2. WallixAdminBastion is a privileged user
management solution. It’s designed to give
you comprehensive control, monitoring
and reporting for access to servers and
other devices across your network.
4. Audit and compliance
The challenge:
Servers in your network house huge amounts of potentially sensitive data. Compliance and auditing
may need you to be able to provide a full trail of how this data has been accessed.
Let’s get personal
• Data stored on your network may not only relate
specifically to your business
• Information that about people or finance is strictly governed
• It’s vital for an auditor to be able to know how this kind of
data has been accessed and by who
5. Audit and compliance
How Wallix helps:
• Risk prevention is based on traceability of users access to servers and their actions
• All of these actions are collected centrally as logs and videos which can be made
available to auditors
• You can see a list of active sessions and monitor them in real-time
• See activity by particular users or on particular servers to identify unusual behaviour
• Full visibility of all of this data in the event of a breach or other security incident
7. Privileged user management
The challenge:
Many organisations today need to give varying levels of access to large numbers
of individuals. This is adding complexity to keeping data secure.
The Snowden Effect
• US whistleblower Edward Snowden
• Contracted systems administrator at the NSA
• Copied more than 50,000 documents
8. Privileged user management
How Wallix helps:
• WAB becomes a single point of entry for users to all your network devices
• Users have a single account for access to multiple resources
• Greater control over users who need access changes or leave your organisation
• Control access by parameters such as IP address, day and time or session type
• Ideal for managing contractors or external service providers
10. Monitoring and traceability
The challenge:
It’s difficult to get visibility of how users are accessing the servers on your network and also what
they’re doing whilst logged on.
Too much information
• Understanding system event logs requires time and effort
• Specific user activities are often hard to determine
• SIEM solutions often focus on external threats not internal
users
11. Monitoring and traceability
How Wallix helps:
• User activity can be constantly monitored alerting a manager or denying access if particular
actions are attempted
• Goes beyond event logging by tracing every single mouse click and keyboard stroke using
system log information and optical character recognition
• Command line sessions like SSH as well as UI sessions on Windows servers are can all be
recorded
• Recorded sessions can be viewed as text or recorded as videos which can be viewed and
downloaded instantly
13. Password management
The challenge:
Networks are full of servers with old accounts and passwords that are still active and could be
accessed by those who don’t have permission. Accounts and password for access to servers are
often created ad hoc and independently of any directory services.
The keys to your kingdom
• In 2011 an IT employee at Fannie Mae was dismissed
• In his final hours he used his laptop to access a Unix
server and plant malicious code
• He was targeting the destruction of 4000 internal servers
14. Password management
How Wallix helps:
• Users never need to have local access to servers
• It’s easy to manage users who should no longer have access to particular resources
without having to worry about accounts on the devices themselves
• This helps to protect your infrastructure from any unauthorised access particularly for
contractors or employees who have left your organisation
15. Just the facts
• Appliance, virtualised or in the cloud
• Simple configuration
• No agent to install
• Active directory integration