SlideShare a Scribd company logo
1 of 21
Securing Your Sensitive Data
SolarWinds® and Townsend Security
                          June 13, 2012
Broad           Over 2000         Participating
experience in   customers         Organization
data security   worldwide         PCI Security
and data                          Standards Council
communication   Strong
                presence in the   NIST Certified AES
Leadership      Fortune 500       Encryption
averages over
30 years IT                       FIPS 140-2 Certified
experience                        Key Management
Breaches Happen

   855 Incidents, 174 million compromised records in 2011
   Less than 1% of the breaches were discovered through log
    analysis
   69% of these breaches were detectable via log evidence
   Take Away: If you are monitoring your logs, you can detect a
    breach before data is lost




                                 - Slide 3 -
Logging Is Now Essential

  PCI Section 10 Requires Logging
    » Requirement 10: Track and monitor all access to network resources and
      cardholder data



 GLBA/FFIEC Data Security
    » Log Transmission, Normalization, Storage, and Protection



 HIPAA/HITECH Act
    » Log-In Monitoring & Access Controls
State and Proposed Federal Privacy Notification

   Some state laws reference PCI compliance


   Nevada privacy law requires PCI compliance


   Minnesota requires compliance with parts of PCI
    (and now WA)


   New Federal privacy law in the works




  Modify This Footer: View ->   - Slide 5 -
Logging on the IBM iSeries Today
  Not monitoring your IBM iSeries® is a big problem
   » It can lead to a finding of non-compliance
   » It can leave a breach undetected


  A large national retailer lost over 45 million credit
   card numbers over a three-year period through
   poor security and inattention
   » Proper logging and review could have caught this




                                        - Slide 6 -
Why Alliance LogAgent Suite?

 A complete solution that can capture and forward all IBM i
   security events
 Built by IBM i experts specifically for SIEM integration
 Robust filtering capability minimizes network impact
 Strong encryption between IBM i and SIEM console
 Integrated user monitoring and log forward solution
 Selectively monitor data access and change activity at the
   column or field level – without changing applications or user
   accounts
What About Performance?

    High performance event collection from QAUDJRN, QSYSOPR,
     QHST

    3,500 events per second

    250 Million events per day

    Buffered transmission

    Simultaneous collection from multiple sources
Case Study

   A large media and entertainment company with over 40
    IBM i’s
   PCI DSS regulations required they capture and store all logs
    off of the system of origination
   Purchased a site license of Alliance LogAgent on a
    Wednesday
   Installed and implemented Alliance LogAgent on all systems
    by the following Monday
   The IBM i’s passed the PCI DSS Audit
Townsend Security & Logging on the IBM iSeries

   Alliance LogAgent™ from Townsend Security
        » Creates logs that SolarWinds Log & Event Manager® (LEM) can read
        » Forwards important information to LEM
        » Uses SSL/TLS encryption to secure delivery
                                                                                        SolarWinds Log
                                                                                       & Event Manager

                                      QSYSOPR
                                                                    Encrypted



                                      QAUDJRN             QHST



IBM iSeries Image courtesy of International Business Machines Corporation.
Unauthorized use not permitted.




                                                                        - Slide 10 -
- Slide 11 -
- Slide 12 -
- Slide 13 -
- Slide 14 -
Q: What can LogAgent database monitoring do?

A: Help you find unauthorized access to sensitive data:

<118>May 23 20:37:37 S10125BA LogAgentDB:[LGADB@0 column_name="SOCIAL" column_text="Social
Security Number" SECURITY_ALERT_user_access="yes" SECURITY_ALERT_program_access="yes"
data_type="A" action="Update" data_image="After" value_option="Hash"
value="xJv1GnJqowtC0WGdRTAAFT4FK7kf76il8A+3KI1thY0=" file_name="HRMASTER" file_library="HRLIB"
file_member="HRMASTER" timestamp="20120523203737384336" job_name="QPADEV000G"
job_user="SMITH" job_number="694320" jrn_seq="12" jrn_sys_seq="0" user_profile="SMITH"
program_name="QDZTD00001" program_library="*OMITTED"




User SMITH accessed the column SOCIAL which contains a social security
number using program QDZTD0001 which is IBM’s file editor utility. This
program was not in the list of approved applications defined by the
security administrator, thus creating this security alert.




                                            - Slide 15 -
Data Collection With SolarWinds LEM

 Industry leading log and event
  management technology
 Real-time, in memory analytics utilizing
  intelligent correlation
 Active Responses for immediate
  remediation
 High speed, high compression database
  for long term retention.
 Point, Click and Search historical analytics
 Turn Key, Virtual Appliance
LEM & Compliance
 More than 300 "audit-proven "
  compliance reports

 Comply with PCI DSS, GLBA,
  SOX, NERC CIP, HIPAA,
  and more

 Use the built-in compliance
  reporting console to easily
  create reports for internal requirements

 Easily store the massive amounts of data required for compliance

 Prevent policy violations and enforce critical compliance requirements in
  real-time

                                   - Slide 17 -
SolarWinds Log & Event Manager Demo




                   - Slide 18 -
Summary
  Logging is now a compliance mandate
  Externalizing logs from the IBM iSeries can be difficult
  SolarWinds LEM
    » Award winning log & event management solution
    » Live by lunch, easy-to-use
  Alliance LogAgent easily captures and forwards logs to LEM
  You can download Alliance LogAgent now and have it running
   in 30 minutes




                                   - Slide 19 -
Take Action Today
   Download SolarWinds Log & Event Manager
      » www.solarwinds.com/LEM_download


   Download Alliance LogAgent
      » www.townsendsecurity.com/products/logagent

   SolarWinds Contact:
      » LEM@solarwinds.com

   Townsend Security Contact:
      » info@townsendsecurity.com




                                - Slide 20 -
3 Strategies for Data Privacy Compliance: Securing Your Sensitive Data

More Related Content

What's hot

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

What's hot (20)

Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
Logicalis Security Conference
Logicalis Security ConferenceLogicalis Security Conference
Logicalis Security Conference
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 

Similar to 3 Strategies for Data Privacy Compliance: Securing Your Sensitive Data

Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 

Similar to 3 Strategies for Data Privacy Compliance: Securing Your Sensitive Data (20)

Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Intellinx.z watch
Intellinx.z watchIntellinx.z watch
Intellinx.z watch
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
SplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use CaseSplunkLive! Munich 2018: Siemens Security Use Case
SplunkLive! Munich 2018: Siemens Security Use Case
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
IBM Storage for Financial Services Institutions (1Q 2017)
IBM Storage for Financial Services Institutions (1Q 2017)IBM Storage for Financial Services Institutions (1Q 2017)
IBM Storage for Financial Services Institutions (1Q 2017)
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Five critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investmentsFive critical conditions to maximizing security intelligence investments
Five critical conditions to maximizing security intelligence investments
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 

More from SolarWinds

More from SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

3 Strategies for Data Privacy Compliance: Securing Your Sensitive Data

  • 1. Securing Your Sensitive Data SolarWinds® and Townsend Security June 13, 2012
  • 2. Broad Over 2000 Participating experience in customers Organization data security worldwide PCI Security and data Standards Council communication Strong presence in the NIST Certified AES Leadership Fortune 500 Encryption averages over 30 years IT FIPS 140-2 Certified experience Key Management
  • 3. Breaches Happen  855 Incidents, 174 million compromised records in 2011  Less than 1% of the breaches were discovered through log analysis  69% of these breaches were detectable via log evidence  Take Away: If you are monitoring your logs, you can detect a breach before data is lost - Slide 3 -
  • 4. Logging Is Now Essential  PCI Section 10 Requires Logging » Requirement 10: Track and monitor all access to network resources and cardholder data  GLBA/FFIEC Data Security » Log Transmission, Normalization, Storage, and Protection  HIPAA/HITECH Act » Log-In Monitoring & Access Controls
  • 5. State and Proposed Federal Privacy Notification  Some state laws reference PCI compliance  Nevada privacy law requires PCI compliance  Minnesota requires compliance with parts of PCI (and now WA)  New Federal privacy law in the works Modify This Footer: View -> - Slide 5 -
  • 6. Logging on the IBM iSeries Today  Not monitoring your IBM iSeries® is a big problem » It can lead to a finding of non-compliance » It can leave a breach undetected  A large national retailer lost over 45 million credit card numbers over a three-year period through poor security and inattention » Proper logging and review could have caught this - Slide 6 -
  • 7. Why Alliance LogAgent Suite?  A complete solution that can capture and forward all IBM i security events  Built by IBM i experts specifically for SIEM integration  Robust filtering capability minimizes network impact  Strong encryption between IBM i and SIEM console  Integrated user monitoring and log forward solution  Selectively monitor data access and change activity at the column or field level – without changing applications or user accounts
  • 8. What About Performance?  High performance event collection from QAUDJRN, QSYSOPR, QHST  3,500 events per second  250 Million events per day  Buffered transmission  Simultaneous collection from multiple sources
  • 9. Case Study  A large media and entertainment company with over 40 IBM i’s  PCI DSS regulations required they capture and store all logs off of the system of origination  Purchased a site license of Alliance LogAgent on a Wednesday  Installed and implemented Alliance LogAgent on all systems by the following Monday  The IBM i’s passed the PCI DSS Audit
  • 10. Townsend Security & Logging on the IBM iSeries  Alliance LogAgent™ from Townsend Security » Creates logs that SolarWinds Log & Event Manager® (LEM) can read » Forwards important information to LEM » Uses SSL/TLS encryption to secure delivery SolarWinds Log & Event Manager QSYSOPR Encrypted QAUDJRN QHST IBM iSeries Image courtesy of International Business Machines Corporation. Unauthorized use not permitted. - Slide 10 -
  • 15. Q: What can LogAgent database monitoring do? A: Help you find unauthorized access to sensitive data: <118>May 23 20:37:37 S10125BA LogAgentDB:[LGADB@0 column_name="SOCIAL" column_text="Social Security Number" SECURITY_ALERT_user_access="yes" SECURITY_ALERT_program_access="yes" data_type="A" action="Update" data_image="After" value_option="Hash" value="xJv1GnJqowtC0WGdRTAAFT4FK7kf76il8A+3KI1thY0=" file_name="HRMASTER" file_library="HRLIB" file_member="HRMASTER" timestamp="20120523203737384336" job_name="QPADEV000G" job_user="SMITH" job_number="694320" jrn_seq="12" jrn_sys_seq="0" user_profile="SMITH" program_name="QDZTD00001" program_library="*OMITTED" User SMITH accessed the column SOCIAL which contains a social security number using program QDZTD0001 which is IBM’s file editor utility. This program was not in the list of approved applications defined by the security administrator, thus creating this security alert. - Slide 15 -
  • 16. Data Collection With SolarWinds LEM  Industry leading log and event management technology  Real-time, in memory analytics utilizing intelligent correlation  Active Responses for immediate remediation  High speed, high compression database for long term retention.  Point, Click and Search historical analytics  Turn Key, Virtual Appliance
  • 17. LEM & Compliance  More than 300 "audit-proven " compliance reports  Comply with PCI DSS, GLBA, SOX, NERC CIP, HIPAA, and more  Use the built-in compliance reporting console to easily create reports for internal requirements  Easily store the massive amounts of data required for compliance  Prevent policy violations and enforce critical compliance requirements in real-time - Slide 17 -
  • 18. SolarWinds Log & Event Manager Demo - Slide 18 -
  • 19. Summary  Logging is now a compliance mandate  Externalizing logs from the IBM iSeries can be difficult  SolarWinds LEM » Award winning log & event management solution » Live by lunch, easy-to-use  Alliance LogAgent easily captures and forwards logs to LEM  You can download Alliance LogAgent now and have it running in 30 minutes - Slide 19 -
  • 20. Take Action Today  Download SolarWinds Log & Event Manager » www.solarwinds.com/LEM_download  Download Alliance LogAgent » www.townsendsecurity.com/products/logagent  SolarWinds Contact: » LEM@solarwinds.com  Townsend Security Contact: » info@townsendsecurity.com - Slide 20 -