SlideShare une entreprise Scribd logo
1  sur  24
1
SolarWinds® Security Updates
Partner Training
Clare Kavanagh, Channel Accounts Manager
Aravind Kurapati, APAC Geek
June 2013
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
2
» Who we are!
» How to discovery security needs
» Firewall Security Manager (FSM)
» Log & Event Manager (LEM)
» Network Configuration Manager (NCM)
**We are trying to cover a lot in this presentation! Please use
the question box in the gotomeeting if anything needs
clarification or a question comes up.
2
Agenda
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
3
SolarWinds – Who we are
Provide IT management software
that is powerful, easy-to-use and
affordable
Company background
Timeline 1999 Founded in Tulsa, OK
2005 Professional Investment
2006 Hired Management Team
2009 IPO (NYSE:SWI)
Headquarters Austin, Texas; over 500
employees worldwide
Customers Over 95,000 – from SMB to
Fortune 500
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
4
HELP!!!
4
My firewall rules are getting out of control! I need to be sure there
are no holes in my configs! I need to know my network is protected!
Web server logs, OS logs, application logs, firewall
logs…it’s impossible to read through all of them!
Network configuration changes, device backups, inventory
maintenance, compliance reporting…I can’t keep up!
Mobile devices are everywhere! I can’t keep track
of which devices are safe and which aren’t!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
5
Firewall
Management
How often do you analyze your firewall configurations?
How do you know if your firewalls rules are optimized for both security & performance?
How do you test a firewall addition or change to ensure it doesn’t have a negative impact?
How do you perform security audits and compliance reporting?
Log Management
How many log file sources do you review and how often do you review them?
How do you know if a breach has occurred and can you respond immediately?
How do you handle multiple-event correlation to detect anomalous behavior?
How do you handle security and compliance reporting?
Configuration
Management
How often do you backup the configuration files on your devices?
How do you go about deploying configuration changes/updates to multiple devices?
How quickly can you recover a device from a failed updated or config change?
How are you alerted when a network change is made or a configuration policy violated?
Questions to Consider
5
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
6
Firewall Security Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
7
The Problem
As organizations grow and firewall rules become more and more complex, it’s
easy for engineers to overlook existing rules and inadvertently open security
holes simply by not knowing the full impact of their changes.
Let's be honest, some firewall rule sets have grown so large and unmanageable,
it's become virtually impossible to decipher what's going on with the naked eye.
7
“Through 2018, more
than 95% of firewall
breaches will be
caused by firewall
misconfigurations,
not firewall flaws.”
Gartner research,
November 28, 2012
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
8
The Need for Easy Firewall Management
Which way would you rather manage your firewall configurations?
Point-&-Click ManagementComplex Command Line
OR
8
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
9
Firewall Management Best Practices
 Document all firewall rules and changes
 Configure firewall rules with minimal access rights
 Ensure all rules have business justification
 Implement a change-control policy
 Remove unused and redundant rules
 Perform firewall rule audits on an ongoing basis
 Log all pertinent firewall activity
 Back up firewall configuration files and logs regularly
 Automate, automate, automate!
9
SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
10
5 Ways SolarWinds FSM Can Help
1. Clean up and remove redundant, unused and conflicting rules
2. Scan your inventory for high risk firewalls and assess your risk
profile in minutes
3. Understand network policy through a unified view of connectivity,
routing, and the security rules responsible for allowing or blocking
network access
4. Know beforehand how a rule change will impact rules/objects,
traffic flows, and security checks
5. Troubleshoot service availability problems without touching
production devices
10
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
11
Log & Event Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
12
The Problem
Log files are generated across almost all of your IT assets—web server
logs, operating system logs, application logs, firewall logs, and more.
And, all of these log files need to be collected, stored, analyzed, and
effectively correlated for security, compliance, and troubleshooting
purposes.
12
Trying to sort through and decipher all
these logs manually is virtually impossible!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
13
Log Management Best Practices
 Define your log management policies and procedures
 Log all relevant and required data (but don’t “over-log”)
 Centrally aggregate all logged data
 Review logs on a regularly scheduled basis
 Correlate events across all log sources
 Perform real-time monitoring and alerting
 Run regularly scheduled security and compliance reports
 Store logs securely and retain for the required amount of time
 Automate, automate, automate!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
14
5 Ways SolarWinds LEM Can Help
1. Centralized collection of network device, machine, and cloud logs with
real-time, in-memory log correlation to instantly view security breaches
2. Built-in active responses to immediately and automatically take action
to mitigate threats
3. Advanced, easy-to-use, search interface with data visualization tools
that go well beyond ineffective traditional search bars
4. Over 300 out-of-the-box, “audit-proven” security and compliance
templates including PCI, HIPAA, SOX, GLBA and many more
5. USB defender technology protects sensitive data from with real-time
monitoring, detection notification and the ability to block usage
14
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
15
Network Configuration Manager
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
16
The Problem
As enterprise networks grow in both size and complexity, the difficulty in
managing all the device configuration changes that are happening
throughout the IT infrastructure grows exponentially.
Manually logging in to each device separately to make changes or updates
means the likelihood of human error that can lead to policy violations,
unauthorized network access, and the possibility of a security breach.
Can you afford to take that chance?
16
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
17
The Need for Easy Network Config Management
Which way would you rather manage your network devices?
OR
17
Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
18
Configuration Management Best Practices
 Create standards-based IT security and access policies
 Implement a change management process to document and track all
changes to the network
 Establish role-based permissions to control who can make what change
 Backup critical network device configurations nightly and have a device
recovery plan in place
 Perform continuous monitoring with real-time change detection alerts
 Enforce policies with regularly scheduled security and compliance audits
 Validate and maintain policies and procedures through ongoing data
analysis and reviews
 Automate, automate, automate!
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
19
5 Ways SolarWinds NCM Can Help
1. Automated device configuration management and bulk change management
to save time, reduce errors, and reduce the risk of costly network downtime
2. Automatic, scheduled backups of network configurations so your critical
devices are always protected
3. Configuration comparison and immediate rollback of failed changes to
instantly recover a device to a previous “known good” state
4. Real-time change detection and alerts to protect against policy violations,
unauthorized, unscheduled, and erroneous configuration changes
5. Out-the-box compliance reports, along with automated network inventory
reports customizable to your networks needs
19
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
20
How to Promote and Sell
» Deals and Opportunities - Additional margin may be available for net new deals.
Contact us with your opportunities as soon as you have them for special pricing
PartnersAPAC@solarwinds.com
» Leads – Generate your own leads using custom coded download links for your customers.
Leads will be automatically tagged to you. Request custom links from
PartnersAPAC@solarwinds.com
» Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partners
Sales and Technical training
 Videos
 Sales cards
 Presentations
Current end-user price list
Demo License (NFR) application
Branding, logos, box shots, screenshots
What’s New section for up-to-date information
14
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
21
Demo Sites
» NCM
 http://configuration.demo.solarwinds.com
» FSM
 http://demo.solarwinds.com/flashdemo/fsm
» LEM
 http://demo.solarwinds.com/flashdemo/lem
21
22
© 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Summary and Q & A
» Clare Kavanagh, Channel Accounts Manager
Clare.Kavanagh@solarwinds.com
» Aravind Kurapati, APAC Geek
» Aravind.Kurapati@solarwinds.com
» Join our community of 150,000+ IT pros at www.thwack.com
Thank you for attending!
22
23
Q&A
Questions?
23
© 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
24
Thank You
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered
with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other
SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United
States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or
are trademarks or registered trademarks of their respective companies.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
24

Contenu connexe

Tendances

Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
Dirk Cipido
 

Tendances (20)

Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 

Similaire à APAC Partner Update: SolarWinds Security

Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
SolarWinds
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
WilheminaRossi174
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
Samuel Loomis
 

Similaire à APAC Partner Update: SolarWinds Security (20)

How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWindsFederal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Federal Webinar: RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 

Plus de SolarWinds

Plus de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

APAC Partner Update: SolarWinds Security

  • 1. 1 SolarWinds® Security Updates Partner Training Clare Kavanagh, Channel Accounts Manager Aravind Kurapati, APAC Geek June 2013 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 2. 2 » Who we are! » How to discovery security needs » Firewall Security Manager (FSM) » Log & Event Manager (LEM) » Network Configuration Manager (NCM) **We are trying to cover a lot in this presentation! Please use the question box in the gotomeeting if anything needs clarification or a question comes up. 2 Agenda © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 3. 3 SolarWinds – Who we are Provide IT management software that is powerful, easy-to-use and affordable Company background Timeline 1999 Founded in Tulsa, OK 2005 Professional Investment 2006 Hired Management Team 2009 IPO (NYSE:SWI) Headquarters Austin, Texas; over 500 employees worldwide Customers Over 95,000 – from SMB to Fortune 500 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 4. 4 HELP!!! 4 My firewall rules are getting out of control! I need to be sure there are no holes in my configs! I need to know my network is protected! Web server logs, OS logs, application logs, firewall logs…it’s impossible to read through all of them! Network configuration changes, device backups, inventory maintenance, compliance reporting…I can’t keep up! Mobile devices are everywhere! I can’t keep track of which devices are safe and which aren’t! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 5. 5 Firewall Management How often do you analyze your firewall configurations? How do you know if your firewalls rules are optimized for both security & performance? How do you test a firewall addition or change to ensure it doesn’t have a negative impact? How do you perform security audits and compliance reporting? Log Management How many log file sources do you review and how often do you review them? How do you know if a breach has occurred and can you respond immediately? How do you handle multiple-event correlation to detect anomalous behavior? How do you handle security and compliance reporting? Configuration Management How often do you backup the configuration files on your devices? How do you go about deploying configuration changes/updates to multiple devices? How quickly can you recover a device from a failed updated or config change? How are you alerted when a network change is made or a configuration policy violated? Questions to Consider 5 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 6. 6 Firewall Security Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 7. 7 The Problem As organizations grow and firewall rules become more and more complex, it’s easy for engineers to overlook existing rules and inadvertently open security holes simply by not knowing the full impact of their changes. Let's be honest, some firewall rule sets have grown so large and unmanageable, it's become virtually impossible to decipher what's going on with the naked eye. 7 “Through 2018, more than 95% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.” Gartner research, November 28, 2012 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 8. 8 The Need for Easy Firewall Management Which way would you rather manage your firewall configurations? Point-&-Click ManagementComplex Command Line OR 8 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 9. 9 Firewall Management Best Practices  Document all firewall rules and changes  Configure firewall rules with minimal access rights  Ensure all rules have business justification  Implement a change-control policy  Remove unused and redundant rules  Perform firewall rule audits on an ongoing basis  Log all pertinent firewall activity  Back up firewall configuration files and logs regularly  Automate, automate, automate! 9 SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 10. 10 5 Ways SolarWinds FSM Can Help 1. Clean up and remove redundant, unused and conflicting rules 2. Scan your inventory for high risk firewalls and assess your risk profile in minutes 3. Understand network policy through a unified view of connectivity, routing, and the security rules responsible for allowing or blocking network access 4. Know beforehand how a rule change will impact rules/objects, traffic flows, and security checks 5. Troubleshoot service availability problems without touching production devices 10 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 11. 11 Log & Event Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 12. 12 The Problem Log files are generated across almost all of your IT assets—web server logs, operating system logs, application logs, firewall logs, and more. And, all of these log files need to be collected, stored, analyzed, and effectively correlated for security, compliance, and troubleshooting purposes. 12 Trying to sort through and decipher all these logs manually is virtually impossible! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 13. 13 Log Management Best Practices  Define your log management policies and procedures  Log all relevant and required data (but don’t “over-log”)  Centrally aggregate all logged data  Review logs on a regularly scheduled basis  Correlate events across all log sources  Perform real-time monitoring and alerting  Run regularly scheduled security and compliance reports  Store logs securely and retain for the required amount of time  Automate, automate, automate! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 14. 14 5 Ways SolarWinds LEM Can Help 1. Centralized collection of network device, machine, and cloud logs with real-time, in-memory log correlation to instantly view security breaches 2. Built-in active responses to immediately and automatically take action to mitigate threats 3. Advanced, easy-to-use, search interface with data visualization tools that go well beyond ineffective traditional search bars 4. Over 300 out-of-the-box, “audit-proven” security and compliance templates including PCI, HIPAA, SOX, GLBA and many more 5. USB defender technology protects sensitive data from with real-time monitoring, detection notification and the ability to block usage 14 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 15. 15 Network Configuration Manager © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 16. 16 The Problem As enterprise networks grow in both size and complexity, the difficulty in managing all the device configuration changes that are happening throughout the IT infrastructure grows exponentially. Manually logging in to each device separately to make changes or updates means the likelihood of human error that can lead to policy violations, unauthorized network access, and the possibility of a security breach. Can you afford to take that chance? 16 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 17. 17 The Need for Easy Network Config Management Which way would you rather manage your network devices? OR 17 Manual SSH or Telnet™ to Each Device Point-&-Click Web-Based Management © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 18. 18 Configuration Management Best Practices  Create standards-based IT security and access policies  Implement a change management process to document and track all changes to the network  Establish role-based permissions to control who can make what change  Backup critical network device configurations nightly and have a device recovery plan in place  Perform continuous monitoring with real-time change detection alerts  Enforce policies with regularly scheduled security and compliance audits  Validate and maintain policies and procedures through ongoing data analysis and reviews  Automate, automate, automate! © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 19. 19 5 Ways SolarWinds NCM Can Help 1. Automated device configuration management and bulk change management to save time, reduce errors, and reduce the risk of costly network downtime 2. Automatic, scheduled backups of network configurations so your critical devices are always protected 3. Configuration comparison and immediate rollback of failed changes to instantly recover a device to a previous “known good” state 4. Real-time change detection and alerts to protect against policy violations, unauthorized, unscheduled, and erroneous configuration changes 5. Out-the-box compliance reports, along with automated network inventory reports customizable to your networks needs 19 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 20. 20 How to Promote and Sell » Deals and Opportunities - Additional margin may be available for net new deals. Contact us with your opportunities as soon as you have them for special pricing PartnersAPAC@solarwinds.com » Leads – Generate your own leads using custom coded download links for your customers. Leads will be automatically tagged to you. Request custom links from PartnersAPAC@solarwinds.com » Training & Marketing Materials - Register for Partner Portal at solarwinds.com/partners Sales and Technical training  Videos  Sales cards  Presentations Current end-user price list Demo License (NFR) application Branding, logos, box shots, screenshots What’s New section for up-to-date information 14 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 21. 21 Demo Sites » NCM  http://configuration.demo.solarwinds.com » FSM  http://demo.solarwinds.com/flashdemo/fsm » LEM  http://demo.solarwinds.com/flashdemo/lem 21
  • 22. 22 © 2012 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Summary and Q & A » Clare Kavanagh, Channel Accounts Manager Clare.Kavanagh@solarwinds.com » Aravind Kurapati, APAC Geek » Aravind.Kurapati@solarwinds.com » Join our community of 150,000+ IT pros at www.thwack.com Thank you for attending! 22
  • 23. 23 Q&A Questions? 23 © 2013 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 24. 24 Thank You The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 24

Notes de l'éditeur

  1. A firewall is considered a network’s “first line of defense” in protecting sensitive data from unauthorized access. It’s the entry point of the network—determining what is allowed in and out.Without the proper firewall rules in place, your network is left exposed and vulnerable. It’s like leaving your front door open for anyone to come in and take what they want.This is why firewall configuration management is so crucial. Without it, access to your network can become a free-for-all! And, it’s important to remember that SECURITY IS AN ON-GOING PROCESS, NOT A ONE-TIME PROJECT, which makes firewall management even more important!
  2. NCM provides automated network configuration and change management to reduce the risk of human error and save you time and money. No more having to manually SSH or Telnet to each device. Do everything from one easy-to-use, centralized web interface. Detect and report on configuration policy violations and deliver real-time alerts