Priviledged Identity Management - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

Priviledged Identity Management

Description:

LTS Secure offer PIM user activity monitoring provides flexible alert generation based on robust combinations of user profiles, key actions and client locations. – PowerPoint PPT presentation

Number of Views:3

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Priviledged Identity Management


1
Priviledged Identity Management
2
CONTENT
  • User Activity Visibility
  • Compliance Demands
  • Third-Party Access, Troubleshooting and Training

3
User Activity Visibility The Weak Link for
Enterprise Compliance and Security
  • Todays compliance places strict limitations on
    the types of people who can access sensitive
    financial and corporate data. Unfortunately, many
    compliant organizations have little or no insight
    into who these users are and what they are doing,
    putting themselves at risk for data breaches,
    fines and, in some cases, imprisonment. These
    companies realize the need to monitor users
    involved with accessing, storing and auditing
    sensitive corporate information, yet their
    current data security systems often lack this
    functionality.
  • With detailed logs and user activities recordings
    of all users on any server, workstation or
    application you can exceeds the strictest
    interpretation of compliance requirements with
    conclusive evidence for compliance auditors.
    These audit reports can be completed in a
    fraction of the time, with the ability to
    instantly search, analyze and view the drilled
    down reports for any evidence. Heres how LTS
    Secure user activity monitoring addresses
    specific compliance section requirements.

4
(No Transcript)
5
(No Transcript)
6
Compliance Demands
  • Capture and search historical user activity so
    that suspicious actions can be examined to
    determine if an attack is occurring before the
    damage is done.
  • Change user behavior through deterrents ensuring
    that trustworthy employees are not taking
    shortcuts and disgruntled employees know any
    malicious actions will be recorded.
  • Establish a clear, unambiguous record for
    evidence in legal proceedings and dispute
    resolution.
  • Mitigating Insider Attacks
  • Alert when user actions or patterns are seen
    those are indicative of insiders
    inappropriatelyobtaining sensitive data or
    exfiltrating.
  • Alert when outliers are seen off of a baseline of
    what is normal behavior for a peer group, as
    these outliers may be insider threats
  • Complement other security technologies which may
    not be able to provide full visibility into a
    users internal actions, or may be circumvented
    by the insider

7
Third-Party Access, Troubleshooting and Training
  • Automated discovery and (re)configuration of
    audit system components for reliability and
    faulttolerance with minimal administrative
    personnel involvement.
  • Ensure only trusted components can participate in
    the auditing system.
  • Built-in integration support for existing SIEM,
    event and monitoring tools.

8
THANK YOU
About PowerShow.com