Professional Documents
Culture Documents
DELETE COMPUTE
Four main pillars of most organizations: Firewall; Network Intrusion Prevention Anti-Virus Web Gateway Security Devices
New Threats; New requirements Malware protection Control of Privileged users Data Leak Prevention
Malware Protection
Microsoft Security Advisory (979352) http://www.microsoft.com/technet/security/advisory/979352.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution Published: January 14, 2010 | Updated: January 21, 2010
'Operation Aurora' was able to breach dozens of major corporate networks using sophisticated techniques, such as code obfuscation and a zeroday application vulnerability
Jan. 20, 2009 Heartland finds malware in bank Card payment system Mar. 28, 2008 Hannaford says malware on its servers stole card data
6
Enables infection analysis & remediation Identification of previously infected PCs calling out to malicious parties Global malware intelligence for more efficient analysis
PRIVILEGE RISK - ACCESS LOW MEDIUM HIGH Local Admin Accounts Desktop, Laptop, Embedded User Accounts
Unlike Basic User accounts, Privileged users have no individual association Privileged Accounts have extensive ACCESS and CONTROL
Application/Service Accounts Windows Service Accounts, Schedule Tasks, Application IDs, Batch Jobs, Scripts, etc. Administrative Accounts Unix Root, Windows Admin, DBA Accounts, Cisco Enable, Windows Domain, etc.
One-point management of privileged access (ability to control, monitor and record user sessions of privileged accounts) Enhanced security - elimination of hard-coded passwords Full session capture, every mouse movement, keystroke, recorded - VCR-like session log reply Audit of all activities and actions compliance to SOX, PCI, HIPAA, Basel II
Copyright 2009 Appnomic Systems Pvt. Ltd. I Confidential | www.appnomic.com
10
11
12
Alert
Storage Email Device Web mail Applications Screen HTTPS Shots Print CD/DVD
IM
FTP WEB USB
Prevent accidental or malicious loss of business critical data by insiders or hackers Real time monitoring of data transmission as per company policies Compliance with legal and regulatory rules Reduced cost of investigating data loss and the cost of rebuilding organization's reputation
Copyright 2009 Appnomic Systems Pvt. Ltd. I Confidential | www.appnomic.com
13
Certifications ISO 9001, ISO 20000-1 and ISO 27001; follow ITIL processes
400 people strong with Core leadership team & top executives from Tier-1 Global IT service providers
Financially strong; backed by Norwest Venture Partners, a leading VC firm from the Bay area, CA
14
Thank You
15