eCSI - The Agile IT security
-
Upload
balabit-it-security -
Category
Business
-
view
264 -
download
2
description
Transcript of eCSI - The Agile IT security
The Agile IT security
CRIME S
CENE eC
SI OFFIC
ERS ONLY
Everything changed
Mobile
Outsource
Social
Consumerization
Business
IT User
Tomorrow: contextual security
CONTROL
OB
SE
RV
AT
ION
External
Internal
Today: overweight of control
The benefits of contextual security
Bur
eauc
racy
Cos
ts
Sta
ff M
oral
e
IT A
gilit
y
Sec
urity
Source: Gartner
eCSI principles
1 Transparency
2 Accountability
3 Responsibility
4 Proportionality
5 Adaptability
WHAT YOU NEED IS:
Real-time monitoring
How monitoring
complements control?
HIGH-QUALITY
MONITORING
REAL-TIMEREACTION
INTELLIGENTDATA ANALYSIS
Prevention by monitoring
1 2 3 4 5 6 7 8 9
Prevention Forensics
Initial intrusion
Outbound connection
Expand access
Strengthen foothold
Exfiltrate data
Cover tracks
BalaBit eCSI Suite
Syslog-ng Shell Control Box
Blindspotter
• Reliable logging• Wide range of sources• High-performance
• Independent data source• Detailed footage• Control functions
• Social network model• Real-time dashboards• Priority list
• Zoom function• Run-on authentication• Privacy warranty
END
CRIME S
CENE eC
SI OFFIC
ERS ONLY