SlideShare une entreprise Scribd logo
1  sur  24
1
SolarWinds® Security Updates
Partner Training
Clare Kavanagh, Channel Accounts Manager
Aravind Kurapati, APAC Geek
June 2013
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
2
» Who we are!
» How to discovery security needs
» Firewall Security Manager (FSM)
» Log & Event Manager (LEM)
» Network Configuration Manager (NCM)
**We are trying to cover a lot in this presentation! Please use
the question box in the gotomeeting if anything needs
clarification or a question comes up.
2
Agenda
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
3
SolarWinds – Who we are
Provide IT management software
that is powerful, easy-to-use and
affordable
Company background
Timeline 1999 Founded in Tulsa, OK
2005 Professional Investment
2006 Hired Management Team
2009 IPO (NYSE:SWI)
Headquarters Austin, Texas; over 500
employees worldwide
Customers Over 95,000 – from SMB to
Fortune 500
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
4
HELP!!!
4
My firewall rules are getting out of control! I need to be sure there
are no holes in my configs! I need to know my network is protected!
Web server logs, OS logs, application logs, firewall
logs…it’s impossible to read through all of them!
Network configuration changes, device backups, inventory
maintenance, compliance reporting…I can’t keep up!
Mobile devices are everywhere! I can’t keep track
of which devices are safe and which aren’t!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
5
Firewall
Management
How often do you analyze your firewall configurations?
How do you know if your firewalls rules are optimized for both security & performance?
How do you test a firewall addition or change to ensure it doesn’t have a negative impact?
How do you perform security audits and compliance reporting?
Log Management
How many log file sources do you review and how often do you review them?
How do you know if a breach has occurred and can you respond immediately?
How do you handle multiple-event correlation to detect anomalous behavior?
How do you handle security and compliance reporting?
Configuration
Management
How often do you backup the configuration files on your devices?
How do you go about deploying configuration changes/updates to multiple devices?
How quickly can you recover a device from a failed updated or config change?
How are you alerted when a network change is made or a configuration policy violated?
Questions to Consider
5
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
6
Firewall Security Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
7
The Problem
As organizations grow and firewall rules become more and more complex, it’s
easy for engineers to overlook existing rules and inadvertently open security
holes simply by not knowing the full impact of their changes.
Let's be honest, some firewall rule sets have grown so large and unmanageable,
it's become virtually impossible to decipher what's going on with the naked eye.
7
“Through 2018, more
than 95% of firewall
breaches will be
caused by firewall
misconfigurations,
not firewall flaws.”
Gartner research,
November 28, 2012
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
8
The Need for Easy Firewall Management
Which way would you rather manage your firewall configurations?
Point-&-Click ManagementComplex Command Line
OR
8
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
9
Firewall Management Best Practices
 Document all firewall rules and changes
 Configure firewall rules with minimal access rights
 Ensure all rules have business justification
 Implement a change-control policy
 Remove unused and redundant rules
 Perform firewall rule audits on an ongoing basis
 Log all pertinent firewall activity
 Back up firewall configuration files and logs regularly
 Automate, automate, automate!
9
SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
10
5 Ways SolarWinds FSM Can Help
1. Clean up and remove redundant, unused and conflicting rules
2. Scan your inventory for high risk firewalls and assess your risk
profile in minutes
3. Understand network policy through a unified view of connectivity,
routing, and the security rules responsible for allowing or blocking
network access
4. Know beforehand how a rule change will impact rules/objects,
traffic flows, and security checks
5. Troubleshoot service availability problems without touching
production devices
10
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
11
Log & Event Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
12
The Problem
Log files are generated across almost all of your IT assets—web server
logs, operating system logs, application logs, firewall logs, and more.
And, all of these log files need to be collected, stored, analyzed, and
effectively correlated for security, compliance, and troubleshooting
purposes.
12
Trying to sort through and decipher all
these logs manually is virtually impossible!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
13
Log Management Best Practices
 Define your log management policies and procedures
 Log all relevant and required data (but don’t “over-log”)
 Centrally aggregate all logged data
 Review logs on a regularly scheduled basis
 Correlate events across all log sources
 Perform real-time monitoring and alerting
 Run regularly scheduled security and compliance reports
 Store logs securely and retain for the required amount of time
 Automate, automate, automate!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
14
5 Ways SolarWinds LEM Can Help
1. Centralized collection of network device, machine, and cloud logs with
real-time, in-memory log correlation to instantly view security breaches
2. Built-in active responses to immediately and automatically take action
to mitigate threats
3. Advanced, easy-to-use, search interface with data visualization tools
that go well beyond ineffective traditional search bars
4. Over 300 out-of-the-box, “audit-proven” security and compliance
templates including PCI, HIPAA, SOX, GLBA and many more
5. USB defender technology protects sensitive data from with real-time
monitoring, detection notification and the ability to block usage
14
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
15
Network Configuration Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
16
The Problem
As enterprise networks grow in both size and complexity, the difficulty in
managing all the device configuration changes that are happening
throughout the IT infrastructure grows exponentially.
Manually logging in to each device separately to make changes or updates
means the likelihood of human error that can lead to policy violations,
unauthorized network access, and the possibility of a security breach.
Can you afford to take that chance?
16
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
17
The Need for Easy Network Config Management
Which way would you rather manage your network devices?
OR
17
Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
18
Configuration Management Best Practices
 Create standards-based IT security and access policies
 Implement a change management process to document and track all
changes to the network
 Establish role-based permissions to control who can make what change
 Backup critical network device configurations nightly and have a device
recovery plan in place
 Perform continuous monitoring with real-time change detection alerts
 Enforce policies with regularly scheduled security and compliance audits
 Validate and maintain policies and procedures through ongoing data
analysis and reviews
 Automate, automate, automate!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
19
5 Ways SolarWinds NCM Can Help
1. Automated device configuration management and bulk change management
to save time, reduce errors, and reduce the risk of costly network downtime
2. Automatic, scheduled backups of network configurations so your critical
devices are always protected
3. Configuration comparison and immediate rollback of failed changes to
instantly recover a device to a previous “known good” state
4. Real-time change detection and alerts to protect against policy violations,
unauthorized, unscheduled, and erroneous configuration changes
5. Out-the-box compliance reports, along with automated network inventory
reports customizable to your networks needs
19
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
20
How to Promote and Sell
» Deals and Opportunities - Additional margin may be available for net new deals.
Contact us with your opportunities as soon as you have them for special pricing
PartnersAPAC@solarwinds.com
» Leads – Generate your own leads using custom coded download links for your customers.
Leads will be automatically tagged to you. Request custom links from
PartnersAPAC@solarwinds.com
» Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partners
Sales and Technical training
 Videos
 Sales cards
 Presentations
Current end-user price list
Demo License (NFR) application
Branding, logos, box shots, screenshots
What’s New section for up-to-date information
14
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
21
Demo Sites
» NCM
 http://configuration.demo.solarwinds.com
» FSM
 http://demo.solarwinds.com/flashdemo/fsm
» LEM
 http://demo.solarwinds.com/flashdemo/lem
21
22
© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Summary and Q & A
» Clare Kavanagh, Channel Accounts Manager
Clare.Kavanagh@solarwinds.com
» Aravind Kurapati, APAC Geek
» Aravind.Kurapati@solarwinds.com
» Join our community of 150,000+ IT pros at www.thwack.com
Thank you for attending!
22
23
Q&A
Questions?
23
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
24
Thank You
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered
with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other
SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United
States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or
are trademarks or registered trademarks of their respective companies.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
24

Contenu connexe

Tendances

Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinAnton Chuvakin
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Huntsman Security
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...solarisyougood
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protectioncentralohioissa
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security OfficerDirk Cipido
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 

Tendances (20)

Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 

Similaire à APAC Partner Update: SolarWinds Security

How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdfbkbk37
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsSolarWinds
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsSolarWinds
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-WilheminaRossi174
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 

Similaire à APAC Partner Update: SolarWinds Security (20)

How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 

Plus de SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilitySolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 

Plus de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Dernier

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

APAC Partner Update: SolarWinds Security

  • 1. 1 SolarWinds® Security Updates Partner Training Clare Kavanagh, Channel Accounts Manager Aravind Kurapati, APAC Geek June 2013 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 2. 2 » Who we are! » How to discovery security needs » Firewall Security Manager (FSM) » Log & Event Manager (LEM) » Network Configuration Manager (NCM) **We are trying to cover a lot in this presentation! Please use the question box in the gotomeeting if anything needs clarification or a question comes up. 2 Agenda © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 3. 3 SolarWinds – Who we are Provide IT management software that is powerful, easy-to-use and affordable Company background Timeline 1999 Founded in Tulsa, OK 2005 Professional Investment 2006 Hired Management Team 2009 IPO (NYSE:SWI) Headquarters Austin, Texas; over 500 employees worldwide Customers Over 95,000 – from SMB to Fortune 500 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 4. 4 HELP!!! 4 My firewall rules are getting out of control! I need to be sure there are no holes in my configs! I need to know my network is protected! Web server logs, OS logs, application logs, firewall logs…it’s impossible to read through all of them! Network configuration changes, device backups, inventory maintenance, compliance reporting…I can’t keep up! Mobile devices are everywhere! I can’t keep track of which devices are safe and which aren’t! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 5. 5 Firewall Management How often do you analyze your firewall configurations? How do you know if your firewalls rules are optimized for both security & performance? How do you test a firewall addition or change to ensure it doesn’t have a negative impact? How do you perform security audits and compliance reporting? Log Management How many log file sources do you review and how often do you review them? How do you know if a breach has occurred and can you respond immediately? How do you handle multiple-event correlation to detect anomalous behavior? How do you handle security and compliance reporting? Configuration Management How often do you backup the configuration files on your devices? How do you go about deploying configuration changes/updates to multiple devices? How quickly can you recover a device from a failed updated or config change? How are you alerted when a network change is made or a configuration policy violated? Questions to Consider 5 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 6. 6 Firewall Security Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 7. 7 The Problem As organizations grow and firewall rules become more and more complex, it’s easy for engineers to overlook existing rules and inadvertently open security holes simply by not knowing the full impact of their changes. Let's be honest, some firewall rule sets have grown so large and unmanageable, it's become virtually impossible to decipher what's going on with the naked eye. 7 “Through 2018, more than 95% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.” Gartner research, November 28, 2012 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 8. 8 The Need for Easy Firewall Management Which way would you rather manage your firewall configurations? Point-&-Click ManagementComplex Command Line OR 8 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 9. 9 Firewall Management Best Practices  Document all firewall rules and changes  Configure firewall rules with minimal access rights  Ensure all rules have business justification  Implement a change-control policy  Remove unused and redundant rules  Perform firewall rule audits on an ongoing basis  Log all pertinent firewall activity  Back up firewall configuration files and logs regularly  Automate, automate, automate! 9 SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 10. 10 5 Ways SolarWinds FSM Can Help 1. Clean up and remove redundant, unused and conflicting rules 2. Scan your inventory for high risk firewalls and assess your risk profile in minutes 3. Understand network policy through a unified view of connectivity, routing, and the security rules responsible for allowing or blocking network access 4. Know beforehand how a rule change will impact rules/objects, traffic flows, and security checks 5. Troubleshoot service availability problems without touching production devices 10 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 11. 11 Log & Event Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 12. 12 The Problem Log files are generated across almost all of your IT assets—web server logs, operating system logs, application logs, firewall logs, and more. And, all of these log files need to be collected, stored, analyzed, and effectively correlated for security, compliance, and troubleshooting purposes. 12 Trying to sort through and decipher all these logs manually is virtually impossible! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 13. 13 Log Management Best Practices  Define your log management policies and procedures  Log all relevant and required data (but don’t “over-log”)  Centrally aggregate all logged data  Review logs on a regularly scheduled basis  Correlate events across all log sources  Perform real-time monitoring and alerting  Run regularly scheduled security and compliance reports  Store logs securely and retain for the required amount of time  Automate, automate, automate! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 14. 14 5 Ways SolarWinds LEM Can Help 1. Centralized collection of network device, machine, and cloud logs with real-time, in-memory log correlation to instantly view security breaches 2. Built-in active responses to immediately and automatically take action to mitigate threats 3. Advanced, easy-to-use, search interface with data visualization tools that go well beyond ineffective traditional search bars 4. Over 300 out-of-the-box, “audit-proven” security and compliance templates including PCI, HIPAA, SOX, GLBA and many more 5. USB defender technology protects sensitive data from with real-time monitoring, detection notification and the ability to block usage 14 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 15. 15 Network Configuration Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 16. 16 The Problem As enterprise networks grow in both size and complexity, the difficulty in managing all the device configuration changes that are happening throughout the IT infrastructure grows exponentially. Manually logging in to each device separately to make changes or updates means the likelihood of human error that can lead to policy violations, unauthorized network access, and the possibility of a security breach. Can you afford to take that chance? 16 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 17. 17 The Need for Easy Network Config Management Which way would you rather manage your network devices? OR 17 Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 18. 18 Configuration Management Best Practices  Create standards-based IT security and access policies  Implement a change management process to document and track all changes to the network  Establish role-based permissions to control who can make what change  Backup critical network device configurations nightly and have a device recovery plan in place  Perform continuous monitoring with real-time change detection alerts  Enforce policies with regularly scheduled security and compliance audits  Validate and maintain policies and procedures through ongoing data analysis and reviews  Automate, automate, automate! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 19. 19 5 Ways SolarWinds NCM Can Help 1. Automated device configuration management and bulk change management to save time, reduce errors, and reduce the risk of costly network downtime 2. Automatic, scheduled backups of network configurations so your critical devices are always protected 3. Configuration comparison and immediate rollback of failed changes to instantly recover a device to a previous “known good” state 4. Real-time change detection and alerts to protect against policy violations, unauthorized, unscheduled, and erroneous configuration changes 5. Out-the-box compliance reports, along with automated network inventory reports customizable to your networks needs 19 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 20. 20 How to Promote and Sell » Deals and Opportunities - Additional margin may be available for net new deals. Contact us with your opportunities as soon as you have them for special pricing PartnersAPAC@solarwinds.com » Leads – Generate your own leads using custom coded download links for your customers. Leads will be automatically tagged to you. Request custom links from PartnersAPAC@solarwinds.com » Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partners Sales and Technical training  Videos  Sales cards  Presentations Current end-user price list Demo License (NFR) application Branding, logos, box shots, screenshots What’s New section for up-to-date information 14 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 21. 21 Demo Sites » NCM  http://configuration.demo.solarwinds.com » FSM  http://demo.solarwinds.com/flashdemo/fsm » LEM  http://demo.solarwinds.com/flashdemo/lem 21
  • 22. 22 © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Summary and Q & A » Clare Kavanagh, Channel Accounts Manager Clare.Kavanagh@solarwinds.com » Aravind Kurapati, APAC Geek » Aravind.Kurapati@solarwinds.com » Join our community of 150,000+ IT pros at www.thwack.com Thank you for attending! 22
  • 23. 23 Q&A Questions? 23 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 24. 24 Thank You The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 24

Notes de l'éditeur

  1. A firewall is considered a network’s “first line of defense” in protecting sensitive data from unauthorized access. It’s the entry point of the network—determining what is allowed in and out.Without the proper firewall rules in place, your network is left exposed and vulnerable. It’s like leaving your front door open for anyone to come in and take what they want.This is why firewall configuration management is so crucial. Without it, access to your network can become a free-for-all! And, it’s important to remember that SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT, which makes firewall management even more important!
  2. NCM provides automated network configuration and change management to reduce the risk of human error and save you time and money. No more having to manually SSH or Telnet to each device. Do everything from one easy-to-use, centralized web interface. Detect and report on configuration policy violations and deliver real-time alerts