balabit scb
DESCRIPTION
Privileged Account Management - BalaBit SCBTRANSCRIPT
![Page 1: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/1.jpg)
Zoltan Bakos // Presales Engineer
![Page 2: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/2.jpg)
88 % 71 %
Internal
misuseby
privilege abuse
21 %
Internal
misusevia
LAN
Internal
misusevia
remote access
• Use of stolen credentials was the top threat action in 2013
• Only 1% of security breaches is discovered through log reviews
Privileged User Fraud
* Source: Verizon 2014 Data Breach Investigations Report
![Page 3: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/3.jpg)
A Leading Solution for Privileged Activity Monitoring
![Page 4: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/4.jpg)
TRANSPARENT
PROXY SOLUTION
IT Staff
Outsourcing
partners
Managers• Firewall,
• Network devices,
• Databases,
• Web/file servers,
• Citrix server…VDI users
USE
STANDARD TOOLS
![Page 5: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/5.jpg)
TRANSPARENT
PROXY SOLUTION
IT Staff
Outsourcing
partners
Managers• Firewall,
• Network devices,
• Databases,
• Web/file servers,
• Citrix server…VDI users
NO AGENTS
![Page 6: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/6.jpg)
TRANSPARENT
PROXY SOLUTION
IT Staff
Outsourcing
partners
Managers• Firewall,
• Network devices,
• Databases,
• Web/file servers,
• Citrix server…VDI users
TAMPET-PROOF
EVIDENCE
![Page 7: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/7.jpg)
GRANULAR
CONTROL
ENHANCED
AUDITEASY
DEPLOYMENT
MULTI PROTOCOL
TRANSPARENT
INDEPENDENT
PROXY GATEWAY
4 EYES
AUTOLOGON
CHANNEL CONTROL
FILE TRANSFER
ANALYZE
REAL TIME
BLOCKING &
ALERTING
MALICIOUS
ACTIONS
MOVIE-LIKE PLAYBACK
FULL-TEXT SEARCH
PCAP EXPORT
FILE RETRIEVAL
KEY // BENEFITS
![Page 8: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/8.jpg)
![Page 9: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/9.jpg)
AD/LDAP
Gateway Authorization
Client
Target Server
Cred. Store
![Page 10: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/10.jpg)
Authorizer
Auditor
4-eyes Authorization with Real-time
Monitoring
Administrator
![Page 11: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/11.jpg)
Real-time Prevention
![Page 12: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/12.jpg)
Seamless Enterprise Integration
![Page 13: Balabit SCB](https://reader031.vdocuments.mx/reader031/viewer/2022013106/568ca8de1a28ab186d9b1f2d/html5/thumbnails/13.jpg)
THANK
YOU
///