Zoltan Bakos // Presales Engineer
Privileged User Fraud 88 %
71 %
21 %
Internal misuse
Internal misuse
Internal misuse
by
via
via
privilege abuse
LAN
remote access
• Use of stolen credentials was the top threat action in 2013 • Only 1% of security breaches is discovered through log reviews * Source: Verizon 2014 Data Breach Investigations Report
A Leading Solution for Privileged Activity Monitoring
IT Staff
USE STANDARD TOOLS
Outsourcing partners
Managers
VDI users
TRANSPARENT PROXY SOLUTION
• • • • •
Firewall, Network devices, Databases, Web/file servers, Citrix server…
IT Staff
NO AGENTS
Outsourcing partners
Managers
VDI users
TRANSPARENT PROXY SOLUTION
• • • • •
Firewall, Network devices, Databases, Web/file servers, Citrix server…
IT Staff
TAMPET-PROOF EVIDENCE
Outsourcing partners
Managers
VDI users
TRANSPARENT PROXY SOLUTION
• • • • •
Firewall, Network devices, Databases, Web/file servers, Citrix server…
KEY // BENEFITS EASY DEPLOYMENT
ENHANCED AUDIT
GRANULAR CONTROL
ANALYZE REAL TIME
MULTI PROTOCOL
MOVIE-LIKE PLAYBACK
4 EYES
BLOCKING &
TRANSPARENT
FULL-TEXT SEARCH
AUTOLOGON
ALERTING
INDEPENDENT
PCAP EXPORT
CHANNEL CONTROL
MALICIOUS
PROXY GATEWAY
FILE RETRIEVAL
FILE TRANSFER
ACTIONS
Gateway Authorization Target Server AD/LDAP
Client Cred. Store
4-eyes Authorization with Real-time Monitoring Authorizer Auditor
Administrator
Real-time Prevention
Seamless Enterprise Integration
/// THANK YOU