SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
The Secret Life of Your
Network:
Threats Lurking in Your Data Center9
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
1. ZOMBIE SERVERS
Forget those lightweights on the Walking Dead – the
real zombies to be concerned about are zombie servers.
• Zombie servers, a.k.a. servers that are unused
or underutilized, number over 10 million
globally. Keeping them running requires the
equivalent amount of energy required to
power all the homes in the city of Chicago.
• Zombie servers are notoriously hard to
identify and destroy. Defeating them requires
powerful tools that go beyond a single metric
to look for servers with few network
connections to other systems, then assess
what software (if any) is running on those
systems, and then compare those results both
in real-time and as long-term trends.
© copyright 2017 BMC Software, Inc.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
2. MALICIOUS SOFTWARE
If zombie servers are the walking dead of the data
center world, malicious software is the axe-wielding
murderer who is very much alive.
• No matter how secure your networks, new and
evolving threat vectors can still manage to
penetrate your walls. Withstanding malicious
software threats is a battle of vigilance.
• The best defense is offense. With a clear view into
all of your assets, you can identify which systems or
applications are affected by vulnerabilities found by
your security management tool.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
3. LOOMING OUTAGES
Not all threats are nefarious; sometimes
components of your infrastructure simply break,
wear down, or overload.
• The key to these data center disruptors is
early detection. If you know which systems
are showing symptoms, you can prevent
outages from impacting your business.
• If an outage does occur, it’s helpful to have
tools that pinpoint which applications are
affected so you can mitigate the impact.
© copyright 2017 BMC Software, Inc.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
4. COMPLIANCE
VULNERABILITIES
Like signs of a looming outage, compliance
vulnerabilities are a harbinger of bad things to come.
• Internal and regulatory compliance
requirements demand consistent and
frequent assessment and documentation of
your asset inventory, including each asset’s
business function. Without that view, you’re
open to threats of a different kind - including
audits, fees, and sanctions.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
5. VERSION SPRAWL
Like wayward clones, your software has a tendency
to replicate itself into a resource-sucking army.
• You may be hosting countless versions of the
same piece of software due to inconsistent
upgrades or failure to address outdated
versions. These clones are not necessarily evil,
but they do consume a surprising amount of
unnecessary space and energy that should be
dedicated to more valuable assets.
• Version sprawl is expensive too - each
software clone is costing your company
unnecessary money.
© copyright 2017 BMC Software, Inc.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
6. SERVERS REACHING
STORAGE CAPACITY
Servers that aren’t zombies yet, could become
zombies soon. Which one is next?
• Functional (non-zombie) servers must still be
watched carefully to keep them safe from the
dark side. Without regular assessment, servers
can quickly reach capacity unbeknownst to
your team, resulting in downtime and
headaches that you can’t afford.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
7. BACKDOOR ENTRY
POINTS
To wreak their havoc, bad guys must be able to get
in. Your data center may be hosting unlocked doors
and windows just waiting to be breached.
• It’s critical to understand where your weak
points are and whether business applications
are running on vulnerable systems so that you
can properly secure your defenses. This may
include identifying unpatched systems,
locating servers that are listening on
unwanted service ports, or flagging
dependencies associated to vulnerabilities.
• When (not if) attacks or disruptions occur, you
also need to be able to prioritize fixes to get
your most important assets back online fast.
© copyright 2017 BMC Software, Inc.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
8. UNAUTHORIZED
SOFTWARE
“Shadow IT”… it sounds sinister, and it is.
• Every time someone in your organization goes it
alone and downloads an app, you face a
potential security threat.
• The risks of unauthorized software has only
grown with the consumerization of IT, and
therefore so has the need to detect these rogue
operators before they become a problem.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
BMC Confidential
9. OUT-OF-SUPPORT OS
These systems are the ghosts of the data center
world: they’re no longer alive, but are still stuck in
our dimension.
• Lack of support doesn’t just mean that the
company won’t answer your phone calls, it
means that vital things like security patches
no longer exist. That means that these ghosts
can turn evil at any moment.
© copyright 2017 BMC Software, Inc.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
CHOOSE YOUR WEAPON
All of these threats present a real risk to your business – but they can also be vanquished.
Choose your weapon of choice wisely…
Visibility Speed Accuracy Insight
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
WISE CHOICE
Asset discovery and application dependency mapping tools like BMC Discovery combat the
menaces to your data center by giving you up-to-date, holistic views of all your data center
assets and the relationships between them.
Visibility Speed Accuracy Insight
BMC
Discovery
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
DISCOVER WHAT IS LURKING…
BMC Discovery gives you the weapons – visibility,
accuracy, speed, and insight – that you need to
understand the threats to your system so that you can
defeat them.
With BMC Discovery, the secret world of your data center
won’t be so secret after all.
Banish the cobwebs and bring on the sunshine.
Try BMC Discovery now.
Try Discovery online or
download to scan 100 of your
own assets now.
© copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only
About BMC
BMC, BMC Software, the BMC logo, and the BMC Software logo, and all other BMC Software product and service names are owned by BMC Software, Inc. and are registered or pending registration in the US Patent and Trademark Office
or in the trademark offices of other countries. All other trademarks belong to their respective companies. © Copyright 2017 BMC Software, Inc.
BMC – Bring IT to Life BMC digital IT transforms 82% of the Fortune 500®.
BMC is a global leader in innovative software solutions that enable businesses to transform into digital for the ultimate
competitive advantage. Our Digital Enterprise Management solutions are designed to fast track digital business from
mainframe to mobile to cloud and beyond

Weitere ähnliche Inhalte

Mehr von BMC Software

MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2® MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2® BMC Software
 
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthDigital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthBMC Software
 
Salesforce Lightning Process Builder IS the next-generation workflow tool
Salesforce Lightning Process Builder IS the next-generation workflow toolSalesforce Lightning Process Builder IS the next-generation workflow tool
Salesforce Lightning Process Builder IS the next-generation workflow toolBMC Software
 
Remedyforce Localization and Translation
Remedyforce Localization and TranslationRemedyforce Localization and Translation
Remedyforce Localization and TranslationBMC Software
 
What Do Executives Need to Do to Go Digital?
What Do Executives Need to Do to Go Digital?What Do Executives Need to Do to Go Digital?
What Do Executives Need to Do to Go Digital?BMC Software
 
Curating Your Digital Workplace: Key Steps for IT
Curating Your Digital Workplace: Key Steps for ITCurating Your Digital Workplace: Key Steps for IT
Curating Your Digital Workplace: Key Steps for ITBMC Software
 
Delivering the Digital Workplace Without the Chaos
Delivering the Digital Workplace Without the ChaosDelivering the Digital Workplace Without the Chaos
Delivering the Digital Workplace Without the ChaosBMC Software
 
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppSalesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppBMC Software
 
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...BMC Software
 
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...BMC Software
 
Next Generation Technology Utility Benchmarks
Next Generation Technology Utility BenchmarksNext Generation Technology Utility Benchmarks
Next Generation Technology Utility BenchmarksBMC Software
 
How to Manage MLC Costs to Optimize the Mainframe
How to Manage MLC Costs to Optimize the MainframeHow to Manage MLC Costs to Optimize the Mainframe
How to Manage MLC Costs to Optimize the MainframeBMC Software
 
User Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceUser Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceBMC Software
 
IT Managers Answer Questions about the Future of the Digital Economy
IT Managers Answer Questions about the Future of the Digital EconomyIT Managers Answer Questions about the Future of the Digital Economy
IT Managers Answer Questions about the Future of the Digital EconomyBMC Software
 
BMC Remedyforce vs Other IT Service Management
BMC Remedyforce vs Other IT Service ManagementBMC Remedyforce vs Other IT Service Management
BMC Remedyforce vs Other IT Service ManagementBMC Software
 
3. ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...
3.	ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...3.	ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...
3. ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...BMC Software
 
Leverage your Salesforce Force.com Platform with Remedyforce Cloud ITSM
Leverage your Salesforce Force.com Platform with Remedyforce Cloud ITSMLeverage your Salesforce Force.com Platform with Remedyforce Cloud ITSM
Leverage your Salesforce Force.com Platform with Remedyforce Cloud ITSMBMC Software
 
Improving IT Skills the Right Way
Improving IT Skills the Right WayImproving IT Skills the Right Way
Improving IT Skills the Right WayBMC Software
 
How Big Data and Hadoop Integrated into BMC ControlM at CARFAX
How Big Data and Hadoop Integrated into BMC ControlM at CARFAXHow Big Data and Hadoop Integrated into BMC ControlM at CARFAX
How Big Data and Hadoop Integrated into BMC ControlM at CARFAXBMC Software
 
The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...
The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...
The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...BMC Software
 

Mehr von BMC Software (20)

MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2® MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
MasterCard Optimizes Big Data Management with BMC High Speed Utilities for DB2®
 
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential GrowthDigital Transformation Playbook: Guide to Unleashing Exponential Growth
Digital Transformation Playbook: Guide to Unleashing Exponential Growth
 
Salesforce Lightning Process Builder IS the next-generation workflow tool
Salesforce Lightning Process Builder IS the next-generation workflow toolSalesforce Lightning Process Builder IS the next-generation workflow tool
Salesforce Lightning Process Builder IS the next-generation workflow tool
 
Remedyforce Localization and Translation
Remedyforce Localization and TranslationRemedyforce Localization and Translation
Remedyforce Localization and Translation
 
What Do Executives Need to Do to Go Digital?
What Do Executives Need to Do to Go Digital?What Do Executives Need to Do to Go Digital?
What Do Executives Need to Do to Go Digital?
 
Curating Your Digital Workplace: Key Steps for IT
Curating Your Digital Workplace: Key Steps for ITCurating Your Digital Workplace: Key Steps for IT
Curating Your Digital Workplace: Key Steps for IT
 
Delivering the Digital Workplace Without the Chaos
Delivering the Digital Workplace Without the ChaosDelivering the Digital Workplace Without the Chaos
Delivering the Digital Workplace Without the Chaos
 
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your AppSalesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
Salesforce and Remedyforce ISV Tech Talk: Pushing New Versions of your App
 
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
Data Migration for Remedyforce SaaS Help Desk and High-Speed Digital Service ...
 
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
Data Segregation for Remedyforce SaaS Help Desk and High-Speed Digital Servic...
 
Next Generation Technology Utility Benchmarks
Next Generation Technology Utility BenchmarksNext Generation Technology Utility Benchmarks
Next Generation Technology Utility Benchmarks
 
How to Manage MLC Costs to Optimize the Mainframe
How to Manage MLC Costs to Optimize the MainframeHow to Manage MLC Costs to Optimize the Mainframe
How to Manage MLC Costs to Optimize the Mainframe
 
User Creation and Authentication in Remedyforce
User Creation and Authentication in RemedyforceUser Creation and Authentication in Remedyforce
User Creation and Authentication in Remedyforce
 
IT Managers Answer Questions about the Future of the Digital Economy
IT Managers Answer Questions about the Future of the Digital EconomyIT Managers Answer Questions about the Future of the Digital Economy
IT Managers Answer Questions about the Future of the Digital Economy
 
BMC Remedyforce vs Other IT Service Management
BMC Remedyforce vs Other IT Service ManagementBMC Remedyforce vs Other IT Service Management
BMC Remedyforce vs Other IT Service Management
 
3. ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...
3.	ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...3.	ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...
3. ITIL Categorization for Remedyforce- An Evolution into Service Desk Self S...
 
Leverage your Salesforce Force.com Platform with Remedyforce Cloud ITSM
Leverage your Salesforce Force.com Platform with Remedyforce Cloud ITSMLeverage your Salesforce Force.com Platform with Remedyforce Cloud ITSM
Leverage your Salesforce Force.com Platform with Remedyforce Cloud ITSM
 
Improving IT Skills the Right Way
Improving IT Skills the Right WayImproving IT Skills the Right Way
Improving IT Skills the Right Way
 
How Big Data and Hadoop Integrated into BMC ControlM at CARFAX
How Big Data and Hadoop Integrated into BMC ControlM at CARFAXHow Big Data and Hadoop Integrated into BMC ControlM at CARFAX
How Big Data and Hadoop Integrated into BMC ControlM at CARFAX
 
The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...
The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...
The Human Factor: Five Tips for Creating the Quintessential Hybrid IT Profess...
 

Kürzlich hochgeladen

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Kürzlich hochgeladen (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

9 Cyber Security Threats Lurking in Your Data Center

  • 1. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only The Secret Life of Your Network: Threats Lurking in Your Data Center9
  • 2. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 1. ZOMBIE SERVERS Forget those lightweights on the Walking Dead – the real zombies to be concerned about are zombie servers. • Zombie servers, a.k.a. servers that are unused or underutilized, number over 10 million globally. Keeping them running requires the equivalent amount of energy required to power all the homes in the city of Chicago. • Zombie servers are notoriously hard to identify and destroy. Defeating them requires powerful tools that go beyond a single metric to look for servers with few network connections to other systems, then assess what software (if any) is running on those systems, and then compare those results both in real-time and as long-term trends. © copyright 2017 BMC Software, Inc.
  • 3. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 2. MALICIOUS SOFTWARE If zombie servers are the walking dead of the data center world, malicious software is the axe-wielding murderer who is very much alive. • No matter how secure your networks, new and evolving threat vectors can still manage to penetrate your walls. Withstanding malicious software threats is a battle of vigilance. • The best defense is offense. With a clear view into all of your assets, you can identify which systems or applications are affected by vulnerabilities found by your security management tool.
  • 4. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 3. LOOMING OUTAGES Not all threats are nefarious; sometimes components of your infrastructure simply break, wear down, or overload. • The key to these data center disruptors is early detection. If you know which systems are showing symptoms, you can prevent outages from impacting your business. • If an outage does occur, it’s helpful to have tools that pinpoint which applications are affected so you can mitigate the impact. © copyright 2017 BMC Software, Inc.
  • 5. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 4. COMPLIANCE VULNERABILITIES Like signs of a looming outage, compliance vulnerabilities are a harbinger of bad things to come. • Internal and regulatory compliance requirements demand consistent and frequent assessment and documentation of your asset inventory, including each asset’s business function. Without that view, you’re open to threats of a different kind - including audits, fees, and sanctions.
  • 6. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 5. VERSION SPRAWL Like wayward clones, your software has a tendency to replicate itself into a resource-sucking army. • You may be hosting countless versions of the same piece of software due to inconsistent upgrades or failure to address outdated versions. These clones are not necessarily evil, but they do consume a surprising amount of unnecessary space and energy that should be dedicated to more valuable assets. • Version sprawl is expensive too - each software clone is costing your company unnecessary money. © copyright 2017 BMC Software, Inc.
  • 7. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 6. SERVERS REACHING STORAGE CAPACITY Servers that aren’t zombies yet, could become zombies soon. Which one is next? • Functional (non-zombie) servers must still be watched carefully to keep them safe from the dark side. Without regular assessment, servers can quickly reach capacity unbeknownst to your team, resulting in downtime and headaches that you can’t afford.
  • 8. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 7. BACKDOOR ENTRY POINTS To wreak their havoc, bad guys must be able to get in. Your data center may be hosting unlocked doors and windows just waiting to be breached. • It’s critical to understand where your weak points are and whether business applications are running on vulnerable systems so that you can properly secure your defenses. This may include identifying unpatched systems, locating servers that are listening on unwanted service ports, or flagging dependencies associated to vulnerabilities. • When (not if) attacks or disruptions occur, you also need to be able to prioritize fixes to get your most important assets back online fast. © copyright 2017 BMC Software, Inc.
  • 9. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 8. UNAUTHORIZED SOFTWARE “Shadow IT”… it sounds sinister, and it is. • Every time someone in your organization goes it alone and downloads an app, you face a potential security threat. • The risks of unauthorized software has only grown with the consumerization of IT, and therefore so has the need to detect these rogue operators before they become a problem.
  • 10. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only BMC Confidential 9. OUT-OF-SUPPORT OS These systems are the ghosts of the data center world: they’re no longer alive, but are still stuck in our dimension. • Lack of support doesn’t just mean that the company won’t answer your phone calls, it means that vital things like security patches no longer exist. That means that these ghosts can turn evil at any moment. © copyright 2017 BMC Software, Inc.
  • 11. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only CHOOSE YOUR WEAPON All of these threats present a real risk to your business – but they can also be vanquished. Choose your weapon of choice wisely… Visibility Speed Accuracy Insight
  • 12. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only WISE CHOICE Asset discovery and application dependency mapping tools like BMC Discovery combat the menaces to your data center by giving you up-to-date, holistic views of all your data center assets and the relationships between them. Visibility Speed Accuracy Insight BMC Discovery
  • 13. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only DISCOVER WHAT IS LURKING… BMC Discovery gives you the weapons – visibility, accuracy, speed, and insight – that you need to understand the threats to your system so that you can defeat them. With BMC Discovery, the secret world of your data center won’t be so secret after all. Banish the cobwebs and bring on the sunshine. Try BMC Discovery now. Try Discovery online or download to scan 100 of your own assets now.
  • 14. © copyright 2017 BMC Software, Inc. BMC Confidential—Internal Use Only About BMC BMC, BMC Software, the BMC logo, and the BMC Software logo, and all other BMC Software product and service names are owned by BMC Software, Inc. and are registered or pending registration in the US Patent and Trademark Office or in the trademark offices of other countries. All other trademarks belong to their respective companies. © Copyright 2017 BMC Software, Inc. BMC – Bring IT to Life BMC digital IT transforms 82% of the Fortune 500®. BMC is a global leader in innovative software solutions that enable businesses to transform into digital for the ultimate competitive advantage. Our Digital Enterprise Management solutions are designed to fast track digital business from mainframe to mobile to cloud and beyond