Download - OwnYIT CSAT + SIEM

Transcript
Page 1: OwnYIT CSAT + SIEM

1

OwnYIT CSAT + SIEM

Page 2: OwnYIT CSAT + SIEM

Take control of your IT Infra-structure.OwnyIT is an easy to deploy and use IT Infrastructure Management

system for:

Cyber Security Audit,

Desktops Monitoring,

Policy enforcement ,

IT Inventory,

Security Incident and Event Management,

Remote Access and Management

2

Page 3: OwnYIT CSAT + SIEM

ABOUT OWNYIT CSAT

A simple system to address your complete IT infrastructure needs.

Central Console for…

Monitoring

Reporting

Remote Access

Manage applications

Hardware & Software Inventory

Monitoring system logs like event log and syslog

3

Page 4: OwnYIT CSAT + SIEM

Benefits to your organization

4

Asset & Change Management Cyber Security Audit

Desired Configuration Management Data leak Protection and Audit

Software License Monitoring Policy Enforcement

Application Management Network Access Control (NAC)

System User Management Security Incident and Event Management (SIEM)

System Log/Syslog Monitoring Secure Remote Audit and Management

Rule based Monitoring and Controlling Service Level Agreement (SLA) Management

Print Management Reports

Page 5: OwnYIT CSAT + SIEM

Asset and Change Management

Real time view of hardware and software assets .

Allows you to know where the hardware assets are deployed and what these

are being used for.

Microsoft software with its license key information.

Checks the actual software licenses installed against purchased.

Identify assets which are not available or operational, due to:

o Theft

o Failure

o Obsolescence

5

Page 6: OwnYIT CSAT + SIEM

Assets Inventory

6

Page 7: OwnYIT CSAT + SIEM

Change Management

Detect the changes in Hardware Assets due to theft, failure or non availability,

immediately.

Detect the Changes in software (install/uninstall) immediately.

Repository of the change available for the future.

Typical Benefits:

o Reduce the response time and hence the affect of the changes is

reduced.

o Immediate notification on authorized Hardware/Software

installation/removal.

7

Page 8: OwnYIT CSAT + SIEM

Change Management

8

Page 9: OwnYIT CSAT + SIEM

Desired Configuration Management

Define desired hardware/software configuration of Desktops/ Servers

Allows authorized Hardware/ Software configured/installed on the machine.

If unauthorized software/hardware found:

o Make the machine to non-comply,

o The machine will not communicate with other machines in the network.

9

Page 10: OwnYIT CSAT + SIEM

Desired Configuration Management

10

Page 11: OwnYIT CSAT + SIEM

Software License Monitoring

Get exact information of where the licensed software is deployed

and which systems are not registered.

Licensing information (Product Key + CD Key) for the

Microsoft’s softwares installed in the network.

Typical Benefits:

o Checks the actual software licenses installed in the network

against purchased.

o Reduce the cost through efficient software license usage and

monitoring.

11

Page 12: OwnYIT CSAT + SIEM

Software License Monitoring

12

Page 13: OwnYIT CSAT + SIEM

Application Monitoring

Monitor and Manage application usage on a single or a number

of systems/servers.

Provides location of installed applications.

Identify and stop non-essential processes.

Identify malicious processes.

Typical Benefits:

o Action can be taken based on the violation of the policy.

13

Page 14: OwnYIT CSAT + SIEM

Application Monitoring

14

Page 15: OwnYIT CSAT + SIEM

Data Leakage Protection Notification/Alert on the data communication happening with external storage

devices/media.

Get information about files (Not content) transferred to/from machine to/from

external media.

Blocking of USB Ports, external storage devices, CD Drives, Printer, Wi-Fi,

Bluetooth devices, USB Modem/Data Card and etc to protect the data.

On demand file enumeration report to get media files, photographs, Word/Excel/

PowerPoint files and other files exists in the machine.

Typical Benefits:o Protect the data from spreading outside the organization.o Closely monitor data communication happening across organization.

15

Page 16: OwnYIT CSAT + SIEM

Data Leakage Protection

16

Page 17: OwnYIT CSAT + SIEM

Data Leakage Protection

17

USB Media usage Report

Page 18: OwnYIT CSAT + SIEM

Policy Enforcement

Enabling and disabling of external devices for protecting data like:o USB Ports/ Storage Devices/ Printer, o Dialup Modem, o Printer, o Floppy Drive,o CD/DVD Drive, o Bluetooth, o Wi-Fi,o Other external devices

Policy for monitoring/managing authorized software installed on the machine.

Restrict user from changing IP Address of the machine.

18

Page 19: OwnYIT CSAT + SIEM

Policy Enforcement

19

Page 20: OwnYIT CSAT + SIEM

Security

Hardware blocking and set access permissions:

o Blocking of USB modem for connecting to Internet.

o Blocking of USB, CD and other external Media.

Report of add/remove of media like USB, CD drive.

Communication from/to Removal Media.

Immediate alarm and report on usage of removable media.

Facility to prohibit every removable media and set selective permission.

Report of removable media used in machine including the file

transferred with size, type, and etc without vision in to contents.

20

Page 21: OwnYIT CSAT + SIEM

Security (Contd …)

Anti Virus:

o Status of Anti Virus upgrade like successful /failure.

o Virus found with name of virus and other details.

OS Patches information.

Unauthorized access/attempt to OS utilities to be monitored and

reported (e.g. Control Panel, System32 Folder, Registry access and etc)

System Firewall Status (On/Off)

21

Page 22: OwnYIT CSAT + SIEM

Security

22

Page 23: OwnYIT CSAT + SIEM

Security

23

Page 24: OwnYIT CSAT + SIEM

User Management

Report on all Guest/ Normal /Administrator user accounts configured on

each machine:

o List of Users, which has administrative privileges.

Policy for disabling/deleting users from the central console.

Report of:

o User wise Login-Logout details,

o System Start-up shutdown details,

o User Activities while network is off or machines goes out off

network.

24

Page 25: OwnYIT CSAT + SIEM

User Management (Contd …)

Password Management:

Provides report on weak password set by the user

Provides information about Screen Saver password

Report of unsuccessful login attempts by the user

25

Page 26: OwnYIT CSAT + SIEM

User Management

26

Page 27: OwnYIT CSAT + SIEM

Network Security

Real time report on if a machine has accessed internet using modem, dial up connection, data card and etc.

Generates notification/alert when a machine has

connected/accessed unauthorized IP Address/machine.

Block access of unauthorized IP Address and network port.

History of all network operations like which application

used/opened network ports and etc..Reporting of offline violations immediately on connection.

27

Page 28: OwnYIT CSAT + SIEM

Network Security

28

Page 29: OwnYIT CSAT + SIEM

Network Access Control (NAC)

Define network policy for only Group of PCs or selected PCs should

communicate with each other.

Newly added/discovered device/PC should not communicate with any other

PC in the network, untill Admistrator authorized it.

Facilities block/deny access of selected devices/PCs in the network.

29

Page 30: OwnYIT CSAT + SIEM

Network Access Control (NAC)

30

Page 31: OwnYIT CSAT + SIEM

System Events/Logs Monitoring

Monitors various system events/logs like:

o Application Events,

o Security Events,

o System Events

Check whether any security incident/event is generated

Incorporate the system logs, events and alerts into a single data store, so

consolidated data analysis can be done later.

31

Page 32: OwnYIT CSAT + SIEM

System Log/Event Monitoring

32

Page 33: OwnYIT CSAT + SIEM

Security Incident/Event Monitoring (SIEM)

System should take one or multiple security incidents or events from the

multiple sources/devices.

To generate a single Security Incident Event based on single/ multiple

security incidents or events.

The Security Incident Event will categories based on the categories/sub-

categories defined in the organization.

Automatically generates notification/service requests/ tickets when any

security event/incident occurred.

33

Page 34: OwnYIT CSAT + SIEM

Security Incident/Event Monitoring (SIEM)

34

Page 35: OwnYIT CSAT + SIEM

Service Level Agreement Management (SLA)

Define time period needed for Security Request/Tickets to be handled or

closed by the engineer.

If the Security Request/Ticket is not closed, then:

o It will be automatically escalated to the next level of expert/engineer,

o Suitable emails/SMS will be send to the Admin and the higher

authorities (as defined by the Security incident handling policy).

35

Page 36: OwnYIT CSAT + SIEM

Service Level Agreement Management (SLA)

36

Page 37: OwnYIT CSAT + SIEM

Software/Patch Management

Deploy software and software patches from central

console.

Any MSI based Software/Patch deployment, which does not required user

interaction.

Command line supported any EXE based software/patch deployment.

Command line based Registry update/Script file execution.

Typical Benefits:

o Reduce the time of deploying software at scattered

locations.

37

Page 38: OwnYIT CSAT + SIEM

Software/Patch Management

38

Page 39: OwnYIT CSAT + SIEM

Secure Power Management

Apply network, group or PC wise following policies for those machines,

which have been idle for specific time:

o Turn OFF,

o Hibernate,

o Standby

Single console for achieving the Green Computing needs of IT infrastructure.

39

Page 40: OwnYIT CSAT + SIEM

Secure Power Management

40

Page 41: OwnYIT CSAT + SIEM

Secure Remote Audit & Management

Single console for comprehensive remote management.

Secure remote access of Desktop/Servers for trouble-shooting, provisioning

and management.

Typical Benefits:

o Faster problem identification and resolution,

o Facility to record actions taken by the engineer,

o Clear responsibility allocation and track of action taken by IT support

staff. Resulting in less blame-game involving the IT Support Team,

o Lower training time and cost for new IT Support Team members

41

Page 42: OwnYIT CSAT + SIEM

Secure Remote Audit & Management

42

Page 43: OwnYIT CSAT + SIEM

Secure Remote Audit & Management

43

Page 44: OwnYIT CSAT + SIEM

Print Management

Tracking of all files with name, size, path and etc being

printed by the user.

44

Page 45: OwnYIT CSAT + SIEM

Reports

Inventory Reports like:o Desktop Assets like …

Hard disk ID,

BIOS information,

Motherboard,

no. of HDD ,

RAM slot

o Create and maintain Inventory of storage media, Laptops, Desktop and etc.

o Report of hardware and software changes are made.

o Detects and stores the make, model, serial number etc. of hardware assets.

Reports of product keys of installed Microsoft’s software.

45

Page 46: OwnYIT CSAT + SIEM

Reports (Contd …)

Provides report:

o Agent installation,

o Shared Resources,

o Printing information,

o Processes and services running on the machine,

o Activities performed by the User.

All reports are provided on a single console.

Reporting to address your complete IT Infrastructure reporting needs.

Export to Excel/ PDF format for further analysis and sharing.46

Page 47: OwnYIT CSAT + SIEM

Reports

47

Page 48: OwnYIT CSAT + SIEM

Reports

48

Page 49: OwnYIT CSAT + SIEM

Conclusion

Simple to Implement and easy to use.

Get control of your IT Infrastructure spread across different departments

and locations.

Enforce IT policy

Made in India for Indian IT Environment.

49

Page 50: OwnYIT CSAT + SIEM

Our valued Customers

50

Page 51: OwnYIT CSAT + SIEM

THANK YOU

51

23,N.S.ROADKOLKATA- 700001

Cont.Dets.: Manoj SinghCont.No: 09331230629/03366336500/24

E-mail: [email protected] / [email protected]


Top Related