SlideShare une entreprise Scribd logo
1  sur  35
Retail IT 2013:
        Data Security & PCI
        Compliance Briefing


Kaseya and Omega
Data Security and PCI Compliance: Leveraging Systems Management Automation to Stay Compliant




                                                                                               Speakers

                                     Shekar Swamy
                                     President & Senior Security Strategist
                                     Omega




                                     Randy Briggs
                                     US Director – Retail, Hospitality & Leisure
                                     Kaseya
Agenda

• The Burden of Data Security & Compliance
• The Process to Satisfy Card Brands and Security
  Assessment Firms
• Key Areas To Pay Attention To
• The Role of Systems Management Technology
• ROI of an Integrated Solution
• About Kaseya
• Considerations & Recommendations
• Helping You Bridge the Gaps
• Q&A
The Burden of Data Security &
      PCI Compliance




           omegasecure.com
About Omega ATC

    21-year history of performance in retail

    Omega systems and services – widely used in the market

    Helped many companies achieve compliance – Level 1,
     Level 2 and Level 4 merchants across the US
    Highly secure Data Center to manage data security

    Working relationship with major QSA firms

    Participating Organization in the PCI council

    NACS data security committee

    SIGMA Resource and participant

    Rapid deployment process
Some of our Customers




                           EDN, INC.
                        Jaco Oil Company
A Recent Experience

   


   
   
   
   


   
   
Actions taken by the Retailer

   


   
   

   
   
   
Lessons learned

  


  
  
  
  


  
  
Challenges










Retail Challenges

  
  

  

  



  

  
  
  
The Process to Satisfy Card brands and
      Security Assessment Firms
  Abcdef
The Process to Satisfy Credit Card
Companies & Security Assessors
 

 

 

 

 
 

 

 


                       omegasecure.com
Who is responsible for your
compliance?

   
   
   
   
   
   
   
   




                       omegasecure.com
Key areas that Level 1 & 2 merchants
need to pay attention to




 
 




 

 
 
 
Systems management
complements Data Security

  
      
      
      
      
      
      
      
      
      
      
      



                     omegasecure.com
The Stage…


                              Retail                             Front End
  Payments
                             Network                             Processor
                           (Cards and
    LAN                    other traffic)




                              Firewall/               Internet
                               Router


                                                                 “BOS”
                                                                  LAN
   Payment      In-store
   Appliance
               POS LAN




                                                 Security
                                                 Cameras         Back Office
                                                                     PC

                               omegasecure.com
Data Security identifies issues
across your network


  
      
      
      
      
      
      
      
      
      
      


                        omegasecure.com
Kaseya Systems
        Kaseya Systems               Omega Data Security
                                     Omega Data Security                       Omega PCI Compliance
         Management
         Management
1.
1.
   Systems Management, Data alerting
    Discovery
    Discovery            Consolidated reporting and                      Assistance from Security Strategists
2. Security, PCI Compliance
2. Automatic Deployment
    Automatic Deployment Logs for system events                          Perform External/Internal scanning
3.
3.   Auditing
     Auditing                  Secure/ encrypted remote control          Written information Security policies
                               sessions
4.
4.   Monitoring
     Monitoring                Password management                       Implement policies
5.
5.   Network Monitoring
     Network Monitoring        File integrity monitoring                 Logging – remote control, firewall, Event
                                                                         logs, FIM logs, Security logs, Patch logs,
                                                                         Anti-virus, Anti-spyware., Anti-malware
6.
6.   Secure Remote Control
     Secure Remote Control     Wireless Intrusion Detection              Evidentiary Reports

7.
7.   Desktop Policy Settings
     Desktop Policy Settings   Adequate access controls                    Working relationships
8.
8.   Disk Backup
     Disk Backup               Patching of systems                         • QSA firms

9.
9.   Reporting
     Reporting                 Internal & External Scanning                • POS vendors, back office vendors
10. Software distribution
10. Software distribution      Verification of POS system applications     • Network Service Providers
11. Scripting for automation
11. Scripting for automation   Anti-malware                                • Partnership with Microsoft
    of tasks
    of tasks
12. Desktop Migration
12. Desktop Migration          Anti-virus and anti-spyware                 • Security Strategists
13. Directory Services
13. Directory Services         Mobile device management
14. Imaging and Deployment
14. Imaging and Deployment
15. Help Desk Ticketing
15. Help Desk Ticketing
Path forward - integrated solutions
with a single pane of glass

   
   
       
       
       
       

   

       
       
       
       



                       omegasecure.com
Implementation - two options




                                       


       
                                        




       




                      omegasecure.com
Where’s Your ROI?

  90% of your problems disappear
  Your entire environment and systems function smoothly
  Eliminate the need to hire more people
  Automate hundreds of routine IT tasks –
     set it and forget it
  Data security that protects you
  Rapid deployment
  Scalable architecture – small, medium and large
  Expert support from System Engineers and
   Security Strategists
  Comply with 286+ controls
The Kaseya Automated IT
 Systems Management
  Solution for Retail IT
Private Global Company With 31 Offices In 20 Countries,
450+ employees, 15,000+ Customers , 53% Top 100 MSPs
Our Vision




“Providing Enterprise-Class IT Systems
     Management for Everybody”
Designed With Security in Mind
Unified Systems Management

     Event Management                                 Automation                        Business Intelligence

    • Alerts / Notifications                • Scheduling                                • Reporting
    • System Events                         • Procedures                                • Dashboards
    • Logs                                  • API/Messaging                             • Interactive Data Views



          IT Configuration Management                                          Business Continuity
•   Remote Management        •   Image Deployment            •   Image Backup                •   File & Folder Backup
•   Software Deployment      •   Desktop Migration           •   Image Virtualization
•   Power Management         •   Mobile Device Management


                   Asset Management                                              Service Delivery
•   Network Discovery        •   Directory Services          •   Service Desk/Ticketing      •   Policy Compliance
•   Hardware Inventory       •   Software Inventory          •   Policy Management           •   Time Tracking
                                                             •   Service Billing


                         Security                                              Systems Monitoring
•   Anti-Virus               •   Patch Management            •   Systems Checks & Alerts     •   SNMP Monitoring
•   Anti-Malware             •   Software Updates            •   Event Monitoring            •   Log Monitoring
                                                             •   Performance Monitoring      •   VM Monitoring
Best Practice Management

100’s of Pre-Defined Views, Maintenance Routines, Policies and
  Automation Procedures

• Device Views by Type
    By OS Type/Ver
    Exchange, SQL, IIS, etc
• Maintenance Routines
    PC and Server Optimization
• Monitor Sets
      Application Events/Logs
      Hardware Thresholds
      Up/Down Faults
      Servers, Database, Exchange and Domains
      3rd Party Backup, Security and Network Infrastructure

                 (Out -Of-The-Box BP Configuration Wizard)
Unified Security Protection is Critical

• Endpoint security is achieved in layers:
    Managed Antivirus/Antimalware
    URL Filtering
    Local Firewall
    Device blocking
    Application blocking
    Logfile Monitoring
    Regular System Audits
    OS Patching
    Application Patching
    Remote System Tracking
    System Wiping
Security Considerations

We’ve all heard the horror stories
• In 2012 the Retail industry made up 45% of data breach
  investigations; a 15% increase from 2011 (Trustwave)
• Average cost of a data breach is $5.5 million per breach –
  (Ponemon Institute)
• Symantec source code stolen recently
     PC-Anywhere – stop using
• Uninstall/Disable Java everywhere if possible
• Dexter Malware – POS systems IS the target
• The number of new endpoint malware Kaspersky sees on
  a daily basis averages about 71,000

          Targeted attacks will continue…
Security Considerations

• Network Perimeter Disappearing
• Endpoint IS the Target (including mobile)
• Compromised Endpoint = Compromised EVERYTHING
  (including cloud)
• AV is NOT a commodity
• Security is not ONLY Anti-virus
• Layered Security is Important
• Monitoring and Remediation as Part of the Solution



     Retail E-Commerce Websites and POS
          Systems are a Prime Target
Recommendations

• Bridge the Points of IT Service Disconnect (Silos)
     the total solution is much better than the sum of its parts
• Centralize Management even if you have Decentralized
  Roles
• Gain complete visibility and control of remote systems
  (on/off your network)
• Be proactive not reactive (monitoring and alerting is not
  good enough if you can’t quickly remediate)
• Choose partners and technology providers who specialize
  in your industry

     Systems Management Suite Will Help
      You Take Security To The Next Level
Recommendations

• Embrace Systems Management AUTOMATION
    Routine repetitive tasks (set it and forget it)
    Proactive remediation (diagnostics, executables
     & processes)
    Extensibility & integration w/ other systems
    Customized services to your environment
    Rules, Checks & Balances (if, then, else logic)
    The best policies are those that can be enforced



         Manage thousands of systems as
       easily as you can manage one system
“Not a Question of If – But When”

 • It’s not a question of if – but when – your
   organization will experience a serious security
   breach
     Even enterprises with the most mature security
      organizations and advanced security controls
      can’t prevent every single breach




    Source: Forrester, “Planning For Failure” Nov 9, 2011
Live Q&A


       Thank You For Your Time!
     Randy Briggs                 Shekar Swamy
 508-698-9725 (Direct)         636-557-7777 X 2450
  617-834-1128 (Cell)           Cell: 610-639-0172

randy.briggs@kaseya.com   shekar.swamy@omegasecure.com
    www.kaseya.com            www.omegasecure.com

Contenu connexe

Tendances

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Secure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesSecure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesRNelson20
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing ServiceSymantec
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Jeff Hunter
 
IT Foundation Management Security
IT Foundation Management SecurityIT Foundation Management Security
IT Foundation Management SecurityTDiTechnologies
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersMichael Davis
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorCamilo Fandiño Gómez
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 

Tendances (20)

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Secure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesSecure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed Services
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
 
IT Foundation Management Security
IT Foundation Management SecurityIT Foundation Management Security
IT Foundation Management Security
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 

Similaire à Retail IT 2013: Data Security & PCI Compliance Briefing

Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!
Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!
Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!Kaseya
 
Coffee on Kaseya - Houston
Coffee on Kaseya - HoustonCoffee on Kaseya - Houston
Coffee on Kaseya - HoustonKaseya
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...☁️Carl Nakamura [MSFT]☁️
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010Andris Soroka
 
Cloud os and management overview of windows server 2012 and system center 2...
Cloud os and management   overview of windows server 2012 and system center 2...Cloud os and management   overview of windows server 2012 and system center 2...
Cloud os and management overview of windows server 2012 and system center 2...☁️Carl Nakamura [MSFT]☁️
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
An Introduction to South Seas Corporation
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas CorporationEd Mohr
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 

Similaire à Retail IT 2013: Data Security & PCI Compliance Briefing (20)

Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!
Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!
Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!
 
Coffee on Kaseya - Houston
Coffee on Kaseya - HoustonCoffee on Kaseya - Houston
Coffee on Kaseya - Houston
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
 
HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010HTLV - DSS @Vilnius 2010
HTLV - DSS @Vilnius 2010
 
Cloud os and management overview of windows server 2012 and system center 2...
Cloud os and management   overview of windows server 2012 and system center 2...Cloud os and management   overview of windows server 2012 and system center 2...
Cloud os and management overview of windows server 2012 and system center 2...
 
Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
GTL RIM Offerings
GTL RIM OfferingsGTL RIM Offerings
GTL RIM Offerings
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Pci Req
Pci ReqPci Req
Pci Req
 
TruWest
TruWestTruWest
TruWest
 
Information Security
Information SecurityInformation Security
Information Security
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
An Introduction to South Seas Corporation
An Introduction to South Seas CorporationAn Introduction to South Seas Corporation
An Introduction to South Seas Corporation
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
CCTV Surveillance
CCTV SurveillanceCCTV Surveillance
CCTV Surveillance
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 

Plus de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Plus de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Retail IT 2013: Data Security & PCI Compliance Briefing

  • 1. Retail IT 2013: Data Security & PCI Compliance Briefing Kaseya and Omega
  • 2. Data Security and PCI Compliance: Leveraging Systems Management Automation to Stay Compliant Speakers Shekar Swamy President & Senior Security Strategist Omega Randy Briggs US Director – Retail, Hospitality & Leisure Kaseya
  • 3. Agenda • The Burden of Data Security & Compliance • The Process to Satisfy Card Brands and Security Assessment Firms • Key Areas To Pay Attention To • The Role of Systems Management Technology • ROI of an Integrated Solution • About Kaseya • Considerations & Recommendations • Helping You Bridge the Gaps • Q&A
  • 4. The Burden of Data Security & PCI Compliance omegasecure.com
  • 5. About Omega ATC  21-year history of performance in retail  Omega systems and services – widely used in the market  Helped many companies achieve compliance – Level 1, Level 2 and Level 4 merchants across the US  Highly secure Data Center to manage data security  Working relationship with major QSA firms  Participating Organization in the PCI council  NACS data security committee  SIGMA Resource and participant  Rapid deployment process
  • 6. Some of our Customers EDN, INC. Jaco Oil Company
  • 7. A Recent Experience       
  • 8. Actions taken by the Retailer      
  • 9. Lessons learned       
  • 11. Retail Challenges        
  • 12. The Process to Satisfy Card brands and Security Assessment Firms  Abcdef
  • 13. The Process to Satisfy Credit Card Companies & Security Assessors         omegasecure.com
  • 14. Who is responsible for your compliance?         omegasecure.com
  • 15. Key areas that Level 1 & 2 merchants need to pay attention to      
  • 16. Systems management complements Data Security             omegasecure.com
  • 17. The Stage… Retail Front End Payments Network Processor (Cards and LAN other traffic) Firewall/ Internet Router “BOS” LAN Payment In-store Appliance POS LAN Security Cameras Back Office PC omegasecure.com
  • 18. Data Security identifies issues across your network            omegasecure.com
  • 19. Kaseya Systems Kaseya Systems Omega Data Security Omega Data Security Omega PCI Compliance Management Management 1. 1. Systems Management, Data alerting Discovery Discovery Consolidated reporting and Assistance from Security Strategists 2. Security, PCI Compliance 2. Automatic Deployment Automatic Deployment Logs for system events Perform External/Internal scanning 3. 3. Auditing Auditing Secure/ encrypted remote control Written information Security policies sessions 4. 4. Monitoring Monitoring Password management Implement policies 5. 5. Network Monitoring Network Monitoring File integrity monitoring Logging – remote control, firewall, Event logs, FIM logs, Security logs, Patch logs, Anti-virus, Anti-spyware., Anti-malware 6. 6. Secure Remote Control Secure Remote Control Wireless Intrusion Detection Evidentiary Reports 7. 7. Desktop Policy Settings Desktop Policy Settings Adequate access controls Working relationships 8. 8. Disk Backup Disk Backup Patching of systems • QSA firms 9. 9. Reporting Reporting Internal & External Scanning • POS vendors, back office vendors 10. Software distribution 10. Software distribution Verification of POS system applications • Network Service Providers 11. Scripting for automation 11. Scripting for automation Anti-malware • Partnership with Microsoft of tasks of tasks 12. Desktop Migration 12. Desktop Migration Anti-virus and anti-spyware • Security Strategists 13. Directory Services 13. Directory Services Mobile device management 14. Imaging and Deployment 14. Imaging and Deployment 15. Help Desk Ticketing 15. Help Desk Ticketing
  • 20. Path forward - integrated solutions with a single pane of glass            omegasecure.com
  • 21. Implementation - two options      omegasecure.com
  • 22. Where’s Your ROI?  90% of your problems disappear  Your entire environment and systems function smoothly  Eliminate the need to hire more people  Automate hundreds of routine IT tasks –  set it and forget it  Data security that protects you  Rapid deployment  Scalable architecture – small, medium and large  Expert support from System Engineers and Security Strategists  Comply with 286+ controls
  • 23. The Kaseya Automated IT Systems Management Solution for Retail IT
  • 24. Private Global Company With 31 Offices In 20 Countries, 450+ employees, 15,000+ Customers , 53% Top 100 MSPs
  • 25. Our Vision “Providing Enterprise-Class IT Systems Management for Everybody”
  • 27. Unified Systems Management Event Management Automation Business Intelligence • Alerts / Notifications • Scheduling • Reporting • System Events • Procedures • Dashboards • Logs • API/Messaging • Interactive Data Views IT Configuration Management Business Continuity • Remote Management • Image Deployment • Image Backup • File & Folder Backup • Software Deployment • Desktop Migration • Image Virtualization • Power Management • Mobile Device Management Asset Management Service Delivery • Network Discovery • Directory Services • Service Desk/Ticketing • Policy Compliance • Hardware Inventory • Software Inventory • Policy Management • Time Tracking • Service Billing Security Systems Monitoring • Anti-Virus • Patch Management • Systems Checks & Alerts • SNMP Monitoring • Anti-Malware • Software Updates • Event Monitoring • Log Monitoring • Performance Monitoring • VM Monitoring
  • 28. Best Practice Management 100’s of Pre-Defined Views, Maintenance Routines, Policies and Automation Procedures • Device Views by Type  By OS Type/Ver  Exchange, SQL, IIS, etc • Maintenance Routines  PC and Server Optimization • Monitor Sets  Application Events/Logs  Hardware Thresholds  Up/Down Faults  Servers, Database, Exchange and Domains  3rd Party Backup, Security and Network Infrastructure (Out -Of-The-Box BP Configuration Wizard)
  • 29. Unified Security Protection is Critical • Endpoint security is achieved in layers:  Managed Antivirus/Antimalware  URL Filtering  Local Firewall  Device blocking  Application blocking  Logfile Monitoring  Regular System Audits  OS Patching  Application Patching  Remote System Tracking  System Wiping
  • 30. Security Considerations We’ve all heard the horror stories • In 2012 the Retail industry made up 45% of data breach investigations; a 15% increase from 2011 (Trustwave) • Average cost of a data breach is $5.5 million per breach – (Ponemon Institute) • Symantec source code stolen recently  PC-Anywhere – stop using • Uninstall/Disable Java everywhere if possible • Dexter Malware – POS systems IS the target • The number of new endpoint malware Kaspersky sees on a daily basis averages about 71,000 Targeted attacks will continue…
  • 31. Security Considerations • Network Perimeter Disappearing • Endpoint IS the Target (including mobile) • Compromised Endpoint = Compromised EVERYTHING (including cloud) • AV is NOT a commodity • Security is not ONLY Anti-virus • Layered Security is Important • Monitoring and Remediation as Part of the Solution Retail E-Commerce Websites and POS Systems are a Prime Target
  • 32. Recommendations • Bridge the Points of IT Service Disconnect (Silos)  the total solution is much better than the sum of its parts • Centralize Management even if you have Decentralized Roles • Gain complete visibility and control of remote systems (on/off your network) • Be proactive not reactive (monitoring and alerting is not good enough if you can’t quickly remediate) • Choose partners and technology providers who specialize in your industry Systems Management Suite Will Help You Take Security To The Next Level
  • 33. Recommendations • Embrace Systems Management AUTOMATION  Routine repetitive tasks (set it and forget it)  Proactive remediation (diagnostics, executables & processes)  Extensibility & integration w/ other systems  Customized services to your environment  Rules, Checks & Balances (if, then, else logic)  The best policies are those that can be enforced Manage thousands of systems as easily as you can manage one system
  • 34. “Not a Question of If – But When” • It’s not a question of if – but when – your organization will experience a serious security breach  Even enterprises with the most mature security organizations and advanced security controls can’t prevent every single breach Source: Forrester, “Planning For Failure” Nov 9, 2011
  • 35. Live Q&A Thank You For Your Time! Randy Briggs Shekar Swamy 508-698-9725 (Direct) 636-557-7777 X 2450 617-834-1128 (Cell) Cell: 610-639-0172 randy.briggs@kaseya.com shekar.swamy@omegasecure.com www.kaseya.com www.omegasecure.com

Notes de l'éditeur

  1. Good morning, or good afternoon or good evening everyone depending on which time zone you might be in right now. Welcome to the Kaseya and Omega Data Security and PCI Compliance Briefing and taking time out of your busy day to join us on such an important topic, especially for the retail industry. Since we have a lot to cover, we’re going to go ahead and get started. Please feel free to submit your questions through the webinar chat session and we’ll do our best to answer as many of them as we have time for at the end of this presentation.(Next Slide)
  2. My name is Randy Briggs and I’m one of your speakers today. I’mthe US Director of our Retail Solutions vertical at Kaseya. Kaseya is an industry leading provider of IT Systems Management solutions and a visionary leader on Gartner’s magic quadrant for client management tools. Our solutions are widely adopted in the Retail industry among others to help companies achieve measurable and sustained improvements in IT Service delivery, cost containment and risk mitigation as it relates to systems management, security and compliance.I am joined today with Shekar Swami who is the President and Senior Security Strategist at Omega. Omega is a recognized provider of data security solutions and services that help retailers of all sizes overcome their systems management and security challenges. Through a combination of their solutions, security expertise and services using the Kaseya platform, Omega helps companies quickly build a foundation for success by assisting them with accelerating and maintaining PCI compliance. Shekar, thank you for joining me today.(Next Slide)
  3. Here is our agenda for today’s session:I am going to provide a brief overview of Kaseya and more importantly review the important role that IT Systems Management solutions plays in helping you achieve complete visibility and control of your distributed infrastructure and helping you take IT services and data security and compliance to the next level.Throughout our respective presentations, both Shekar and I will be pointing out specific security issues and challenges the retail industry is faced with and we’ll be suggesting recommendations based on best practices and our own experiences working with hundreds of retailers that you may want to consider implementing for your specific environment and situation to help bridge the gaps.(Next Slide)
  4. Good morning, or good afternoon or good evening everyone depending on which time zone you might be in right now. Welcome to the Kaseya and Omega Data Security and PCI Compliance Briefing and taking time out of your busy day to join us on such an important topic, especially for the retail industry. Since we have a lot to cover, we’re going to go ahead and get started. Please feel free to submit your questions through the webinar chat session and we’ll do our best to answer as many of them as we have time for at the end of this presentation.(Next Slide)
  5. Kaseya is a privately held global company who started in the year 2000 and has realized significant year over year growth over the last 12 years. We have over 30 offices located in 20 countries, we employ over 450 employees and have over 15,000 customers who use our technology every day to manage millions of IT assets. As I mentioned in my introduction, Kaseya is a leader on Gartner’s Magic Quadrant for client management tools and along with our corporate clients who deploy our solution in-house, we have a significant market share of the Managed Services industry who provide IT services to their customers as an outsourced service…like Shekar and his team of security experts at Omega. Currently 53 of the top 100 global MSPs use Kaseya to provide outsourced IT services to their clients. The solution is totally re-brandable to look and feel like it’s your own custom service application.Kaseya, in case you’re wondering what that means, is a Native American word that means to secure and protect. So to net it out, our sole focus and vision has been, and continues to be, to help companies and IT Service providers secure, protect and manage their IT assets and distributed networks.(Next Slide)
  6. Our Vision is to provide Enterprise-Class IT Systems Management for Everybody. So whether you’re a small IT group who manages a hundred systems or a larger IT organization managing tens of thousands of systems, you can leverage the same functionality & best practices and experience the power of systems management automation to optimize IT service operations and lower your cost of service delivery regardless of your size or what industry you’re in.The other critical component of executing on this vision is to provide solutions that are Fast to implement and deploy (a few weeks vs. months); Easy to use and manage that will help you be more productive; and Affordable so it will fit your budget…but also to provide a solution that is flexible and scalable to adapt to changing technologies and will grow with you as your company grows and as your IT service needs change over time.This is best represented on the next slide describing the Kaseya Architecture(Next Slide)Fast; companies are able to implement in a very short period of time (a few weeks vs. months) and deploy across their entire environment within hours vs. days or weeksEasy to use and easy to manage; bringing your core service functions and tasks you perform on a daily basis together in a single pane-of-glass, giving you complete visibility & control of all your assets in one place and an intuitive interface that makes it very easy to use, the ability to leverage best practices and IT service automation to help you be more productive and do your job 10 times easier, and the ability to create your own reports and make system-wide changes on the fly.Affordable: Cost is based on number of endpoints you manage and service functions you choose; and customers have the choice of In-house or hosted SaaS subscription models to fit your budget and preferences.TechValidate, an independent survey company recently surveyed our customers and a high percentage of them realized a positive ROI within the first 6 months but can be as quick as only a few months depending on your situation.(Next Slide)
  7. Kaseya was developed from the ground-up with security in mindThe core framework or architecture is as important as the solutions built on top of itOur developers and engineers bring decades of experience designing secure systems for Government and Commercial applications across all industries including Banking and Financial Institutions, Education, Healthcare, and of course Retail among othersBack in 2000 our company was formed when our founders won a bid with the NSA who needed a secure architecture to deliver IT services to their remote systems from anywhere whether those assets were on or off their network. The result is what you see in this diagram.A small lightweightAgent gets deployed on the endpoint which initiates all communications back to your server and will not accept any inbound connectionsVirtually impossible for a 3rd party application to attack the agent from the networkAES 256 encryptedcommunications tunnel between the agent and the Kaseya server (no reliance on VPNs, appliances, or multiple port schemes)Proprietary and Patented algorithms for secure and efficient communications - Rolling key every time the server tasks the agent/endpointNo plain-text data packets passing over the network - nothing available for an attacker to exploitThe Kaseya web console (VSA) fully supports operating as an SSL web site
  8. We provide all of the content for you out of the box to help you get up and running quickly based on best practices configuration wizards, and allow you the flexibility to tweak these or build your own content and agent procedures (automation) as needed.
  9. Having all these services unified, integrated and feeding information to each other working in concert with each other provides a higher level of systems management vs. having disparate silo’d tools that don’t talk to each other or work together. You have a much higher level of visibility, control and intelligence over your environment allowing you to be much more efficient in delivering services, being proactive in identifying and remediating issues.
  10. We’ve all heard the horror stories – but the intent here is not to throw any particular retailer or brand under the bus. Let any retailer who hasn’t been through a security issue or breach cast the first stone! This first statistic is a big eye opener and reinforces the fact that the cybercriminals are attacking where the money is…intellectual and personal property and cardholder data.When it comes down to your intellectual property, your brand reputation and customer loyalty you don’t want to be tomorrow’s news about a security breach…and it costs a lot of money to recover as seen here that the average cost of a data breach is $5.5 Million per breach.Hackers are not only targeting the endpoint to penetrate your network and shoplift your data, they clearly are going after companies that create cyber-security applications … and that’s a trend that will continue.A few other key takeaways from the just released Trustwave 2013 Global Security Report was that - 63% of investigations revealed that it was a third-party provider that introduced security deficiencies easily exploited by hackers…and E-commerce sites accounted for 48% of all investigationsIt is clear that these targeted attacks will continue and the Retail Industry is a prime target
  11. Companies have done a good job in securing the network perimeter; so much so that the hackers aren’t spending their time going after the data center; but with the highly distributed nature of retail, there’s so much more to consider when it comes to security protection. Hackers know the endpoint is often the easiest path to gain entry into the retailer’s network and data.Clearly with a new generation of shoppers,increases in E-Commerce, tablets and mobile device usage, mobile payments, social media tools are all representing new security challenges for retailers. The retailer is forced to fight an advanced battle – often with platforms that work against them. Another key takeaway from the Trustwave report is that Mobile malware increased 400%, with malware found on Android devices growing from 50,000 to more than 200,000 samples.
  12. The questions you need to ask yourself is how quickly can you respond. Another interesting statistic from the Trustwave Global Security report was that 64% of organizations attacked took more than 90 days to detect an intrusion with the average time for detection being 210 days!So, how can you ensure early detection and do you have the tools and systems in place for quick remediation of incidents? How can you stay protected from the ever-growing global network of hackers? How quickly can you recover from what appears to be the inevitable security or compliance disaster that has the ability to damage or even destroy your brand reputation? How quickly can you detect, remove, uninstall, prevent access, re-deploy, avoid viruses from spreading to other systems…across hundreds or thousands of endpoints across your entire infrastructure?Just as having a good disaster recovery plan to get back to normal operations when a natural or man-made disaster strikes, when it comes to security and compliance, QUICK action is the key and you need a platform, an architecture, and a concert of service functions (Audit/Inventory, Patching, AV, AM, Monitoring & Remediation, your service desk…all your layered security components) working together to remediate as quickly as possible.
  13. Common myths & misconceptions of Automation:Scheduling Only – scheduling certain things to run at certain times (patches, AV & software updates, auditing, etc.)Automation is only used for routine maintenance tasksI need to have a script-God on my staff with a certain scripting language skill setWe’ve already spent too much time creating our own custom scripts and don’t want to start over recreating themI’m going to automate myself out of a job – replacing manual typewriters with electronic typewriters and then word processing applications never replaced the typist, just like Excel spreadsheets didn’t replace the number crunchers! Automation doesn’t mean replacing the human element; it’s a solution that makes your job easier and makes you more productive and allows you to take your skill sets and services to a higher level! Using the excel spreadsheet analogy, when you change a formula in one cell you want it to update the entire spreadsheet – the same concept applies across your entire infrastructure or across groups of machines, locations, types, etc.We’ve actually had people tell us when they left their job to work for another company, a major consideration when choosing their new employer was if they use Kaseya! When you have your house in order, it’s easier to attract and retain good skills and talentSo now that we explored the myths and what Automation is not…let’s explore the power of true ITSM Automation
  14. So it comes down to “not a question of if…but when” your organization will experience a serious security breach. An interesting recent survey from Forrester on this subject revealed:During the past 12 months, 25% of IT security decision-makers and influencers reported at least one breach of their sensitive information; but interesting to note that 21% of respondents didn’t feel comfortable answering that question – a testament to just how sensitive enterprises have become to the potential economic impact and damage to corporate reputation of a publicized security breach.In the same report, Forrester believes that even among those respondents that reported no breaches in the past 12 months, many of them suffered a breach – they just don’t know it.It’s important to realize that you need technology solutions to assist with compliance. In the case of PCI, there are many requirements that have to do with policies and procedures unrelated to technology but there other areas where you need to rely on technology to help you get and stay compliant. Having said that, just because you’re PCI compliant doesn’t mean your environment is secure and conversely, just because your systems and networks are secure doesn’t mean you’re in compliant. You need both, and that’s where the partnership between Kaseya and Omega comes in. To provide a blended approach where you can leverage the best technology along with a team of highly experienced security and compliance specialists to help you be successful in this on-going security battle.