SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
BalaBit IT Security

The logging
 company
External Challenges:
 Security Breaches
External Challenges:
Compliance Pressure to Monitor Users


                          PCI-DSS           ISO27002
 SOXā†’ COBIT           Chapter 7, 8       A.10.2
                                         Third-party service
DS5.5                 Implement Strong
                                         mngmnt
                                                               HIPAA, Basel
Security monitoring   Access Control
                                         A.10.10
                                                                II, GPG13ā€¦
DS9.2                 Chapter 10
                      Audit Access to    Monitoring user          Similar
Config.changes
                      Cardholder Data    activities            requirements!
DS11.6
                      Chapter 12         A.13.2
Securing Data
                      Maintain           Mgmt of Security
                      sec.policy for     Incidents
                      personnel
Internal Challenges:
 ā€žSuperuserā€ Fraud




       Source: BalaBit IT professionals survey, 2011
How to control?



ā€¢ Identity-management
ā€¢ Logging
ā€¢ Activity monitoring
BalaBit IT Security
                  ā€žThe syslog-ng companyā€
ā€¢ 2011 revenue: $10.3 M (35% annual growth)
ā€¢ Number of employees: 120
ā€¢ Number of customers - global:
   ā€“ commercial customers: 800
   ā€“ open source users: 850.000
ā€¢ 12 years experience in IT Security
ā€¢ Global partner network, 80+ partners in 30+ countries
ā€¢ Awarded to Deloitte Technology Fast 500 and Fast 50 Lists (2010)
syslog-ng Description
ā€¢ IT environments constantly generate
  important data in log messages
ā€¢ syslog-ng
    ā€¢ Collects
    ā€¢ Filters
    ā€¢ Classifies
    ā€¢ Normalizes
    ā€¢ Stores
    ā€¢ Transfers
ā€¢ syslog-ng is not a log analysis tool but it is
  essential to analysis



                                                   8
Product Family
ā€¢ syslog-ng Open Source Edition
   ā€¢   Leader since 1998, de facto standard in 2001
   ā€¢   Large, world-wide community
ā€¢ syslog-ng Premium Edition
   ā€¢   Commercial version
   ā€¢   Additional features
   ā€¢   Professional support
ā€¢ syslog-ng Store Box
   ā€¢   Turnkey appliance
   ā€¢   Index, search, reporting
   ā€¢   Professional support



                                                      9
syslog-ng Open Source Edition
ā€¢ Key Features
   ā€¢   Flexible message filtering and re-writing
   ā€¢   Pattern-based classification
   ā€¢   Secure log transfer via SSL/TLS
   ā€¢   Flow-control ā€“ adaptive message rate control
   ā€¢   High speed processing > 650k/sec
ā€¢ Community
   ā€¢   100,000s of users worldwide
   ā€¢   Well know by system admins
   ā€¢   Included in 3rd party devices
   ā€¢   Custom add-ons




                                                      10
syslog-ng Premium Edition

ā€¢ Additional Features
   ā€¢ Zero Message Loss
      ā€¢ Reliable Log Transfer Protocol (RLTP)
      ā€¢ Client side failover
      ā€¢ Disk buffer
   ā€¢ Encrypted log storage
   ā€¢ SQL source and destination support
   ā€¢ Windows support
   ā€¢ Support for more than 50 server
     platforms
ā€¢ Professional Support


                                                11
Customers
Logging is not enoughā€¦
1. Several security events are not logged!
                                                The User Monitoring ā€žPyramidā€
2. Logs typically do not show what was done.
3. Logs often show only obscure techn. details.

                                                             Activity Records -
                                                             security camera




                                                             System logs -
                                                             snapshots
Key questions to answerā€¦
Can you ensure the accountability of your IT staff?

   Can you monitor the actions of your ā€žsuperusersā€?

     Can you reliably control your outsourcing partners?

      Do you really know ā€žwho access whatā€ on servers?

     Can you conduct quick and cheap audits at your company?

   Can you present bullet-proof evidence in legal proceedings?

Are you sure youā€™d pass audits concerning user monitoring?
IT Staff
                   Privileged Activity Monitoring
                          by Shell Control Box
Outsourcing
partners




Managers




                                                 ā€¢   Firewall,
VDI users
                                                 ā€¢   Network devices,
                                                 ā€¢   Databases,
                                                 ā€¢   Web/file servers,
                                                 ā€¢   Citrix serverā€¦
Privileged Activity Monitoring by
          BalaBit Shell Control Box
Shell Control Box (SCB) is an
appliance that controls privileged
access to remote systems and
records the activities into searchable
and re-playable movie-like audit
trails.
Access Control
Security & compliance benefits:

ā€¢ Central access control gateway
ā€¢ Multi-protocol support - SSH,
  RDP, VNC, Telnet, Citrix, etc.
ā€¢ Sub-channel control
  (e.g. file transfer)
ā€¢ Access by time policy
ā€¢ 4-eyes authorization
ā€¢ Real-time access monitoring


Key Benefit: GRANULAR ACCESS POLICY ENFORCEMENT!
Real-time alerting (& blocking)
Security & compliance benefits:

ā€¢ Alerts for monitoring tools
ā€¢ Alerts for supervisors
Coming in :
ā€¢ Terminates session if risky action
ā€¢ Risky actions are customizable
  (e.g. failed login, program execution,
  credit card numberā€¦)



Key Benefit: IMMIDIATE REACTION ON CRITICAL EVENTS!
Audit & Forensics
Security & compliance benefits:

ā€¢   Real-time activity monitoring
ā€¢   Tamper-proof, HQ audit trails
ā€¢   Movie-like playback & search
ā€¢   File transfer audit
ā€¢   Independent, transparent audit device




Key Benefit: INDEPENDENT TOOL FOR QUICK AUDITS & FORENSICS!
Big SCB Users
Conclusion
    Benefits for business
Faster ROI
ā€¢   Faster and higher quality audits
ā€¢   Lower troubleshooting and forensics costs
ā€¢   Centralized authentication & access control
ā€¢   Complete solution for user monitoring


Lower risk
ā€¢   Improved regulatory and industry compliance
ā€¢   Better employee/partner control
ā€¢   Improved accountability of staff
ā€¢   Bullet-proof evidence in legal proceedings
ā€¢   Setting technical and psychological barrier
Thank you for your attention!

         GĆ”bor ParĆ³czi
         Sales Manager
   gabor.paroczi@balabit.com




                                25

Weitere Ƥhnliche Inhalte

Was ist angesagt?

What's New in EventLog Analyzer - Log Management Software
What's New in EventLog Analyzer - Log Management SoftwareWhat's New in EventLog Analyzer - Log Management Software
What's New in EventLog Analyzer - Log Management SoftwareManageEngine EventLog Analyzer
Ā 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
Ā 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
Ā 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
Ā 
P2PE - PCI DSS
P2PE - PCI DSSP2PE - PCI DSS
P2PE - PCI DSSControlCase
Ā 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
Ā 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log managementBrian Honan
Ā 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin PrivilegesBeyondTrust
Ā 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
Ā 
TƤnased vƵimalused turvalahendustes - Tarvi Tara
TƤnased vƵimalused turvalahendustes - Tarvi TaraTƤnased vƵimalused turvalahendustes - Tarvi Tara
TƤnased vƵimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
Ā 
ManageEngine EventLog Analyzer v7. 2
ManageEngine EventLog Analyzer v7. 2ManageEngine EventLog Analyzer v7. 2
ManageEngine EventLog Analyzer v7. 2Ragavan Seetharaman
Ā 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNarudom Roongsiriwong, CISSP
Ā 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Webroot
Ā 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinAnton Chuvakin
Ā 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
Ā 
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical DesignsvBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical DesignsLarus Hjartarson
Ā 
The Tools and Machinery behind the curtain
The Tools and Machinery behind the curtainThe Tools and Machinery behind the curtain
The Tools and Machinery behind the curtainJan Van Bruaene
Ā 

Was ist angesagt? (20)

What's New in EventLog Analyzer - Log Management Software
What's New in EventLog Analyzer - Log Management SoftwareWhat's New in EventLog Analyzer - Log Management Software
What's New in EventLog Analyzer - Log Management Software
Ā 
Round table guide
Round table guideRound table guide
Round table guide
Ā 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
Ā 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
Ā 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
Ā 
P2PE - PCI DSS
P2PE - PCI DSSP2PE - PCI DSS
P2PE - PCI DSS
Ā 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
Ā 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
Ā 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
Ā 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
Ā 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
Ā 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Ā 
TƤnased vƵimalused turvalahendustes - Tarvi Tara
TƤnased vƵimalused turvalahendustes - Tarvi TaraTƤnased vƵimalused turvalahendustes - Tarvi Tara
TƤnased vƵimalused turvalahendustes - Tarvi Tara
Ā 
ManageEngine EventLog Analyzer v7. 2
ManageEngine EventLog Analyzer v7. 2ManageEngine EventLog Analyzer v7. 2
ManageEngine EventLog Analyzer v7. 2
Ā 
National Digital ID Platform Technical Forum
National Digital ID Platform Technical ForumNational Digital ID Platform Technical Forum
National Digital ID Platform Technical Forum
Ā 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.
Ā 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Ā 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
Ā 
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical DesignsvBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
Ā 
The Tools and Machinery behind the curtain
The Tools and Machinery behind the curtainThe Tools and Machinery behind the curtain
The Tools and Machinery behind the curtain
Ā 

Andere mochten auch

WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
WebLogic Server auf ODA: Erfahrungen aus einem KundenprojektWebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
WebLogic Server auf ODA: Erfahrungen aus einem KundenprojektOPITZ CONSULTING Deutschland
Ā 
Resume example #6
Resume example #6Resume example #6
Resume example #6rightfoot
Ā 
Pograma jornadas confluencia.v.f
Pograma jornadas confluencia.v.fPograma jornadas confluencia.v.f
Pograma jornadas confluencia.v.fEncarna Lago
Ā 
Oracle Database Backup Service
Oracle Database Backup ServiceOracle Database Backup Service
Oracle Database Backup ServiceTrivadis
Ā 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
Ā 
Co je novƩho v XenDesktop 7.6 a XenApp 7.6
Co je novƩho v XenDesktop 7.6 a XenApp 7.6 Co je novƩho v XenDesktop 7.6 a XenApp 7.6
Co je novƩho v XenDesktop 7.6 a XenApp 7.6 MarketingArrowECS_CZ
Ā 
#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...
#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...
#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...Altima x Konversion
Ā 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
Ā 
ExploraciĆ³n herramientas multimedia
ExploraciĆ³n herramientas multimediaExploraciĆ³n herramientas multimedia
ExploraciĆ³n herramientas multimediaJeckson Loza
Ā 
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2Lee Bushen
Ā 
Virtualizace datovĆ½ch center
Virtualizace datovĆ½ch centerVirtualizace datovĆ½ch center
Virtualizace datovĆ½ch centerMarketingArrowECS_CZ
Ā 
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Citrix
Ā 
XenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureXenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureMarketingArrowECS_CZ
Ā 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreatHammerNJ
Ā 
G2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©ho
G2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©hoG2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©ho
G2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©hoMarketingArrowECS_CZ
Ā 
Oracle Database Backup Cloud Service
Oracle Database Backup Cloud ServiceOracle Database Backup Cloud Service
Oracle Database Backup Cloud ServiceMarketingArrowECS_CZ
Ā 
Oracle Database Appliance Workshop
Oracle Database Appliance WorkshopOracle Database Appliance Workshop
Oracle Database Appliance WorkshopMarketingArrowECS_CZ
Ā 

Andere mochten auch (20)

Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
Ā 
WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
WebLogic Server auf ODA: Erfahrungen aus einem KundenprojektWebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
Ā 
Resume example #6
Resume example #6Resume example #6
Resume example #6
Ā 
Pograma jornadas confluencia.v.f
Pograma jornadas confluencia.v.fPograma jornadas confluencia.v.f
Pograma jornadas confluencia.v.f
Ā 
Oracle Database Backup Service
Oracle Database Backup ServiceOracle Database Backup Service
Oracle Database Backup Service
Ā 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
Ā 
Co je novƩho v XenDesktop 7.6 a XenApp 7.6
Co je novƩho v XenDesktop 7.6 a XenApp 7.6 Co je novƩho v XenDesktop 7.6 a XenApp 7.6
Co je novƩho v XenDesktop 7.6 a XenApp 7.6
Ā 
Security automation
Security automationSecurity automation
Security automation
Ā 
Contrail Demo
Contrail DemoContrail Demo
Contrail Demo
Ā 
#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...
#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...
#RDVecom : Felix Averlant, Digital Performance Strategist, altimaĀ° North Amer...
Ā 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
Ā 
ExploraciĆ³n herramientas multimedia
ExploraciĆ³n herramientas multimediaExploraciĆ³n herramientas multimedia
ExploraciĆ³n herramientas multimedia
Ā 
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Ā 
Virtualizace datovĆ½ch center
Virtualizace datovĆ½ch centerVirtualizace datovĆ½ch center
Virtualizace datovĆ½ch center
Ā 
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
Ā 
XenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureXenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of future
Ā 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
Ā 
G2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©ho
G2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©hoG2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©ho
G2 server - Cloud nenĆ­ vhodnĆ½ pro každĆ©ho
Ā 
Oracle Database Backup Cloud Service
Oracle Database Backup Cloud ServiceOracle Database Backup Cloud Service
Oracle Database Backup Cloud Service
Ā 
Oracle Database Appliance Workshop
Oracle Database Appliance WorkshopOracle Database Appliance Workshop
Oracle Database Appliance Workshop
Ā 

Ƅhnlich wie DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

Intellinx.z watch
Intellinx.z watchIntellinx.z watch
Intellinx.z watchJim Porell
Ā 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Shahar Geiger Maor
Ā 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
Ā 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
Ā 
iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016Raz-Lee Security
Ā 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
Ā 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
Ā 
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...apidays
Ā 
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Downtime is Not an Option: Integrating IBM Z into ServiceNow and SplunkDowntime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Downtime is Not an Option: Integrating IBM Z into ServiceNow and SplunkPrecisely
Ā 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
Ā 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
Ā 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
Ā 
The user s identities
The user s identitiesThe user s identities
The user s identitiesGiuliano Latini
Ā 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
Ā 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
Ā 
2023-09-28 aMS Montpellier CIS 365.pdf
2023-09-28 aMS Montpellier CIS 365.pdf2023-09-28 aMS Montpellier CIS 365.pdf
2023-09-28 aMS Montpellier CIS 365.pdfClƩment SERAFIN
Ā 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai WƤhner
Ā 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
Ā 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewallxKinAnx
Ā 

Ƅhnlich wie DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging (20)

Intellinx.z watch
Intellinx.z watchIntellinx.z watch
Intellinx.z watch
Ā 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
Ā 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
Ā 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
Ā 
iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016
Ā 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Ā 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
Ā 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
Ā 
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
Ā 
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Downtime is Not an Option: Integrating IBM Z into ServiceNow and SplunkDowntime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Ā 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Ā 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Ā 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Ā 
The user s identities
The user s identitiesThe user s identities
The user s identities
Ā 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
Ā 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Ā 
2023-09-28 aMS Montpellier CIS 365.pdf
2023-09-28 aMS Montpellier CIS 365.pdf2023-09-28 aMS Montpellier CIS 365.pdf
2023-09-28 aMS Montpellier CIS 365.pdf
Ā 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Ā 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
Ā 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
Ā 

Mehr von Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
Ā 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
Ā 
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...Andris Soroka
Ā 
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
Ā 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
Ā 
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
Ā 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
Ā 
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...Andris Soroka
Ā 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
Ā 
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi Andris Soroka
Ā 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
Ā 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
Ā 
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...Andris Soroka
Ā 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
Ā 
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...Andris Soroka
Ā 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
Ā 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
Ā 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
Ā 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
Ā 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
Ā 

Mehr von Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Ā 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Ā 
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis VÄ«toliņŔ - Gaisa kuÄ£u pasažieru datu apstrā...
Ā 
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - LÄ«va Aleksejeva - LIELIE DATI un personas datu ...
Ā 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Ā 
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB ā€œBULLETā€ - Ivo Krievs - Vai uz valsti attiecināmi cit...
Ā 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Ā 
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris KļaviņŔ - GDPR - Kādus izdevumus un riskus ...
Ā 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Ā 
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints PuŔkundzis - Personas datu apstrādes līgumi
Ā 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Ā 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Ā 
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis KauŔs - Clearswift - Komunikā...
Ā 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Ā 
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms KrÅ«miņŔ - Personas datu regulas (EU GDPR) ...
Ā 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Ā 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Ā 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Ā 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Ā 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Ā 

KĆ¼rzlich hochgeladen

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
Ā 
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹Bhuvaneswari Subramani
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vƔzquez
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
Ā 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
Ā 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
Ā 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
Ā 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
Ā 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
Ā 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Ā 
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
Ā 

KĆ¼rzlich hochgeladen (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Ā 
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Elevate Developer Efficiency & build GenAI Application with Amazon Qā€‹
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ā 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Ā 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Ā 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Ā 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Ā 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Ā 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Ā 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ā 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Ā 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls šŸ„° 8617370543 Service Offer VIP Hot Model
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Ā 

DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

  • 1. BalaBit IT Security The logging company
  • 3. External Challenges: Compliance Pressure to Monitor Users PCI-DSS ISO27002 SOXā†’ COBIT Chapter 7, 8 A.10.2 Third-party service DS5.5 Implement Strong mngmnt HIPAA, Basel Security monitoring Access Control A.10.10 II, GPG13ā€¦ DS9.2 Chapter 10 Audit Access to Monitoring user Similar Config.changes Cardholder Data activities requirements! DS11.6 Chapter 12 A.13.2 Securing Data Maintain Mgmt of Security sec.policy for Incidents personnel
  • 4. Internal Challenges: ā€žSuperuserā€ Fraud Source: BalaBit IT professionals survey, 2011
  • 5. How to control? ā€¢ Identity-management ā€¢ Logging ā€¢ Activity monitoring
  • 6. BalaBit IT Security ā€žThe syslog-ng companyā€ ā€¢ 2011 revenue: $10.3 M (35% annual growth) ā€¢ Number of employees: 120 ā€¢ Number of customers - global: ā€“ commercial customers: 800 ā€“ open source users: 850.000 ā€¢ 12 years experience in IT Security ā€¢ Global partner network, 80+ partners in 30+ countries ā€¢ Awarded to Deloitte Technology Fast 500 and Fast 50 Lists (2010)
  • 7. syslog-ng Description ā€¢ IT environments constantly generate important data in log messages ā€¢ syslog-ng ā€¢ Collects ā€¢ Filters ā€¢ Classifies ā€¢ Normalizes ā€¢ Stores ā€¢ Transfers ā€¢ syslog-ng is not a log analysis tool but it is essential to analysis 8
  • 8. Product Family ā€¢ syslog-ng Open Source Edition ā€¢ Leader since 1998, de facto standard in 2001 ā€¢ Large, world-wide community ā€¢ syslog-ng Premium Edition ā€¢ Commercial version ā€¢ Additional features ā€¢ Professional support ā€¢ syslog-ng Store Box ā€¢ Turnkey appliance ā€¢ Index, search, reporting ā€¢ Professional support 9
  • 9. syslog-ng Open Source Edition ā€¢ Key Features ā€¢ Flexible message filtering and re-writing ā€¢ Pattern-based classification ā€¢ Secure log transfer via SSL/TLS ā€¢ Flow-control ā€“ adaptive message rate control ā€¢ High speed processing > 650k/sec ā€¢ Community ā€¢ 100,000s of users worldwide ā€¢ Well know by system admins ā€¢ Included in 3rd party devices ā€¢ Custom add-ons 10
  • 10. syslog-ng Premium Edition ā€¢ Additional Features ā€¢ Zero Message Loss ā€¢ Reliable Log Transfer Protocol (RLTP) ā€¢ Client side failover ā€¢ Disk buffer ā€¢ Encrypted log storage ā€¢ SQL source and destination support ā€¢ Windows support ā€¢ Support for more than 50 server platforms ā€¢ Professional Support 11
  • 12. Logging is not enoughā€¦ 1. Several security events are not logged! The User Monitoring ā€žPyramidā€ 2. Logs typically do not show what was done. 3. Logs often show only obscure techn. details. Activity Records - security camera System logs - snapshots
  • 13. Key questions to answerā€¦ Can you ensure the accountability of your IT staff? Can you monitor the actions of your ā€žsuperusersā€? Can you reliably control your outsourcing partners? Do you really know ā€žwho access whatā€ on servers? Can you conduct quick and cheap audits at your company? Can you present bullet-proof evidence in legal proceedings? Are you sure youā€™d pass audits concerning user monitoring?
  • 14. IT Staff Privileged Activity Monitoring by Shell Control Box Outsourcing partners Managers ā€¢ Firewall, VDI users ā€¢ Network devices, ā€¢ Databases, ā€¢ Web/file servers, ā€¢ Citrix serverā€¦
  • 15. Privileged Activity Monitoring by BalaBit Shell Control Box Shell Control Box (SCB) is an appliance that controls privileged access to remote systems and records the activities into searchable and re-playable movie-like audit trails.
  • 16. Access Control Security & compliance benefits: ā€¢ Central access control gateway ā€¢ Multi-protocol support - SSH, RDP, VNC, Telnet, Citrix, etc. ā€¢ Sub-channel control (e.g. file transfer) ā€¢ Access by time policy ā€¢ 4-eyes authorization ā€¢ Real-time access monitoring Key Benefit: GRANULAR ACCESS POLICY ENFORCEMENT!
  • 17. Real-time alerting (& blocking) Security & compliance benefits: ā€¢ Alerts for monitoring tools ā€¢ Alerts for supervisors Coming in : ā€¢ Terminates session if risky action ā€¢ Risky actions are customizable (e.g. failed login, program execution, credit card numberā€¦) Key Benefit: IMMIDIATE REACTION ON CRITICAL EVENTS!
  • 18. Audit & Forensics Security & compliance benefits: ā€¢ Real-time activity monitoring ā€¢ Tamper-proof, HQ audit trails ā€¢ Movie-like playback & search ā€¢ File transfer audit ā€¢ Independent, transparent audit device Key Benefit: INDEPENDENT TOOL FOR QUICK AUDITS & FORENSICS!
  • 20. Conclusion Benefits for business Faster ROI ā€¢ Faster and higher quality audits ā€¢ Lower troubleshooting and forensics costs ā€¢ Centralized authentication & access control ā€¢ Complete solution for user monitoring Lower risk ā€¢ Improved regulatory and industry compliance ā€¢ Better employee/partner control ā€¢ Improved accountability of staff ā€¢ Bullet-proof evidence in legal proceedings ā€¢ Setting technical and psychological barrier
  • 21. Thank you for your attention! GĆ”bor ParĆ³czi Sales Manager gabor.paroczi@balabit.com 25