improvised IT audit processes, incurring high costs with inaccurate
results.
Over 400 Regulations and Standards documents are included in our
solution with full cross-references to supporting IT controls
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Compliance and IT Risk Management
1. Risk Profiling - Easily model the relationship between your IT assets
and business interests to identify IT-borne business risk. Lumension
categorizes an organization’s resource types including technology, people
and processes, and then develops a powerful risk profile through its
patent-pending risk intelligence engine. The risk profile information is
automatically correlated with internal and external compliance
requirements and suggests mitigating IT controls to address potential
regulatory and IT risk exposure.
2. Controls Framework - Leveraging the industry-standard Unified
Compliance Framework (UCF), Lumension Risk Manager harmonizes
controls across hundreds of different regulations including PCI, SOX,
FISMA, HIPAA, NERC, CobiT, NIST, ISO frameworks, and many more.
This means that no control is ever duplicated and the structure and
language of each control follows the same predictable format.
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Lumension® Compliance and IT Risk Management
3. Controls Assessment - Streamline and automate the workflow for
assessing technical, physical and procedural controls by interfacing to
either Lumension security solutions or third party point products such as
vulnerability scanners. Utilize automated surveys to complete your
assessment of physical and procedural controls.
4. Risk & Compliance Reporting - Generate reports with key metrics to
satisfy a diverse IT risk and compliance audience through compliance and
IT risk reporting, operational security reporting and remediation modeling
and forecasting. Create "what-if" scenarios to better estimate how a project
or remediation effort will improve your IT risk and compliance posture.
Assign and track remediation projects to measure and reflect improvement
in compliance and IT risk metrics.
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Spector 360 incorporates SpectorSoft's award-winning computer
monitoring technology that automatically records everything including
emails sent and received, chat and instant messaging, web surfing,
keystrokes typed, files transferred/printed/saved, online search, program
activity, document tracking, and more!
Spector 360 takes the recorded Internet and computer activities from each
of your employees, feeds that information into a database and provides
you with more than 50 built-in, comprehensive reports -plus- unlimited
customization.
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
With Spector 360 you will find answers to questions such as:
Which employees spend the most time surfing web sites?
Who is spending time on shopping sites, sports sites or adult sites?
Which employees chat or use anonymous email services like Hotmail and
Gmail?
Who is sending the most emails with attachments?
Which employees may be leaking company confidential information via
removable media like flash drives, CDs and DVDs?
Which employees are printing sensitive documents?
Who is arriving to work late and leaving early? Who takes long lunch
breaks?
What are my employees searching for on Google, Yahoo and MSN?
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
In August, SpectorSoft announced the release of Spector 360 Version 7.1
(7.1.1108).
Spector 360 adds support for Mac OS X making it possible to record user
activities on both Windows and Apple computers. The new release
provides you with the functionality to review both PC and Mac recordings
from the same familiar Dashboard interface.
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Spector 360 allows you to monitor what your employees do on their PC
and on the Internet, so all applications run and all keystrokes typed are
immediately available to you.
Just as a VCR records and plays back, Spector 360 provides you with the
total picture of everything your employee does.
If training or other assistance is necessary to make that employee more
productive or proficient, you’re able to quickly rectify the situation.
November 10, 2010 www.itsecurepro.com
Agora Security Conference www.business-software.ro
Thank you for your atention.
Any questions?

Más contenido relacionado

La actualidad más candente

ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE Array Networks
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentationtsteh
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safeJens Albrecht
 
CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit DatasheetIS Decisions
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity managementNis
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products MatrixCharles McNeil
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...Ahmed Al Enizi
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next levelPer Larsen
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemCodero
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Marketing Team
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.Mindtree Ltd.
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationDouglas Gourlay
 

La actualidad más candente (19)

ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release Highlights
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safe
 
CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy Intro
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit Datasheet
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.Vulnerability assessment and penetration testing service.
Vulnerability assessment and penetration testing service.
 
Network Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems PresentationNetwork Field Day 11 - Skyport Systems Presentation
Network Field Day 11 - Skyport Systems Presentation
 

Similar a It securepro 10 nov 2010

Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperJim Kitchen
 
Ceu library software asset management (sam)
Ceu library software asset management (sam)Ceu library software asset management (sam)
Ceu library software asset management (sam)Julius Cortez
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...mfrancis
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara
 

Similar a It securepro 10 nov 2010 (20)

VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
IRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical WhitepaperIRM Secure on SecuLogica Technical Whitepaper
IRM Secure on SecuLogica Technical Whitepaper
 
Ceu library software asset management (sam)
Ceu library software asset management (sam)Ceu library software asset management (sam)
Ceu library software asset management (sam)
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
SFScon22 - Lucas Lasota - Device Neutrality.pdf
SFScon22 - Lucas Lasota - Device Neutrality.pdfSFScon22 - Lucas Lasota - Device Neutrality.pdf
SFScon22 - Lucas Lasota - Device Neutrality.pdf
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 

Más de Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

Más de Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

It securepro 10 nov 2010

  • 1. Is your company protected against confidential data leakage? November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Jan Petculescu General Manager - IT SECURE PRO
  • 2. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro About It Secure Pro
  • 3. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 2010 – new partnership
  • 4. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 5. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Avecto Privilege Guard Avecto Privilege Guard
  • 6. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Avecto Privilege Guard enables organizations to adopt the principle of least privilege. It is no longer necessary to assign admin rights to users, as these rights can now be assigned dynamically to applications, tasks and scripts. Privilege Guard enables users to log on with minimal rights and empowers them to perform their day to day role, without compromising the integrity and security of the corporate systems. Avecto Privilege Guard
  • 7. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Simple Policy Configuration Enabling an application to run with elevated rights couldn’t be simpler. Define the application in the Privilege Guard Policies and set its identification options, such as filename, file hash, trusted publisher or command line. Next, assign the application to the users who require elevated rights over the application and set up any additional options, such as end user messaging, auditing and privilege monitoring. The policies are automatically committed to Active Directory Group Policy and will be deployed during the next Group Policy refresh cycle. Avecto Privilege Guard
  • 8. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Privilege Monitoring To assist in policy definition, Privilege Guard can be deployed in “passive mode” to users who have local admin or power user rights. Privilege monitoring will analyze application behaviour and log events for any application that would fail to run under a standard user account. More detailed activity logs can also be captured, which enable closer inspection of any privileged operations performed by applications. Once this information is collated, suitable policies may be defined to elevate the individual applications, enabling users to be removed from the local administrators or power users groups. Avecto Privilege Guard
  • 9. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Application Control In addition to controlling the privileges assigned to applications, Privilege Guard may also be used to control the applications that a user is allowed to install or run. Policies may be configured that whitelist the trusted applications on a system, by identifying applications based on a combination of trusted folders, files, publishers or hashes. Any unauthorized applications, including software installers and scripts may be blocked and audited. The end user is informed with a fully customizable message, including the option for the user to email a request for a blocked application. More advanced users may be allowed to run unauthorized applications, and in this scenario the user can simply be warned and their actions audited. Avecto Privilege Guard
  • 10. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Privilege Guard Supported Platforms: Windows XP Windows Vista Windows 7 Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Both 32-bit and 64-bit versions are available for all platforms Avecto Privilege Guard
  • 11. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Device Control Lumension® Device Control
  • 12. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Device Control: Centrally manages security policies regarding use of removable devices (e.g., USB flash drives) and media (e.g., DVDs/CDs) using a whitelist / "default deny" approach Enforces encryption policies when copying data to removable devices / media Prevents malware intrusion via removable devices / media, adding a layer of protection to your network Provides the visibility, forensics and reporting needed to demonstrate compliance with applicable laws Lumension® Device Control
  • 13. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 1.Discover - Identify all removable devices that are now or have ever been connected to your endpoints through the use of a “learning” mode that allows you to collect information without disrupting business. 2.Assess - Define rules at both default and machine-specific levels for groups and individual users with regards to device access by class, model and/or specific ID, and uniquely identify and authorize specific media. These permissions can be linked to the user and user group information stored in Microsoft Active Directory or Novell eDirectory. Lumension® Device Control
  • 14. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 3.Implement - Enforce device and data usage policies by: file copy limitations (amount per day, time of day) and file type filtering. You can also enforce the encryption of data moved onto removable devices / media and apply permissions to specific and/or groups of endpoints, ports, devices and users (both on- and off-line), including scheduled / temporary access. 4.Monitor - Continuously monitor the effectiveness of device and data usage policies in real time and identify potential security threats by logging all device connections, recording all policy changes and administrator activities, and tracking all file transfers by file name and content type. You can even keep a copy of every file that is transferred to or from a removable device using our patented bi-directional shadowing technology. Lumension® Device Control
  • 15. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 5.Report - Create both standard and customized reports on all device and data activity showing allowed and blocked events, which can be saved into a repository, shared via email, and/or imported into 3rd party applications Lumension® Device Control
  • 16. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Device Control features: Per-Device Permissions Flexible Policy with Granular Control Temporary / Scheduled Access File Type Filtering Data Copy Restriction 256-bit AES Encryption Lumension® Device Control
  • 17. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Application Control Lumension® Application Control
  • 18. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro The threats aren’t going to stop and antivirus software alone cannot control the problem as malware threats are being developed faster than the necessary fixes and organizations need a product that prevents the execution of malicious code. Centrally manage, monitor, and control applications with a whitelist approach that allows only authorized applications to run ensuring no malware, spyware, keyloggers, Trojans, worms, viruses, zero-day threats and unwanted or unlicensed software will execute on your network and disrupt your business. Lumension® Application Control
  • 19. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 1.Discover - Identify all executable files and devices, collect profiles and organize into pre-defined file groups. 2.Implement - Assign permissions for applications to run based on executable, user, or user group attributes. Use an application whitelist approach to ensure that only authorized and legal applications can run on a computer. When a user wants to run an application, the OS request at the kernel level is intercepted by the Lumension driver. If the user has rights, then access will be granted. If the application is not known or the user does not have rights, then access will be denied Lumension® Application Control
  • 20. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 3.Monitor - Monitor the effectiveness of endpoint security policies in real time and identify potential threats by logging all application execution attempts and recording all policy changes and administrator activities. 4.Report - Demonstrate policy compliance and ensure software license compliance to meet Sarbanes Oxley, NERC, HIPAA, PCI, and GLBA requirements by drilling down on suspicious behavior for security or legal follow-up. Lumension® Application Control
  • 21. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Endpoint Management and Security Suite Patch and Remediation LEMSS - Patch and Remediation
  • 22. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro As IT environments have become increasingly complex, supporting virtual, distributed, and disparate platforms, companies must ensure that they maintain control of their endpoints. Ensuring secure and standard endpoint configurations and patch management for third party applications and operating systems is paramount to reducing IT risk and improving endpoint operations. LEMSS - Patch and Remediation
  • 23. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro LEMSS - Patch and Remediation is part of Lumension® Vulnerability Management which has been rated by analyst firms such as Forrester and IDC as a "leader" in vulnerability management because of its robust feature-set and broad support and provides broad support for multiple platforms, including Windows, Unix, Linux and Mac OS, and for third party applications, with the largest repository of Adobe vulnerability content LEMSS - Patch and Remediation
  • 24. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 1. Discover - Gain complete visibility of your heterogeneous network environment. Proactively discover all of your IT assets, both managed and unmanaged, through in-depth scans and flexible grouping and classification options. 2. Assess - Proactively identify known issues before they can be exploited. Perform a deep analysis and thorough OS, application and security configuration vulnerability assessments. LEMSS - Patch and Remediation
  • 25. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro 3. Prioritize - Focus on your most critical security risks first. 4. Remediate - Automatically deploy patches to an entire network. Simplify the process of maintaining a secure environment by continuously monitoring, detecting and remediating policy-driven environments across all major platforms and applications. 5. Report - Gain a holistic view your environmental risk. Access a full range of operational and management reports that consolidate discovery, assessment and remediation information on a single management console. LEMSS - Patch and Remediation
  • 26. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Compliance and IT Risk Management Lumension® Compliance and IT Risk Management
  • 27. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Compliance and IT Risk Management In today’s fast paced business environment, organizations face the challenge of complying with numerous regulations but still employ manual and improvised IT audit processes, incurring high costs with inaccurate results. Over 400 Regulations and Standards documents are included in our solution with full cross-references to supporting IT controls
  • 28. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Compliance and IT Risk Management 1. Risk Profiling - Easily model the relationship between your IT assets and business interests to identify IT-borne business risk. Lumension categorizes an organization’s resource types including technology, people and processes, and then develops a powerful risk profile through its patent-pending risk intelligence engine. The risk profile information is automatically correlated with internal and external compliance requirements and suggests mitigating IT controls to address potential regulatory and IT risk exposure. 2. Controls Framework - Leveraging the industry-standard Unified Compliance Framework (UCF), Lumension Risk Manager harmonizes controls across hundreds of different regulations including PCI, SOX, FISMA, HIPAA, NERC, CobiT, NIST, ISO frameworks, and many more. This means that no control is ever duplicated and the structure and language of each control follows the same predictable format.
  • 29. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Lumension® Compliance and IT Risk Management 3. Controls Assessment - Streamline and automate the workflow for assessing technical, physical and procedural controls by interfacing to either Lumension security solutions or third party point products such as vulnerability scanners. Utilize automated surveys to complete your assessment of physical and procedural controls. 4. Risk & Compliance Reporting - Generate reports with key metrics to satisfy a diverse IT risk and compliance audience through compliance and IT risk reporting, operational security reporting and remediation modeling and forecasting. Create "what-if" scenarios to better estimate how a project or remediation effort will improve your IT risk and compliance posture. Assign and track remediation projects to measure and reflect improvement in compliance and IT risk metrics.
  • 30. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 31. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 32. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Spector 360 incorporates SpectorSoft's award-winning computer monitoring technology that automatically records everything including emails sent and received, chat and instant messaging, web surfing, keystrokes typed, files transferred/printed/saved, online search, program activity, document tracking, and more! Spector 360 takes the recorded Internet and computer activities from each of your employees, feeds that information into a database and provides you with more than 50 built-in, comprehensive reports -plus- unlimited customization.
  • 33. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro With Spector 360 you will find answers to questions such as: Which employees spend the most time surfing web sites? Who is spending time on shopping sites, sports sites or adult sites? Which employees chat or use anonymous email services like Hotmail and Gmail? Who is sending the most emails with attachments? Which employees may be leaking company confidential information via removable media like flash drives, CDs and DVDs? Which employees are printing sensitive documents? Who is arriving to work late and leaving early? Who takes long lunch breaks? What are my employees searching for on Google, Yahoo and MSN?
  • 34. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro In August, SpectorSoft announced the release of Spector 360 Version 7.1 (7.1.1108). Spector 360 adds support for Mac OS X making it possible to record user activities on both Windows and Apple computers. The new release provides you with the functionality to review both PC and Mac recordings from the same familiar Dashboard interface.
  • 35. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 36. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 37. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 38. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro
  • 39. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Spector 360 allows you to monitor what your employees do on their PC and on the Internet, so all applications run and all keystrokes typed are immediately available to you. Just as a VCR records and plays back, Spector 360 provides you with the total picture of everything your employee does. If training or other assistance is necessary to make that employee more productive or proficient, you’re able to quickly rectify the situation.
  • 40. November 10, 2010 www.itsecurepro.com Agora Security Conference www.business-software.ro Thank you for your atention. Any questions?