1 / 19

USER ACTIVITY Monitoring: Your MISSING SECURITY VANTAGE POINT

USER ACTIVITY Monitoring: Your MISSING SECURITY VANTAGE POINT. Presented by Matt Zanderigo. 76% of data breaches involve Accounts with Access to Sensitive Data. Historic approach:. Infrastructure- centric. Machine intelligence.

onofre
Download Presentation

USER ACTIVITY Monitoring: Your MISSING SECURITY VANTAGE POINT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. USER ACTIVITY Monitoring:Your MISSING SECURITY VANTAGE POINT Presented by Matt Zanderigo

  2. 76% of databreaches involve Accounts with Access to Sensitive Data

  3. Historic approach: Infrastructure-centric

  4. Machineintelligence SIEM and log management to collect and analyze network and server log data.

  5. We forgot aboutOur users!

  6. Who did what? Capture & record all user activity

  7. Who did what? Monitor, Detect and Respond to user based threats

  8. Who did what?

  9. Key use cases detection & Incident Response DetectInstantly detect changes in actual user behavior that warrant investigation AnalyzeMonitor and baseline user activity RespondIsolate users, systems and data in real-time and historically with detailed forensic data

  10. Key use cases 3rd Party Vendor monitoring TransparencyRecord every action vendors perform AccountabilityHuman-readable audit trails to match with existing SOPs and SLAs DeterrenceWatch your vendor’s behavior change with video surveillance

  11. Key use cases Audit & compliance Reduced Audit TimesProduce audit records based on video and plain English Expanded CoverageBroad coverage for all applications and systems SimplicitySatisfy PCI, HIPAA, SOX, ISO in minutes, not months

  12. Session alert summary Session activity alerts

  13. Alert indication per activity Alert indication per screenshot on the timeline Message suspicious users, and terminate sessions

  14. 1,200+ customers

  15. Our customersbuildingconfidence “ObserveITgives us the confidence of allowing admins and remote vendors to do their work, while ensuring that our data is secure and audited. We also use the product to document IT processes and installations.” Premier League

  16. Our customersbuildingconfidence “As soon as vendors discovered that all actions are being recorded, it became much easier to manage them.” Coca-Cola Company

  17. Our customersbuildingconfidence “We enjoy showing off to our customers that every user action is recorded. This increases confidence all around.” Bellin Treasury

  18. Thank You Matt Zanderigo matt.zanderigo@observeit.com 717-946-0241

More Related