Helping Organizations To Be Protected Against Cyberattacks By . - IDG

Transcription

Mortada AyadSales EngineerHelping organizations to be protected against cyberattacks by securing passwords,protecting endpoints, and controlling access to their assets10,000 180,0001M CustomersIT Admins & Security ProsEndpoints ProtectedWashington DCLondonAustralia

THE MOST IMPORTANT BUSINESS RISKS IN ASIAPACIFIC IN 2018TOP 10 RISKS INAUSTRALIASource: Allianz Risk Barometer 2018: Appendix

80%of breaches involveprivileged credentials- 2016 Forrester WavePrivileged Identity Management75%of breaches involved insiderthreat / abuse-2016 IBM Security IndexSecurity Index Report85%of breaches involvedcompromised endpoints- 2016 SANS ReportIN THE NEWSIN THE NEWSIN THE NEWS“Yahoo! Hack! How it Took JustOne-Click ”“Who is Anthony and why isGoogle suing him?”“Hacking Attack Has Security“Do you know spear-phishing was the only secret weaponbehind the biggest data breach in the history? It’s true, asone of the Yahoo employees fell victim to a simplephishing attack and clicked one wrong link that let thehackers gain a foothold in the company's internalnetworks.“The lawsuit filed accuses him of stealing 14,000confidential files about [their] self-driving technology,including detailed designs of proprietary circuit boards andthe laser ranging LiDAR systems, when he was employedthere“The global efforts came less than a day after malicioussoftware, transmitted via email and stolen from theNational Security Agency, targeted vulnerabilities incomputer systems in almost 100 countries in one of thelargest “ransomware” attacks on record.”- The Hacker NewsMarch 2017Phishing / Account Theft- The Hacker NewsMarch 2017Insider Theft- New York TimesMay 2017WannaCry AttackExperts Scrambling to ContainFallout.”

What is a Privileged Account and how do you manage it?Users, Computers, ApplicationsPRIVILEGEPRIVILEGED Users, PRIVILEGED ComputersPRIVILEGED ApplicationsPrivileged Access onitoringPasswordManagement

Without PAMAdminApplicationUnix Ext. UserInt. UserWorkstationNetwork Device

With PAMMonitorAdminApplicationUnix atabaseExt. UserAuditInt. UserWorkstationNetwork Device

Why is PAM the #1 Project in 2018 and 20191. PAM is Security that Reduces Costs2. PAM Empowers Happy Employees3. PAM is a Positive Security Impact4. PAM is a Fast track to Compliance5. PAM Keeps Cybercriminals Out

TOP 4 Key Strategies to Mitigate over 85% of Cyber SecurityIncidents:1. Application Whitelisting2. Patch Applications3. Patch OS’s4. Limit Admin Privileges

privileged credentials 80 %-2016 Forrester Wave Privileged Identity Management IN THE NEWS of breaches involved insider threat / abuse 75-2016 IBM Security Index Security Index Report IN THE NEWS of breaches involved compromised endpoints 85 % - 2016 SANS Report IN THE NEWS "Yahoo! Hack! How it Took Just One-Click "-The Hacker News March 2017