SlideShare ist ein Scribd-Unternehmen logo
1 von 30
ObserveIT – 	Record & Replay Terminal, Citrix and Console Sessions January 2010
The Company in a Nutshell Founded in 2006 Focused exclusively on People-Auditing software products First GA product release – 2007 Current product version - v5.0 Global Presence  Partners in 5 Continents Official Distributor in Malaysia Comwise Internetwork SdnBhd 78A, JalanRenang 13/26 Section 13, 40100 Shah Alam, Selangor. Contact : Mr TS Teh – 019-263 7311   tsteh@comwise.com.my                  Kent Ng     - 019-325 3248   kentng@comwise.com.my
Our Product in a Nutshell Record and Replay of user sessions Like a ‘security camera’ on your servers Software-based solution Playback any Remote Desktop, Citrix, VMWare or any other remote access session Fast search and navigation to find user actions, without lengthy playback
Hundreds of Enterprise Customers Financial IT Services Education/Gov’t/Healthcare Manufacturing Telecommunications
Why use ObserveIT ?   Compliance and Security ,[object Object]
Audit people, not just apps
Total application coverage that grows with your growth
Bulletproof evidence
Precise user identification  Remote Vendor Monitoring  ,[object Object]
Improve security, accountability and policy messaging
Transparent SLA and billing validation
No more ‘Finger pointing’  Root-Cause Analysis ,[object Object]
Immediate root cause determination
Alerts from within Network Monitor Tools
Defeat the ‘Oops’ factor Who accessed the salaries spreadsheet in the past 24 hours? And what did they do? Without ObserveIT With ObserveIT Check the file system logs Check the HR app audit Check the finance dept. audit Check admin support app log Unified reporting of all user activity on the HR spreadsheet I wonder if there are other access points? Instant playback of exact user actions ?? ?? ?? ??
  Compliance and Security ,[object Object]
Audit people, not just apps
Total application coverage that grows with your growth
Bulletproof evidence
Precise user identification  Remote Vendor Monitoring  ,[object Object]
Improve security, accountability and policy messaging
Transparent SLA and billing validation
No more ‘Finger pointing’  Root-Cause Analysis ,[object Object]
Immediate root cause determination
Alerts from within Network Monitor Tools
Defeat the ‘Oops’ factor Why use ObserveIT ? What did SupportCorp do on our servers yesterday? Are they responsible for the data deletion event?  Without ObserveIT With ObserveIT Find the exact user session I have no idea…… Finger pointing accusations Lengthy SLA review Session playback eliminates any doubt Is there anywhere we can find this information? ?? ?? ??
Why use ObserveIT ?   Compliance and Security ,[object Object]
Audit people, not just apps
Total application coverage that grows with your growth
Bulletproof evidence

Weitere ähnliche Inhalte

Was ist angesagt?

EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 

Was ist angesagt? (20)

The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Scug 1809 Take conditional access to the next level
Scug 1809   Take conditional access to the next levelScug 1809   Take conditional access to the next level
Scug 1809 Take conditional access to the next level
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021Lets talk about soc2s, baby! BSidesLV 2021
Lets talk about soc2s, baby! BSidesLV 2021
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
 

Andere mochten auch

Andere mochten auch (7)

ObserveIT Customer presentation
ObserveIT Customer presentation ObserveIT Customer presentation
ObserveIT Customer presentation
 
Database Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower CostsDatabase Security, Better Audits, Lower Costs
Database Security, Better Audits, Lower Costs
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
 
CyberArk
CyberArkCyberArk
CyberArk
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 

Ähnlich wie Observe It Presentation

Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
sagaraccura
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
adinathfashion1
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
ableelectronics
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
Practical operability techniques for distributed systems - Velocity EU 2017
Practical operability techniques for distributed systems - Velocity EU 2017Practical operability techniques for distributed systems - Velocity EU 2017
Practical operability techniques for distributed systems - Velocity EU 2017
Skelton Thatcher Consulting Ltd
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
Amit Gatenyo
 

Ähnlich wie Observe It Presentation (20)

Webinar - System Performance Monitoring with SysKit: Servers, Services and Apps
Webinar - System Performance Monitoring with SysKit: Servers, Services and AppsWebinar - System Performance Monitoring with SysKit: Servers, Services and Apps
Webinar - System Performance Monitoring with SysKit: Servers, Services and Apps
 
User activity monitoring with SysKit
User activity monitoring with SysKitUser activity monitoring with SysKit
User activity monitoring with SysKit
 
Bitrix Software Security
Bitrix Software SecurityBitrix Software Security
Bitrix Software Security
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Practical operability techniques for teams - Matthew Skelton - Agile in the C...
Practical operability techniques for teams - Matthew Skelton - Agile in the C...Practical operability techniques for teams - Matthew Skelton - Agile in the C...
Practical operability techniques for teams - Matthew Skelton - Agile in the C...
 
Peloton Cycle Streaming Live Spin Classes to Thousands with Loggly & AWS
Peloton Cycle  Streaming Live Spin Classes to Thousands with Loggly & AWSPeloton Cycle  Streaming Live Spin Classes to Thousands with Loggly & AWS
Peloton Cycle Streaming Live Spin Classes to Thousands with Loggly & AWS
 
VBOT
VBOTVBOT
VBOT
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet new
 
Webinar - Patch Management: Keep up with security updates by using SysKit
Webinar - Patch Management: Keep up with security updates by using SysKitWebinar - Patch Management: Keep up with security updates by using SysKit
Webinar - Patch Management: Keep up with security updates by using SysKit
 
Enterprise Server Monitoring & Administration Tool - SysKit Monitor
Enterprise Server Monitoring & Administration Tool - SysKit MonitorEnterprise Server Monitoring & Administration Tool - SysKit Monitor
Enterprise Server Monitoring & Administration Tool - SysKit Monitor
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Debugging and interacting with production applications
Debugging and interacting with production applicationsDebugging and interacting with production applications
Debugging and interacting with production applications
 
Liferay European Symposium 2011 - Building complete workflow solutions
Liferay European Symposium 2011 - Building complete workflow solutionsLiferay European Symposium 2011 - Building complete workflow solutions
Liferay European Symposium 2011 - Building complete workflow solutions
 
3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7
 
File access auditing
File access auditingFile access auditing
File access auditing
 
Q1 Southern California Session Slides
Q1 Southern California Session SlidesQ1 Southern California Session Slides
Q1 Southern California Session Slides
 
Practical operability techniques for distributed systems - Velocity EU 2017
Practical operability techniques for distributed systems - Velocity EU 2017Practical operability techniques for distributed systems - Velocity EU 2017
Practical operability techniques for distributed systems - Velocity EU 2017
 
End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007End To End Service Management With Operations Manager 2007
End To End Service Management With Operations Manager 2007
 

Observe It Presentation

  • 1. ObserveIT – Record & Replay Terminal, Citrix and Console Sessions January 2010
  • 2. The Company in a Nutshell Founded in 2006 Focused exclusively on People-Auditing software products First GA product release – 2007 Current product version - v5.0 Global Presence Partners in 5 Continents Official Distributor in Malaysia Comwise Internetwork SdnBhd 78A, JalanRenang 13/26 Section 13, 40100 Shah Alam, Selangor. Contact : Mr TS Teh – 019-263 7311 tsteh@comwise.com.my Kent Ng - 019-325 3248 kentng@comwise.com.my
  • 3. Our Product in a Nutshell Record and Replay of user sessions Like a ‘security camera’ on your servers Software-based solution Playback any Remote Desktop, Citrix, VMWare or any other remote access session Fast search and navigation to find user actions, without lengthy playback
  • 4. Hundreds of Enterprise Customers Financial IT Services Education/Gov’t/Healthcare Manufacturing Telecommunications
  • 5.
  • 6. Audit people, not just apps
  • 7. Total application coverage that grows with your growth
  • 9.
  • 10. Improve security, accountability and policy messaging
  • 11. Transparent SLA and billing validation
  • 12.
  • 13. Immediate root cause determination
  • 14. Alerts from within Network Monitor Tools
  • 15. Defeat the ‘Oops’ factor Who accessed the salaries spreadsheet in the past 24 hours? And what did they do? Without ObserveIT With ObserveIT Check the file system logs Check the HR app audit Check the finance dept. audit Check admin support app log Unified reporting of all user activity on the HR spreadsheet I wonder if there are other access points? Instant playback of exact user actions ?? ?? ?? ??
  • 16.
  • 17. Audit people, not just apps
  • 18. Total application coverage that grows with your growth
  • 20.
  • 21. Improve security, accountability and policy messaging
  • 22. Transparent SLA and billing validation
  • 23.
  • 24. Immediate root cause determination
  • 25. Alerts from within Network Monitor Tools
  • 26. Defeat the ‘Oops’ factor Why use ObserveIT ? What did SupportCorp do on our servers yesterday? Are they responsible for the data deletion event? Without ObserveIT With ObserveIT Find the exact user session I have no idea…… Finger pointing accusations Lengthy SLA review Session playback eliminates any doubt Is there anywhere we can find this information? ?? ?? ??
  • 27.
  • 28. Audit people, not just apps
  • 29. Total application coverage that grows with your growth
  • 31.
  • 32. Improve security, accountability and policy messaging
  • 33. Transparent SLA and billing validation
  • 34.
  • 35. Immediate root cause determination
  • 36. Alerts from within Network Monitor Tools
  • 37. Defeat the ‘Oops’ factor Why is our server broken? And how can I fix it? Without ObserveIT With ObserveIT Check the event log Check the database log Immediate identification of cause of outage Check the registry Check the network cable Attention all admins: Who touched this server?!?%!? ?? ??
  • 38. Video Replay of User Sessions Clicking on video icon launches the video replay (see next slide) ObserveIT lists every user session Jump straight to the precise action. Replay only what you’re interested in. Within each session, details of every action taken
  • 39. Video Replay of User Sessions See an exact video playback of the entire user session (including mouse movements, selection of UI elements and text entry) Navigate quickly within the recording (including jumping between each activity, as the user launches a new app or opens a new window)
  • 40.
  • 42.
  • 44.
  • 46.
  • 49. User generated contentSearch results highlight exact location of user action within the user session timeline
  • 50. Policy-Based, Event-Driven Recording Define policies to handle each session
  • 51.
  • 54.
  • 57.
  • 60.
  • 61.
  • 63.
  • 65.
  • 67.
  • 69.
  • 70. User Identification User logs on as generic “Administrator”
  • 71. ObserveIT requires username identification prior to granting access to system Active Directory used for authentication
  • 72. Each session is now tagged with an actual name Login userid: administrator Actual user: daniel
  • 73. Real Time Playback “On Air” icon shows that a session is currently active
  • 74. Video replay of session is launched in Real-Time mode, with continuous updates until the session ends Video replay of session is launched in Real-Time mode, with continuous updates until the session ends
  • 75. Enterprise-Ready ArchitectureComplete Coverage Agnostic to network protocol and client application Captures all Remote Sessions and also Console Sessions Terminal
  • 76. Small Footprint Ultra-efficient data storage Less than 250GB/year for high-usage, 1000 server environment Minimal Agent CPU utilization 0% CPU when no console active 1%-2% CPU, 10 MB RAM during session
  • 77. Integration with System Monitors Instant-replay from within your network management environment Microsoft SCOM, CA-Unicenter, IBM Tivoli, HP OpenView Real-time alerts On file access/deletion, Network share, Registry edit , RDP open connection, URL access etc. ObserveIT alert in CA-Unicenter ObserveIT alert in MS SCOM Trigger automatic email alert delivery Click on alert to see ObserveIT video playback
  • 78. Pervasive User Permissions Granular permissions / access control Define rules for each user Specify which sessions the user may playback Permission-based filtering affects all content access Reports Searching Video playback Metadata browsing Access to ObserveIT Web Console is also audited ObserveIT audits itself Satisfies regulatory compliance requirements
  • 79. System Components Agent Corporate Server HTTP Traffic (by default -TCP 4884) SQL Traffic (by default -TCP 1433) Agent Switch Application Server Web Console using IIS on Windows Server 2003/2008 Database Server using MS SQL Server 2000/2005 on Windows Server 2003/2008 Corporate Server How it Works Each monitored desktop or server runs the ObserveIT Agent The Agent encrypts information about user activity and sends it to the Application Server Application Server analyzes data and stores it in the Database Server Web Management Console is a web-based interface for searching and reporting on captured user activity HTTP Agent ObserveIT Admin using a Web Browser Corporate Desktop
  • 80. Deployment Architecture:Remote Access Gateway (Agent-less Servers) Published Applications Putty.exe RDP Traffic VPNTraffic Corporate Servers (No Agent installed) VPN ICATraffic Corporate Servers (No Agent installed) Terminal or Citrix Server with ObserveIT Agent Win2008 TS Gateway RDP over SSL Traffic Telnet/SSHTraffic Corporate Servers (No Agent installed) App Server Web Console DB Server
  • 81.
  • 84. Control access to system resources, including shared privileges between two merged corporate entities during period of merger
  • 85. Achieve common system management and visibility
  • 86. 2008- ObserveIT deployed to monitor and audit serve activity during merger activity
  • 87.
  • 88. Customer support process requires remote session access to deployed systems
  • 89. Strict HIPAA compliance regulations must be enforced and demonstrable
  • 90. In addition, SLA commitments require visibility of service times and durations
  • 91. ObserveIT deployed in a Gateway architecture
  • 92. All access routed via agent-monitored Citrix gateway
  • 93. Actual systems being accessed remain agent-less
  • 94. Toshiba achieved 24x7 SLA reports, including granular incident summaries
  • 95.

Hinweis der Redaktion

  1. China contstruction bankQuebec LotoHyperionComverseToronto HydroSamsung NetworksBT FrontlineLondon Clearing HouseBSkyBNexus SA CCSingapore PostWash Univ StLWestern Governors UniversityBesT MobileCenter to Protomote HealthCareXeroxBPAustralian Stock ExchangeINGVontobelBBVA BNP ParibasUHS East