31. User Monitoring Identity theft Compromises honest users & exposes organisations to acts of fraud & sabotage Authorised users May commit fraudulent acts & steal data whilst performing normal duties Lack of Visibility of User Activities Opens opportunities for the misuse of privileged access, bypassing of controls & general disregard for policies Known Risks
32. Magix User Monitoring Solutions User Behaviour Control Mechanisms Record all user interaction with applications & operating systems Targeted Monitoring Ensure proper management of user accounts & effective monitoring of user’s actions when using these accounts Magix Solutions
33. Magix User Monitoring Solutions Magix Solutions Intellinx is a non-invasive, real-time application monitoring solution that enables the enterprise to record, review and react to all application based activity ObserveIT audits and records all user activities performed on your server platform. Every window session on your network – whether via remote access or console access, is recorded and indexed according to usage metadata. Helps IT executives secure access to IT resources, meet the control and auditing requirements of regulatory compliance mandates, and generate the real-time reports
39. Magix Data Monitoring Solutions Implementation of controls Create policies and controls for data at rest, in use, & in motion Targeted Monitoring Confirms policy compliance & escalate violations Magix Solutions
40. Magix Data Monitoring Solutions Magix Solutions Endpoint data leakage prevention solutions that protect against corporate data loss via physical, wireless, and removable media ports Provides the ability to manage access entitlements, audit access to every file event, identify and involve data owners and find and classify sensitive and business critical data. Enables businesses to easily deploy and manage enterprise application environments to PCs
41. Magix Data Monitoring Solutions Magix Solutions FortiDB, the most comprehensive solution to secure databases and applications such as ERP, CRM, SCM and custom applications. FortiMail, proven, powerful messaging security for the most demanding messaging systems. FortiWeb, Integrated web application and XML firewalls protect web-based applications and internet-facing data from attack and data loss help you prevent identity theft, financial fraud and corporate espionage. Helps organizations automate, accelerate and secure the delivery of digital assets throughout internal and distributed IT environments. Secures data with always-on hardware encryption to meet compliance and data protection requirements
46. Magix Infrastructure Solutions Implementation of software & hardware policies Introduce controls for software and hardware configurations Management of devices Ensures ongoing compliance with corporate standards & policies Targeted Monitoring Ensures vulnerabilities and attacks are identified & mitigated Magix Solutions
47. Magix Infrastructure Solutions Magix Solutions Qualys offers a full range of on demand solutions to help security managers effectively strengthen the security of their networks, conduct automated security audits and ensure compliance with internal policies and external regulations. Provides a suite of solutions that unify real-time vulnerability, event and compliance monitoring into a single, role-based, interface for administrators, auditors and risk managers to evaluate, communicate and report needed information for effective decision making and systems management