Transcript Slide

Why Privilege Management?
Traditional Defenses Are Not Enough
ANTIVIRUS
100% of victims have Firewalls and Intrusion Protection
What Today’s Attacks Look Like
1
External Reconnaissance
Identify a weak link
2
Initial Compromise
Initial breach via spear-phishing, social engineering, etc.
We stop
them at
step 3
3
Foothold Established
Obtain privileged identities (e.g. Domain Admin)
4
Internal Reconnaissance
Spread laterally to gather IP
5
Mission Completed
Exfiltrate data
Cybersecurity’s Maginot Line: A Real-world Assessment of the Defense-in-Depth Model
► TRACK
► DISCOVER
Identify and
document critical
IT assets, their
privileged
accounts and their
interdependencies
► REMEDIATE
Enforce rules for
password complexity,
diversity and change
frequency,
and synchronize
changes across all
dependencies
► DELEGATE
Delegate access to
privileged credentials
so that only
appropriate personnel,
using the least
privilege required, can
login to IT assets
Audit and alert so
that the requester,
purpose, and
duration of each
privileged access
request is
documented
and monitored
It’s Tough for Attackers to Hit a Moving Target
Privilege Management Platform
Systems, Network Devices, Databases, and Applications
Deploy On-Premises, In the Cloud, or Both
Privileged
Identity
Management
Privileged
Access
Management
SSH Key
Management
Service
Account
Management
Cloud
Platform
Management
Orchestration via Web Services & PowerShell
Virtually Every IT Asset, On-prem and in the Cloud
•
•
•
•
•
•
•
Computer
Hardware
Databases
Applications
Windows
UNIX
Linux
Dell DRAC
HP Ilo
Xerox Printers
Mainframes…
•
•
•
•
•
•
•
• Microsoft
System
Center
• SharePoint
• McAfee ePO
• IBM BigFix
• SAP …
SQL Server
Oracle
MySQL
DB2
Sybase
Teradata
…
Network
Appliances
•
•
•
•
•
•
CheckPoint
Cisco IOS
EMC
Foundry
Juniper
NetApp …
Cloud
Platforms
• Microsoft
Azure
• Amazon Web
Services
• Rackspace
• Force.com
• IBM SoftLayer
VM
Middleware
Environments
• Proxy
Accounts
• Gateway
Accounts
• WebSphere
• WebLogic …
• VMware
• IBM System Z
• Microsoft
Hyper-V …
More than a
vault
Highly Extensible
Solution
Rapid time
to value
Automation at
scale
Available Today http://azure.microsoft.com/en-us/marketplace/partners/liebsoft/
And many
more!
liebsoft.com
http://myignite.microsoft.com
https://aka.ms/ignite.mobileapp
Visit us at Booth 1404: See a Demo | Meet our Team
Learn more:
www.liebsoft.com
[email protected]
Visit us at Booth 1404: See a Demo | Meet our Team
Learn more:
www.liebsoft.com
[email protected]