SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
ID Theft

Security Meeting
Agenda
  1. ID Theft
     • Introduction
     • Types
     • Techniques
     • Causes
  2. Compliance
  3. Approach
     • Service
     • Features
     • IT Integration
  4. Q & A
11/05/2012              Security Meeting May 2012   2
ID Theft
  Definition (Wikipedia):

  Identity theft is a form of stealing someone's identity
  in which someone pretends to be someone else by
  assuming that person's identity, typically in order to
  access resources or obtain … other benefits in that
  person's name.

  AKA: Impersonating - meaning the person whose
  identity has been assumed by the identity thief.
11/05/2012             Security Meeting May 2012            3
Some Types
  •      Finantial
  •      Governamental
  •      Social Network
  •      Child
  •      Smart Phone




11/05/2012                Security Meeting May 2012   4
Some Techniques
  • Stealling
    o IT Equipment
    o Credit Cards
    o (…)
  • Impersonating
  • Brute force attack weak passwords
  • Explore security breaches (browser flaws,
    malware, spyware) to steal information from
    computer


11/05/2012         Security Meeting May 2012      5
Some Techniques (I)
  •      Hacking systems (servers, networks, databases,
         firewalls)
  •      Improper privileges to company's employees,
         resulting in unauthorized access to sensitive data
         from      these   privileged    users    (internal
         unauthorized access)
  •      (…)




11/05/2012                Security Meeting May 2012           6
Some Causes
  Organizations:
     • Don’t have an adequate security policy
     • Fail to preserve computer security
     • Fail to ensure network security (Firewall
        Management)
     • Fail do identify risks (Risk Management)
     • Relaxed access control policy
     • (…)



11/05/2012          Security Meeting May 2012      7
Risk Management




11/05/2012       Security Meeting May 2012   8
Compliance
  • Help protect business from risk
  • Increase IT Security
  • Used as benchmark to protect information
  • Automating compliance decrease audit time and
    stress
    o Keep configurations up- to-date (monitoring)
    o Detects undesirable changes
  • (…)



11/05/2012          Security Meeting May 2012        9
Compliance




11/05/2012       Security Meeting May 2012   10
Approach
  Traditional
     • Vendor solution
     • Go in, implement, customize & go out
     • Assistance & support
  Service
     • Configuration control
     • Compliance policy management
     • Change auditing
     • Real-time analysis of changes
     • Remediation, Reconciliation
     • Reporting
11/05/2012           Security Meeting May 2012   11
Approach




11/05/2012       Security Meeting May 2012   12
Approach
  Features
     • Provides compliance policies do manage user
        Ids
        o e.g. password strength and complexity
            checks
     • Proactive monitor IT security infrastructure
        (firewalls).




11/05/2012           Security Meeting May 2012        13
Approach




11/05/2012       Security Meeting May 2012   14
Approach
        • Continuous compliance
          o File integrity monitoring by detecting any
             change to a file or system setting.
          o Automating the repair of configurations
             that intentionally or accidentally fall from
             secure and compliant states
        • Generate an audit trail that logs the state of
          physical and virtual infrastructure, along with
          any actions taken to remediate out-of-
          compliance infrastructure.
11/05/2012               Security Meeting May 2012          15
Approach
  IT Infrastructure Integration
      • Supports a variety of IT Technology
      • OS with agent (HPUX, Solaris, RHEL, Windows)
      • Direct monitor Databases
         o Microsoft SQL Server
         o Oracle Database Server
         o Sybase Database Server
         o DB2 Database Server
         o (…)


11/05/2012           Security Meeting May 2012         16
Approach
        •    Direct monitor Directory Servers (Microsoft,
             Novell, Sun, Generic LDAP…)
        •    Network devices (Cisco, F5 BigIP, HP Procurve,
             Juniper, Nortel, …)
        •    Supports others devices not listed (Agent less
             mode - with ssh)




11/05/2012                 Security Meeting May 2012          17
How we do it




11/05/2012       Security Meeting May 2012   18
How we do it




11/05/2012       Security Meeting May 2012   19
Q&A


  Thank You!

  Luís Martins
   luis.martins@glintt.com

Contenu connexe

Tendances

Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
PECB
 
Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015
Norm Barber
 

Tendances (18)

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Data security
Data securityData security
Data security
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Bitcoin and IoT
Bitcoin and IoTBitcoin and IoT
Bitcoin and IoT
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
Key Data Privacy Roles Explained: Data Protection Officer, Information Securi...
 
Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015Norm Barber At-a-Glance 2015
Norm Barber At-a-Glance 2015
 
SHIP Brochure
SHIP BrochureSHIP Brochure
SHIP Brochure
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 

Similaire à Security meeting 2012 ID Theft

Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
Denim Group
 
Large Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in ActionLarge Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in Action
Grant Ingersoll
 

Similaire à Security meeting 2012 ID Theft (20)

Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: Fuzzing
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network Conference
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Large Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in ActionLarge Scale Search, Discovery and Analytics in Action
Large Scale Search, Discovery and Analytics in Action
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations Center
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 
Top 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, TodayTop 10 Things Logs Can Do for You, Today
Top 10 Things Logs Can Do for You, Today
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

Dernier

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 

Dernier (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 

Security meeting 2012 ID Theft

  • 2. Agenda 1. ID Theft • Introduction • Types • Techniques • Causes 2. Compliance 3. Approach • Service • Features • IT Integration 4. Q & A 11/05/2012 Security Meeting May 2012 2
  • 3. ID Theft Definition (Wikipedia): Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain … other benefits in that person's name. AKA: Impersonating - meaning the person whose identity has been assumed by the identity thief. 11/05/2012 Security Meeting May 2012 3
  • 4. Some Types • Finantial • Governamental • Social Network • Child • Smart Phone 11/05/2012 Security Meeting May 2012 4
  • 5. Some Techniques • Stealling o IT Equipment o Credit Cards o (…) • Impersonating • Brute force attack weak passwords • Explore security breaches (browser flaws, malware, spyware) to steal information from computer 11/05/2012 Security Meeting May 2012 5
  • 6. Some Techniques (I) • Hacking systems (servers, networks, databases, firewalls) • Improper privileges to company's employees, resulting in unauthorized access to sensitive data from these privileged users (internal unauthorized access) • (…) 11/05/2012 Security Meeting May 2012 6
  • 7. Some Causes Organizations: • Don’t have an adequate security policy • Fail to preserve computer security • Fail to ensure network security (Firewall Management) • Fail do identify risks (Risk Management) • Relaxed access control policy • (…) 11/05/2012 Security Meeting May 2012 7
  • 8. Risk Management 11/05/2012 Security Meeting May 2012 8
  • 9. Compliance • Help protect business from risk • Increase IT Security • Used as benchmark to protect information • Automating compliance decrease audit time and stress o Keep configurations up- to-date (monitoring) o Detects undesirable changes • (…) 11/05/2012 Security Meeting May 2012 9
  • 10. Compliance 11/05/2012 Security Meeting May 2012 10
  • 11. Approach Traditional • Vendor solution • Go in, implement, customize & go out • Assistance & support Service • Configuration control • Compliance policy management • Change auditing • Real-time analysis of changes • Remediation, Reconciliation • Reporting 11/05/2012 Security Meeting May 2012 11
  • 12. Approach 11/05/2012 Security Meeting May 2012 12
  • 13. Approach Features • Provides compliance policies do manage user Ids o e.g. password strength and complexity checks • Proactive monitor IT security infrastructure (firewalls). 11/05/2012 Security Meeting May 2012 13
  • 14. Approach 11/05/2012 Security Meeting May 2012 14
  • 15. Approach • Continuous compliance o File integrity monitoring by detecting any change to a file or system setting. o Automating the repair of configurations that intentionally or accidentally fall from secure and compliant states • Generate an audit trail that logs the state of physical and virtual infrastructure, along with any actions taken to remediate out-of- compliance infrastructure. 11/05/2012 Security Meeting May 2012 15
  • 16. Approach IT Infrastructure Integration • Supports a variety of IT Technology • OS with agent (HPUX, Solaris, RHEL, Windows) • Direct monitor Databases o Microsoft SQL Server o Oracle Database Server o Sybase Database Server o DB2 Database Server o (…) 11/05/2012 Security Meeting May 2012 16
  • 17. Approach • Direct monitor Directory Servers (Microsoft, Novell, Sun, Generic LDAP…) • Network devices (Cisco, F5 BigIP, HP Procurve, Juniper, Nortel, …) • Supports others devices not listed (Agent less mode - with ssh) 11/05/2012 Security Meeting May 2012 17
  • 18. How we do it 11/05/2012 Security Meeting May 2012 18
  • 19. How we do it 11/05/2012 Security Meeting May 2012 19
  • 20. Q&A Thank You! Luís Martins luis.martins@glintt.com