PIM - PowerPoint PPT Presentation

About This Presentation
Title:

PIM

Description:

Privileged Identity Management (PIM) is subcategory of Identity Management. Its purpose is to focus on privileged accounts, important accounts used by the team of IT administrators or sometime, people in the top brass of the organization. It also focuses on select business users and applications that are crucial to the business operations of the organization. Privileged accounts are targeted by external attackers surpassing firewall and malicious insiders (rogue employees) who have access to sensitive data. PIM Solutions ensure security for user accounts in the applications that are a part of IT Infrastructure. – PowerPoint PPT presentation

Number of Views:53
Slides: 9
Provided by: rver21

less

Transcript and Presenter's Notes

Title: PIM


1
Priviledged Identity Management
2
CONTENT
  • User Activity Visibility
  • Compliance Demands
  • Third-Party Access, Troubleshooting and Training

3
User Activity Visibility The Weak Link for
Enterprise Compliance and Security
  • Todays compliance places strict limitations on
    the types of people who can access sensitive
    financial and corporate data. Unfortunately, many
    compliant organizations have little or no insight
    into who these users are and what they are doing,
    putting themselves at risk for data breaches,
    fines and, in some cases, imprisonment. These
    companies realize the need to monitor users
    involved with accessing, storing and auditing
    sensitive corporate information, yet their
    current data security systems often lack this
    functionality.
  • With detailed logs and user activities recordings
    of all users on any server, workstation or
    application you can exceeds the strictest
    interpretation of compliance requirements with
    conclusive evidence for compliance auditors.
    These audit reports can be completed in a
    fraction of the time, with the ability to
    instantly search, analyze and view the drilled
    down reports for any evidence. Heres how LTS
    Secure user activity monitoring addresses
    specific compliance section requirements.

4
(No Transcript)
5
(No Transcript)
6
Compliance Demands
  • Capture and search historical user activity so
    that suspicious actions can be examined to
    determine if an attack is occurring before the
    damage is done.
  • Change user behavior through deterrents ensuring
    that trustworthy employees are not taking
    shortcuts and disgruntled employees know any
    malicious actions will be recorded.
  • Establish a clear, unambiguous record for
    evidence in legal proceedings and dispute
    resolution.
  • Mitigating Insider Attacks
  • Alert when user actions or patterns are seen
    those are indicative of insiders
    inappropriatelyobtaining sensitive data or
    exfiltrating.
  • Alert when outliers are seen off of a baseline of
    what is normal behavior for a peer group, as
    these outliers may be insider threats
  • Complement other security technologies which may
    not be able to provide full visibility into a
    users internal actions, or may be circumvented
    by the insider

7
Third-Party Access, Troubleshooting and Training
  • Automated discovery and (re)configuration of
    audit system components for reliability and
    faulttolerance with minimal administrative
    personnel involvement.
  • Ensure only trusted components can participate in
    the auditing system.
  • Built-in integration support for existing SIEM,
    event and monitoring tools.

8
THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com