SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
REMOTE NETWORK MONITORING SOFTWARE
FOR SMALL- TO MID-SIZED COMPANIES


    Latest Software Trends in Protecting
      ROI, Client Data, and Revenues
Tricks of the Data Trade: Remote Monitoring to Safeguard Security
In December 2008, the US Dept. of Defense began banning flash drives and other portable devices –
iPODs, etc – from DOD computing facilities. For fear of data loss or damage, and difficulty in
monitoring employee data theft. After one embarrassing incident in US-Asian battlefield plans went
missing. DOD has gone back and forth on the use of flash sticks and other portable devices, for
almost two years now, and may be relaxing this specific ban – it is very difficult to enforce, and
controversial – but not its focus on overall network monitoring, for data security and loss
prevention.

If DOD has issues keeping its data safe … imagine how much more difficult this task, for the average
small- to mid-sized business. And while most small businesses are not stowing remote battlefield
plans or weapons arming codes on their servers, they may have information almost as critical, to
their clients: years of client tax records, scanned dental x-rays or dental records (invaluable, in
forensic inquiries), medical histories, or manufacturing data, etc.

While most banks and financial institutions have prohibited employee usage of flash drives or other
external devices for some time – not just for fear of intentional data theft, or sensitive client record
theft (data outflow), but also for fear of introduction of malware or virus damage (data input) – this
trend is only recently catching on in government facilities. Most government entities lagging far
behind the financial sector, in terms of data protection. Or database integration.

(Where there is no database integration, there are no checks and balances on data integrity: data
can go missing, or be corrupted, or altered, without alarm or other back-up notification.)

So, how can companies safeguard their in-house data stores? Their confidential and private company
and client data, the invaluable backbone of any business? Both from loss / theft / compromise, as
well as an increased risk of malware, spyware, registry corruption, and other illegal software
damage being introduced into the company network, through unsupervised employee devices?

Security Monitoring in an Era of Fraud




                      Imaging Network Technology N-able Monitoring Software
The proliferation of consumer devices such as iPods, flash sticks, flash drives, iPhones, Droids, etc.,
has dramatically increased the risk of intentional and unintentional leaks, theft, and other
malicious activity. While most companies have anti-virus software, firewalls, email and web content
security to protect against external threats, few realize how easy it is for an employee to simply
walk in and copy large amounts of sensitive data onto an iPod or USB stick. It takes roughly 1
minute, to easily copy several years of sensitive client or company data – financials, bank records,
technical plans, battlefield arena scenarios, code – onto an 8 or 10mg flash stick.

It takes roughly 5 seconds to scan a screen full of sensitive material, from PC screen to smart
phone. In such cases, there is no external device or USB port alert possible, and security monitoring
must rely on keystroke capture, or time on screen alerts. Most small businesses lack the IT
sophistication and staff, to even even aware of such dangers, let alone, to successfully monitor for
them. And to monitor for such threats in a manner which does not jeopardize or violate employee or
contractor rights, in the worksite, or from remote locations. As telecommuting rises in popularity, so
has the opportunity for corporate security and network breaches.

Whereas companies used to have to monitor just on-site usage of company computers, operating on
1-2 dedicated lans, in just a few building sites; today they are called on to monitor remote dial-up
or citrix client sessions from literally, around the world. That poses a huge challenge, for most IT
departments.
What if you are a small company – an elite architectural or engineering firm, with jobs and
consultants around the globe, frequently traveling – without a dedicated IT staff? Or a small
manufacturing firm, with parts of your production line outsourced to India, or Asia, as is increasingly
common? How then, to ensure server and network security?

One is certainly not going to put cameras in all airports, to ensure that contractors tapping into a
company session do not download data onto a private flash stick.

One solution would be for the company's IT administrator to lock down all ports – a difficult, time-
consuming and expensive solution. Another would be to use remote monitoring, operated either by
an in-house IT staff, or a remote IT contractor – a Managed Service Provider (MSP) specializing in IT
server and network monitoring and maintenance.

Remote monitoring software is becoming more and more saavy, in terms of security and
performance monitoring capabilities. Risky or questionable user sessions may be flagged by using
screenshot capabilities that unobtrusively capture user activities, keyed either for random or time
interval capture; or remote monitoring may be keyed to activate with the use of certain key words
or phrases, capturing both user activity and screen activity – as when a user types in a search word,
or utilizes a key data sequence in desktop activity, or attempts to copy key data – to help control
data leaks, and protect sensitive company and client data.

It is not enough to capture potential risks or breaches, however: these screen captures or other
security risks, by either internal (personnel, authorized users) or external actors, must be
correlated into patterned reports, and flagged immediately to senior management.

Top Network Security Risks

In December 2010, Cisco listed the following as the top computing security risks (if this list doesn't
have you scrambling for the nearest MSP to sign an immediate contract...) :

Malware: Malware is short for ―malicious software.‖ Wikipedia describes malware as a term used
to mean a ―variety of forms of hostile, intrusive, or annoying software or program code.‖ Malware
could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all of
which are defined below.
Computer virus: A computer virus is a small piece of software that can spread from one infected
computer to another. The virus could corrupt, steal, or delete data on your computer—even erasing
everything on your hard drive. A virus could also use other programs like your email program to
spread itself to other computers.
Rogue security software: Have you ever seen a pop-up window that advertises a security update or
alert? It appears legitimate and asks you to click on a link to install the ―update‖ or ―remove‖
unwanted malicious software that it has apparently detected. This could be rogue security software
designed to lure people into clicking and downloading malicious software. Microsoft has a useful
webpage that describes rogue security software and how you can protect yourself.
Trojan horse: Users can infect their computers with Trojan horse software simply by downloading
an application they thought was legitimate but was in fact malicious. Once inside your computer, a
Trojan horse can do anything from record your passwords by logging keystrokes (known as a
keystroke logger) to hijacking your webcam to watch and record your every move.
       Cisco further noted that, ―In February 2010, a Guardian Analytics and Ponemon Institute
       study of 500 small businesses in the U.S. found that 55 percent of respondents experienced
       a fraud attack in the last 12 months. The study reports that ―…[w]ell-funded cyber criminals
       executed a full-scale assault on authentication, leveraging widespread infection of end-user
       computers with banking Trojans to sneak into online banking accounts completely
       undetected.‖
Malicious spyware: Malicious spyware is used to describe the Trojan application that was created by
cybercriminals to spy on their victims. An example would be keylogger software that records a
victim’s every keystroke on his or her keyboard. The recorded information is periodically sent back
to the originating cybercriminal over the Internet. Keylogging software is widely available and is
marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage.
Computer worm: A computer worm is a software program that can copy itself from one computer
to another, without human interaction. Worms can replicate in great volume and with great speed.
For example, a worm can send copies of itself to every contact in your email address book and then
send itself to all the contacts in your contacts’ address books.
       Because of their speed of infection, worms often gain notoriety overnight infecting
       computers across the globe as quickly as victims around the world switch them on and open
       their email. This happened with the Conficker worm (also known as Downadup), which, in
       just four days, had more than tripled the number of computers it infected to 8.9 million.
Botnet: A botnet is a group of computers connected to the Internet that have been compromised
by a hacker using a computer virus or Trojan horse. An individual computer in the group is known as
a ―zombie― computer.
       The botnet is under the command of a ―bot herder‖ or a ―bot master,‖ usually to perform
       nefarious activities. This could include distributing spam to the email contact addresses on
       each zombie computer, for example. If the botnet is sufficiently big in number, it could be
       used to access a targeted website simultaneously in what’s known as a denial-of-service
       (DoS) attack. The goal of a DoS attack is to bring down a web server by overloading it with
       access requests. Popular websites such as Google and Twitter have been victims of DoS
       attacks.
Spam: Spam in the security context is primarily used to describe email spam —unwanted messages
in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter your mailbox as
well as potentially take up space on your mail server. Unwanted junk mail advertising items you
don’t care for is harmless, relatively speaking. However, spam messages can contain links that when
clicked on could go to a website that installs malicious software onto your computer.
Phishing: Phishing scams are fraudulent attempts by cybercriminals to obtain private information.
Phishing scams often appear in the guise of email messages designed to appear as though they are
from legitimate sources. For example, the message would try to lure you into giving your personal
information by pretending that your bank or email service provider is updating its website and that
you must click on the link in the email to verify your account information and password details.
Rootkit: According to TechTarget, a rootkit is a collection of tools that are used to obtain
administrator-level access to a computer or a network of computers. A rootkit could be installed on
your computer by a cybercriminal exploiting a vulnerability or security hole in a legitimate
application on your PC and may contain spyware that monitors and records keystrokes.
       Rootkits gained notoriety when, in 2005, a security blogger discovered that a copy-protection
       tool inside music CDs from Sony BMG Music Entertainment was secretly installing a rootkit
       when users copied the CD onto their computers. At the time, security expert Bruce
       Schneier warned that the rootkit could allow a hacker to ―gain and maintain access to your
       system and you wouldn’t know it.‖
These are perhaps the most common security terms you’ll come across to describe the different
methods cybercriminals use. You can find more useful information about security terms and
examples of security threats in the Cisco 3Q10 Global Threat Report.


Managing Access & Risk Through Remote Network Monitoring
The key to managing portable devices in your business environment is to give your MSP direct
control over what devices are in use on your network. With N-central Network & Systems
Management Software™ you not only gain control over what is in use, but you also know what has
been used and by whom. And you gain in-depth knowledge of what data has been copied.
N-central software is a quick and easy download – obtainable from our MSP website – that is loaded
onto your company server(s) and network. Allowing the MSP to gain real-time insight and monitoring
control over all running applications, server and user sessions. Leaving the mission-critical and time-
consuming details of real-time performance and security monitoring to the IT professionals, freeing
senior management to focus instead on what it does best, running a business.


Control Portable Device Access to Your Network
GFI EndPointSecurity enables MSP administrators to actively manage user access and log the activity
of:
     Media players, including iPods, Creative Zen and others
     USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices
     PDAs, iPhone, BlackBerry handhelds, mobile phones, smart phones and similar
      communication devices
     Network cards, laptops and other network connections.


Why Choose N-central Monitoring?
     Prevents data leaks and theft by comprehensively controlling access to portable storage
      devices with minimal administrative effort
     Prevents introduction of malicious and other unauthorized software to the network
     Gives administrators greater control - you can block devices by class, file extensions,
      physical port or device ID from a single location
     Allows administrators to grant temporary device or port access for a stipulated timeframe
     Centrally monitors the network, detects connected devices and performs various tasks
     Automatically protects newly detected computers by deploying an agent and a default
      blocking policy
     Can automatically download and install SQL Express if a database server is not available
     Supports 32 & 64-bit platforms, including Windows 7, Windows Vista and Windows Server
      2008 R2.


Price List and Specs
N-Central is a software purchased separately from, to run in conjunction with, basic MSP tiered
network and systems support. The software is priced by IP node (client pc or network access point).
Details may be found on our website, at http://www.imagingnetworktech.com.
For further details or inquiries, or to sign up for Network Monitoring services, please contact our 24
x 7 on-call Help Desk, at: 1-800-719-6545.

Contenu connexe

Tendances

Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...IOSR Journals
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 

Tendances (20)

Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
report-final
report-finalreport-final
report-final
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
C02
C02C02
C02
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Data security
 Data security  Data security
Data security
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 

En vedette

OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...
OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...
OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...eNovance
 
OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...
OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...
OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...eNovance
 
Cloud Service Provider
Cloud Service ProviderCloud Service Provider
Cloud Service ProviderBill Winkler
 
Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014
Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014
Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014verteego
 
Building a Service Provider Cloud Offering - MVMUG Sept2013
Building a Service Provider Cloud Offering - MVMUG Sept2013Building a Service Provider Cloud Offering - MVMUG Sept2013
Building a Service Provider Cloud Offering - MVMUG Sept2013Arron Stebbing
 
IBM Becoming a Cloud Service Provider White Paper
IBM Becoming a Cloud Service Provider White PaperIBM Becoming a Cloud Service Provider White Paper
IBM Becoming a Cloud Service Provider White PaperMauricio Godoy
 
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service ProviderOVHcloud
 

En vedette (8)

OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...
OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...
OpenStack in action 4! Paul Cormier - Evolve to an Open Hybrid Cloud. Unleash...
 
OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...
OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...
OpenStack in Action 4! Raphaël Ferreira & Laurent Letourmy - Build your Cloud...
 
Cloud Service Provider
Cloud Service ProviderCloud Service Provider
Cloud Service Provider
 
Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014
Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014
Revue de presse Verteego - Jolicharts 29 juillet 2008 - 19 mars 2014
 
Building a Service Provider Cloud Offering - MVMUG Sept2013
Building a Service Provider Cloud Offering - MVMUG Sept2013Building a Service Provider Cloud Offering - MVMUG Sept2013
Building a Service Provider Cloud Offering - MVMUG Sept2013
 
IBM Becoming a Cloud Service Provider White Paper
IBM Becoming a Cloud Service Provider White PaperIBM Becoming a Cloud Service Provider White Paper
IBM Becoming a Cloud Service Provider White Paper
 
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider
[FR] OVH Webinar : 10 questions à poser à votre Cloud Service Provider
 
OP5 Monitor
OP5 Monitor OP5 Monitor
OP5 Monitor
 

Similaire à Network monitoring white paper

Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 

Similaire à Network monitoring white paper (20)

Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
C3
C3C3
C3
 
185
185185
185
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Hamza
HamzaHamza
Hamza
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 

Network monitoring white paper

  • 1. REMOTE NETWORK MONITORING SOFTWARE FOR SMALL- TO MID-SIZED COMPANIES Latest Software Trends in Protecting ROI, Client Data, and Revenues
  • 2. Tricks of the Data Trade: Remote Monitoring to Safeguard Security In December 2008, the US Dept. of Defense began banning flash drives and other portable devices – iPODs, etc – from DOD computing facilities. For fear of data loss or damage, and difficulty in monitoring employee data theft. After one embarrassing incident in US-Asian battlefield plans went missing. DOD has gone back and forth on the use of flash sticks and other portable devices, for almost two years now, and may be relaxing this specific ban – it is very difficult to enforce, and controversial – but not its focus on overall network monitoring, for data security and loss prevention. If DOD has issues keeping its data safe … imagine how much more difficult this task, for the average small- to mid-sized business. And while most small businesses are not stowing remote battlefield plans or weapons arming codes on their servers, they may have information almost as critical, to their clients: years of client tax records, scanned dental x-rays or dental records (invaluable, in forensic inquiries), medical histories, or manufacturing data, etc. While most banks and financial institutions have prohibited employee usage of flash drives or other external devices for some time – not just for fear of intentional data theft, or sensitive client record theft (data outflow), but also for fear of introduction of malware or virus damage (data input) – this trend is only recently catching on in government facilities. Most government entities lagging far behind the financial sector, in terms of data protection. Or database integration. (Where there is no database integration, there are no checks and balances on data integrity: data can go missing, or be corrupted, or altered, without alarm or other back-up notification.) So, how can companies safeguard their in-house data stores? Their confidential and private company and client data, the invaluable backbone of any business? Both from loss / theft / compromise, as well as an increased risk of malware, spyware, registry corruption, and other illegal software damage being introduced into the company network, through unsupervised employee devices? Security Monitoring in an Era of Fraud Imaging Network Technology N-able Monitoring Software
  • 3. The proliferation of consumer devices such as iPods, flash sticks, flash drives, iPhones, Droids, etc., has dramatically increased the risk of intentional and unintentional leaks, theft, and other malicious activity. While most companies have anti-virus software, firewalls, email and web content security to protect against external threats, few realize how easy it is for an employee to simply walk in and copy large amounts of sensitive data onto an iPod or USB stick. It takes roughly 1 minute, to easily copy several years of sensitive client or company data – financials, bank records, technical plans, battlefield arena scenarios, code – onto an 8 or 10mg flash stick. It takes roughly 5 seconds to scan a screen full of sensitive material, from PC screen to smart phone. In such cases, there is no external device or USB port alert possible, and security monitoring must rely on keystroke capture, or time on screen alerts. Most small businesses lack the IT sophistication and staff, to even even aware of such dangers, let alone, to successfully monitor for them. And to monitor for such threats in a manner which does not jeopardize or violate employee or contractor rights, in the worksite, or from remote locations. As telecommuting rises in popularity, so has the opportunity for corporate security and network breaches. Whereas companies used to have to monitor just on-site usage of company computers, operating on 1-2 dedicated lans, in just a few building sites; today they are called on to monitor remote dial-up or citrix client sessions from literally, around the world. That poses a huge challenge, for most IT departments. What if you are a small company – an elite architectural or engineering firm, with jobs and consultants around the globe, frequently traveling – without a dedicated IT staff? Or a small manufacturing firm, with parts of your production line outsourced to India, or Asia, as is increasingly common? How then, to ensure server and network security? One is certainly not going to put cameras in all airports, to ensure that contractors tapping into a company session do not download data onto a private flash stick. One solution would be for the company's IT administrator to lock down all ports – a difficult, time- consuming and expensive solution. Another would be to use remote monitoring, operated either by an in-house IT staff, or a remote IT contractor – a Managed Service Provider (MSP) specializing in IT server and network monitoring and maintenance. Remote monitoring software is becoming more and more saavy, in terms of security and performance monitoring capabilities. Risky or questionable user sessions may be flagged by using screenshot capabilities that unobtrusively capture user activities, keyed either for random or time interval capture; or remote monitoring may be keyed to activate with the use of certain key words or phrases, capturing both user activity and screen activity – as when a user types in a search word, or utilizes a key data sequence in desktop activity, or attempts to copy key data – to help control data leaks, and protect sensitive company and client data. It is not enough to capture potential risks or breaches, however: these screen captures or other security risks, by either internal (personnel, authorized users) or external actors, must be correlated into patterned reports, and flagged immediately to senior management. Top Network Security Risks In December 2010, Cisco listed the following as the top computing security risks (if this list doesn't have you scrambling for the nearest MSP to sign an immediate contract...) : Malware: Malware is short for ―malicious software.‖ Wikipedia describes malware as a term used
  • 4. to mean a ―variety of forms of hostile, intrusive, or annoying software or program code.‖ Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all of which are defined below. Computer virus: A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on your computer—even erasing everything on your hard drive. A virus could also use other programs like your email program to spread itself to other computers. Rogue security software: Have you ever seen a pop-up window that advertises a security update or alert? It appears legitimate and asks you to click on a link to install the ―update‖ or ―remove‖ unwanted malicious software that it has apparently detected. This could be rogue security software designed to lure people into clicking and downloading malicious software. Microsoft has a useful webpage that describes rogue security software and how you can protect yourself. Trojan horse: Users can infect their computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious. Once inside your computer, a Trojan horse can do anything from record your passwords by logging keystrokes (known as a keystroke logger) to hijacking your webcam to watch and record your every move. Cisco further noted that, ―In February 2010, a Guardian Analytics and Ponemon Institute study of 500 small businesses in the U.S. found that 55 percent of respondents experienced a fraud attack in the last 12 months. The study reports that ―…[w]ell-funded cyber criminals executed a full-scale assault on authentication, leveraging widespread infection of end-user computers with banking Trojans to sneak into online banking accounts completely undetected.‖ Malicious spyware: Malicious spyware is used to describe the Trojan application that was created by cybercriminals to spy on their victims. An example would be keylogger software that records a victim’s every keystroke on his or her keyboard. The recorded information is periodically sent back to the originating cybercriminal over the Internet. Keylogging software is widely available and is marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage. Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. Worms can replicate in great volume and with great speed. For example, a worm can send copies of itself to every contact in your email address book and then send itself to all the contacts in your contacts’ address books. Because of their speed of infection, worms often gain notoriety overnight infecting computers across the globe as quickly as victims around the world switch them on and open their email. This happened with the Conficker worm (also known as Downadup), which, in just four days, had more than tripled the number of computers it infected to 8.9 million. Botnet: A botnet is a group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse. An individual computer in the group is known as a ―zombie― computer. The botnet is under the command of a ―bot herder‖ or a ―bot master,‖ usually to perform nefarious activities. This could include distributing spam to the email contact addresses on each zombie computer, for example. If the botnet is sufficiently big in number, it could be used to access a targeted website simultaneously in what’s known as a denial-of-service (DoS) attack. The goal of a DoS attack is to bring down a web server by overloading it with access requests. Popular websites such as Google and Twitter have been victims of DoS attacks. Spam: Spam in the security context is primarily used to describe email spam —unwanted messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter your mailbox as
  • 5. well as potentially take up space on your mail server. Unwanted junk mail advertising items you don’t care for is harmless, relatively speaking. However, spam messages can contain links that when clicked on could go to a website that installs malicious software onto your computer. Phishing: Phishing scams are fraudulent attempts by cybercriminals to obtain private information. Phishing scams often appear in the guise of email messages designed to appear as though they are from legitimate sources. For example, the message would try to lure you into giving your personal information by pretending that your bank or email service provider is updating its website and that you must click on the link in the email to verify your account information and password details. Rootkit: According to TechTarget, a rootkit is a collection of tools that are used to obtain administrator-level access to a computer or a network of computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes. Rootkits gained notoriety when, in 2005, a security blogger discovered that a copy-protection tool inside music CDs from Sony BMG Music Entertainment was secretly installing a rootkit when users copied the CD onto their computers. At the time, security expert Bruce Schneier warned that the rootkit could allow a hacker to ―gain and maintain access to your system and you wouldn’t know it.‖ These are perhaps the most common security terms you’ll come across to describe the different methods cybercriminals use. You can find more useful information about security terms and examples of security threats in the Cisco 3Q10 Global Threat Report. Managing Access & Risk Through Remote Network Monitoring
  • 6. The key to managing portable devices in your business environment is to give your MSP direct control over what devices are in use on your network. With N-central Network & Systems Management Software™ you not only gain control over what is in use, but you also know what has been used and by whom. And you gain in-depth knowledge of what data has been copied. N-central software is a quick and easy download – obtainable from our MSP website – that is loaded onto your company server(s) and network. Allowing the MSP to gain real-time insight and monitoring control over all running applications, server and user sessions. Leaving the mission-critical and time- consuming details of real-time performance and security monitoring to the IT professionals, freeing senior management to focus instead on what it does best, running a business. Control Portable Device Access to Your Network GFI EndPointSecurity enables MSP administrators to actively manage user access and log the activity of:  Media players, including iPods, Creative Zen and others  USB drives, CompactFlash, memory cards, CDs, floppies & other portable storage devices  PDAs, iPhone, BlackBerry handhelds, mobile phones, smart phones and similar communication devices  Network cards, laptops and other network connections. Why Choose N-central Monitoring?  Prevents data leaks and theft by comprehensively controlling access to portable storage devices with minimal administrative effort  Prevents introduction of malicious and other unauthorized software to the network  Gives administrators greater control - you can block devices by class, file extensions, physical port or device ID from a single location  Allows administrators to grant temporary device or port access for a stipulated timeframe  Centrally monitors the network, detects connected devices and performs various tasks  Automatically protects newly detected computers by deploying an agent and a default blocking policy  Can automatically download and install SQL Express if a database server is not available  Supports 32 & 64-bit platforms, including Windows 7, Windows Vista and Windows Server 2008 R2. Price List and Specs N-Central is a software purchased separately from, to run in conjunction with, basic MSP tiered network and systems support. The software is priced by IP node (client pc or network access point). Details may be found on our website, at http://www.imagingnetworktech.com. For further details or inquiries, or to sign up for Network Monitoring services, please contact our 24 x 7 on-call Help Desk, at: 1-800-719-6545.