1 / 25

Presenter Notes

Presenter Notes. This is your Feature deck for Secret Server. To Use: In your early discovery ask your prospect for three problems they are trying to solve. Map the Secret Server Feature that solves the problem they need to solve (1 feature per problem)

kpantoja
Download Presentation

Presenter Notes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presenter Notes • This is your Feature deck for Secret Server. • To Use: • In your early discovery ask your prospect for three problems they are trying to solve. • Map the Secret Server Feature that solves the problem they need to solve (1 feature per problem) • Copy and paste those feature slides from this deck, into your customized pitch deck

  2. AES-256 Encryption An extremely strong algorithm used for Encrypting and Decrypting data • Eliminate existing vulnerabilities bay ensuring that your passwords are encrypted with the strongest, government approved, encryption algorithm: AES-256 • Secret Server generates a unique encryption key during installation – only known by you. This key is what encrypts and decrypts all of your secrets.

  3. Role Based Access Control Control who can access resources based on their assigned role • Ensure strict granular access to sensitive information. Assign permissions to roles, and then assigning users or groups to that role. • Secret Server allows you to create custom roles, and assign them to your Secret Server users – ensuring the right people have access to the right resources and secrets.

  4. Folders & Permissions Hierarchical organization of sensitive data and who can access it • A folders with permissions structure, ensures that your department stays organized and implements rapid and structure deployment • Secret Server uses a nested folder approach for organizing secrets – allowing secrets in subfolders to automatically inherit permissions of the parent folders.

  5. File Attachments Directly attach sensitive files that need to be protected • Protect sensitive files and documents, to prevent unauthorized access to systems critical data. • In addition to protecting passwords, Secret Server allows you to protect and store sensitive files, like Private Keys, SSL Certifications, PDFs, Zip Files, Spreadsheets, and more.

  6. Smartphones and Devices Platforms that allow users to access the resources they need • Never limit the productivity of employees by allowing them to access their resources from their device and platform of choice. • Secret Server can be accessed from a browser (Internet Explorer, Firefox, Chrome, and Safari) or a native smartphone app (iPhone & Android).

  7. Active Directory Integration The standard in most corporations for managing network devices and users • AD integration improves your provisioning process by automatically adding and assigning permissions to new employees based on their AD assignment. • Secret Server integration provides synchronization and authentication for Active Directory user. Grant permissions by on AD Users & Groups.

  8. Session Launchers Access to machines remotely, launch applications, and log into websites • Maintain unique, strong, and useable privileged credentials for remote access without requiring anyone to remember them • Secret Server allows you to: open a connection to a remote machine using RDP or PuTTY, login to a website, or launch a custom connection into multiple application types – and automatically authenticate without exposing the password.

  9. Import / Export Move large amounts of data in and out of secret server • Transform your non-encrypted data (like excel sheets with passwords) into secured Secrets • Secret Server allows you to easily add large numbers of passwords from a CSV or XML file. Many other password managers have an export function that will allow you to bring legacy data into Secret Server

  10. Change Network Passwords Automatically change passwords on your network • Meet audit compliance with scheduled password rotation, or protect against threats by automatically changing all passwords when an employee leaves the company • Secret Server can rotate passwords on network devices, either on a set schedule or on-demand. Coupled with Heartbeat, Checkout, and Service Accounts – Remote Password Changing is your ultimate security measure.

  11. Discover Local Accounts Find unmanaged / unknown local accounts • Protect your network from unknown privileged access by discovering, controlling, and protecting local admin accounts. • Automatically discover local accounts, map secrets to the accounts, import them into Secret Server, and gain control over your network.

  12. Heartbeat Monitoring your privileged credentials • Knowing the moment a password is changed, outside of Secret Server, can be critical to preventing malicious activity • Heartbeat continuously checks the credentials stored against the endpoint to ensure they still match.

  13. Web Services API Web services and integration with third party applications • Integrate and empower your 3rd party applications, providing them access to Secret Server, so you don’t inhibit existing workflows • Our RESTful API allows you to Authenticate to Secret Server; and search, retrieve, save, and edit Secrets, from 3rd party script and applications.

  14. Distributed Engine Connect Secret Server to remote networks and environments • Ensure that existing workflows are not hampered by latency in larger distributed networks • Using secure network communication, queueing and parallel processing, Secret Server can discover credentials, verify whether credentials have been changed, and automatically change passwords on thousands of accounts in minutes.

  15. Secret Policy Templates to enforce your password security policies • Maintain compliance by ensuring that all existing passwords and future changes match and meet your established policies. • Secret Server enforces policies you set on things like password changes

  16. Full Auditing & Reports Maintaining a compliance ready history of activity • Satisfy compliance requirements and easily assess vulnerabilities when someone leaves the company. • Secret Server maintains two types of audit trails: The User Audit tracks every action a person takes within Secret Server; The Secret Audit tracks a detailed history of a secret including events like who accessed it and when it was last changed.

  17. Proxying Accessing a system through another system • Reduce the risk exposure of your critical network systems by removing direct access to those systems. • Secret Server provides an RDP/SSH proxy, to ensure that the only way your servers are being accessed are through Secret Server.

  18. Two Factor Authentication Strong authentication method requiring two forms of identification • Ensure that only the correct authorized people are accessing your data by requiring a user to provide something they know, and something they have. • Secret Server accepts Google Authenticator, Duo, RADIUS, and email two-factor authentication

  19. Event Subscriptions Alerts for when specified actions are performed • Gain the ability to act on system changes immediately with customized notifications • Event Subscriptions can be setup to alert you when specified actions are performed, or when an event occurs with the system.

  20. Require Comment Require a user to add a reason why they are viewing data • Strengthen your compliance audit history by maintaining reasons why a user accessed sensitive data • Secret Server can be setup to require users to leave a comment on why they are accessing a specific secret. Great for things like adding support tracking numbers.

  21. Reporting Displays key metrics about your data • Ensure your security policy compliance with reporting. • Secret Server has built in reports for items like, which employees are using Secret Server, which secrets users are accessing, and whether Heartbeat has failed on a secret.

  22. Unlimited Admin / Break the Glass Emergency feature to all complete administrator access to everything • When emergencies happen, it’s important that a system is in place that allows you to respond quickly • Secret Server’s Unlimited Admin mode, allows a single user to be granted emergency administrative privilege to everything in the system. It can also be set up to require dual authorization, and event subscription to notify when it’s being used. Unlimited Admin mode is also completely audited.

  23. High Availability - Cloud The right people can access their resources when they need to • For a strong security posture, your data must be available to the right people, in order to prevent costly downtime. • Secret Server Cloud comes with built in High Availability – as long as you have access to an active internet connection, you can access your Secret Server. Map of Azure Datacenters – https://azure.Microsoft.com/en-us/regions

  24. Automatic Backups - Cloud Regularly scheduled backups of data • Preventing data loss, one of the major costs to businesses, ensures your data, and your bottom line, are protected. • Secret Server Cloud, comes with built in Disaster Recovery backups. You don’t have to worry about loss of data due to catastrophic events.

  25. Vulnerability Scanning Integration Integrates 3rd party vulnerability scanning software • One time use of credentials, during scans, can ensure that your vulnerability scanner is able to investigate every machine on your network. • Secret Server can provide privileged and protected access to 3rd party Vulnerability Scanning software.

More Related