Wallix Admin Bastion: Introduction
-
Upload
chris-pace -
Category
Technology
-
view
228 -
download
25
description
Transcript of Wallix Admin Bastion: Introduction
WallixAdminBastion
WallixAdminBastion is a privileged user management solution. It’s designed to give you comprehensive control, monitoring and reporting for access to servers and other devices across your network.
Audit and compliance
Audit and compliance
The challenge:
Servers in your network house huge amounts of potentially sensitive data. Compliance and auditing may need you to be able to provide a full trail of how this data has been accessed.
Let’s get personal• Data stored on your network may not only
relate specifically to your business• Information that about people or finance is
strictly governed• It’s vital for an auditor to be able to know how
this kind of data has been accessed and by who
Audit and compliance
How Wallix helps:
• Risk prevention is based on traceability of users access to servers and their actions
• All of these actions are collected centrally as logs and videos which can be made available to auditors
• You can see a list of active sessions and monitor them in real-time• See activity by particular users or on particular servers to identify
unusual behaviour• Full visibility of all of this data in the event of a breach or other
security incident
Privileged user management
Privileged user management
The challenge:Many organisations today need to give varying levels of access to large numbers of individuals. This is adding complexity to keeping data secure.
The Snowden Effect• US whistleblower Edward Snowden • Contracted systems administrator at the NSA • Copied more than 50,000 documents
Privileged user management
How Wallix helps:
• WAB becomes a single point of entry for users to all your network devices
• Users have a single account for access to multiple resources • Greater control over users who need access changes or leave your
organisation• Control access by parameters such as IP address, day and time or
session type• Ideal for managing contractors or external service providers
Monitoring and traceability
Monitoring and traceability
The challenge:
It’s difficult to get visibility of how users are accessing the servers on your network and also what they’re doing whilst logged on.
Too much information• Understanding system event logs requires
time and effort• Specific user activities are often hard to
determine• SIEM solutions often focus on external threats
not internal users
Monitoring and traceability
How Wallix helps:• User activity can be constantly monitored alerting a manager or denying
access if particular actions are attempted• Goes beyond event logging by tracing every single mouse click and keyboard
stroke using system log information and optical character recognition• Command line sessions like SSH as well as UI sessions on Windows servers
are can all be recorded• Recorded sessions can be viewed as text or recorded as videos which can be
viewed and downloaded instantly
Password management
Password management
The challenge:
Networks are full of servers with old accounts and passwords that are still active and could be accessed by those who don’t have permission. Accounts and password for access to servers are often created ad hoc and independently of any directory services.
The keys to your kingdom• In 2011 an IT employee at Fannie Mae was
dismissed• In his final hours he used his laptop to access
a Unix server and plant malicious code• He was targeting the destruction of 4000
internal servers
Password management
How Wallix helps:• Users never need to have local access to servers• It’s easy to manage users who should no longer have access to
particular resources without having to worry about accounts on the devices themselves
• This helps to protect your infrastructure from any unauthorised access particularly for contractors or employees who have left your organisation
Just the facts
• Appliance, virtualised or in the cloud• Simple configuration• No agent to install• Active directory integration