Balabit SCB

Page 1

Zoltan Bakos // Presales Engineer


Privileged User Fraud 88 %

71 %

21 %

Internal misuse

Internal misuse

Internal misuse

by

via

via

privilege abuse

LAN

remote access

• Use of stolen credentials was the top threat action in 2013 • Only 1% of security breaches is discovered through log reviews * Source: Verizon 2014 Data Breach Investigations Report


A Leading Solution for Privileged Activity Monitoring


IT Staff

USE STANDARD TOOLS

Outsourcing partners

Managers

VDI users

TRANSPARENT PROXY SOLUTION

• • • • •

Firewall, Network devices, Databases, Web/file servers, Citrix server…


IT Staff

NO AGENTS

Outsourcing partners

Managers

VDI users

TRANSPARENT PROXY SOLUTION

• • • • •

Firewall, Network devices, Databases, Web/file servers, Citrix server…


IT Staff

TAMPET-PROOF EVIDENCE

Outsourcing partners

Managers

VDI users

TRANSPARENT PROXY SOLUTION

• • • • •

Firewall, Network devices, Databases, Web/file servers, Citrix server…


KEY // BENEFITS EASY DEPLOYMENT

ENHANCED AUDIT

GRANULAR CONTROL

ANALYZE REAL TIME

MULTI PROTOCOL

MOVIE-LIKE PLAYBACK

4 EYES

BLOCKING &

TRANSPARENT

FULL-TEXT SEARCH

AUTOLOGON

ALERTING

INDEPENDENT

PCAP EXPORT

CHANNEL CONTROL

MALICIOUS

PROXY GATEWAY

FILE RETRIEVAL

FILE TRANSFER

ACTIONS



Gateway Authorization Target Server AD/LDAP

Client Cred. Store


4-eyes Authorization with Real-time Monitoring Authorizer Auditor

Administrator


Real-time Prevention


Seamless Enterprise Integration


/// THANK YOU


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.