SlideShare uma empresa Scribd logo
1 de 27
Simplifique com Inteligência
SoluçõesComuns ,[object Object]
UNIX, LINUX, WINDOWS
Terminal Server e VDI
DelegaçãodaAdministração
ElevarPrivilégios
IntegrarUnix, Linux, Mac & Java com AD
Application SSO com AD
Single sign-on via AD
Authenticação Forte
DelegarAtividades
MenosPriviégios
Segregação de Função
AutorizarQuandoPrecisa
Relatório de Conformidade
ElevarPrivilégioquandonecessário
Unificar o login via Diretório AD
Unificaratividades via Diretório AD,[object Object]
ProvisionarRecursos
 Enterprise Single Sign On SimplificarControle e Acesso: Unix, Linux, and Mac no AD Vintela Authentication Services Applications no AD-based single sign-on/reduced sign-on environment (SAP, Siebel, Oracle, DB2, others) Vintela Authentication Services Vintela Single Sign-on for Java A2A e A2DB
 Enterprise Single Sign On
SAPM ElevarPrivilégio, QuandoNecessário “… shared account password management tools will be used by more than 50% of large enterprises by year end 2010 to manage passwords for shared accounts.” Market Overview: Shared-Account/Software-Account Password Management Tools  “SAPM tools enable organizations to manage passwords for shared and software accounts more effectively and efficiently than manual processes.” Market Overview: Shared-Account/Software-Account Password Management Tools
SAPM
SAPM
Simplificar com Inteligência Autorizar Regras Políticas Acesso Senhas
Porque? Privileged Account Password Management “… shared account password management tools will be used by more than 50% of large enterprises by year end 2010 to manage passwords for shared accounts.” Market Overview: Shared-Account/Software-Account Password Management Tools  “In any organization, the use of every platform and device ultimately relies on superuser accounts, which are the most powerful in the organization.“ Best Practices for Managing Shared Superuser and Firecall Accounts  “SAPM tools enable organizations to manage passwords for shared and software accounts more effectively and efficiently than manual processes.” Market Overview: Shared-Account/Software-Account Password Management Tools
Analyst & Media Coverage “The Enterprise Random Password Manager from Lieberman Software is an extremely powerful tool which automatically discovers, updates, stores and allows secure recovery of every privileged account password throughout the enterprise.“   SC Magazine Group Test: Password Management - August 2009

Mais conteúdo relacionado

Mais procurados

20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...Robin Vermeirsch
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products OverviewDell
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxfordguestd9aa5
 
Wilson Ebo resume15
Wilson Ebo resume15Wilson Ebo resume15
Wilson Ebo resume15Wilson Ebo
 
Secure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zoneSecure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zoneTushar Gupta
 
Scaling SaaS on Oracle
Scaling SaaS on OracleScaling SaaS on Oracle
Scaling SaaS on OracleOpSource
 

Mais procurados (10)

20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
 
ADFS + IAM
ADFS + IAMADFS + IAM
ADFS + IAM
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
Identity in the cloud using Microsoft
Identity in the cloud using MicrosoftIdentity in the cloud using Microsoft
Identity in the cloud using Microsoft
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxford
 
Remote Desktop Manager suite
Remote Desktop Manager suiteRemote Desktop Manager suite
Remote Desktop Manager suite
 
Wilson Ebo resume15
Wilson Ebo resume15Wilson Ebo resume15
Wilson Ebo resume15
 
Sadha Resume
Sadha ResumeSadha Resume
Sadha Resume
 
Secure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zoneSecure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zone
 
Scaling SaaS on Oracle
Scaling SaaS on OracleScaling SaaS on Oracle
Scaling SaaS on Oracle
 

Destaque

System Man
System ManSystem Man
System ManNetBR
 
Compliance
ComplianceCompliance
ComplianceNetBR
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao DatacenterNetBR
 
Santo Digital
Santo DigitalSanto Digital
Santo DigitalNetBR
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao DatacenterNetBR
 
Lieb Soft
Lieb SoftLieb Soft
Lieb SoftNetBR
 

Destaque (6)

System Man
System ManSystem Man
System Man
 
Compliance
ComplianceCompliance
Compliance
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Santo Digital
Santo DigitalSanto Digital
Santo Digital
 
Controle de Acesso ao Datacenter
Controle de Acesso ao DatacenterControle de Acesso ao Datacenter
Controle de Acesso ao Datacenter
 
Lieb Soft
Lieb SoftLieb Soft
Lieb Soft
 

Semelhante a Delegation

What's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMSWhat's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMSAsaf Nakash
 
A Managed Platform Will Change Your Business
A Managed Platform Will Change Your BusinessA Managed Platform Will Change Your Business
A Managed Platform Will Change Your BusinessWP Engine
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)pramod singh
 
KD2017_System Center in the "cloud first" era
KD2017_System Center in the "cloud first" eraKD2017_System Center in the "cloud first" era
KD2017_System Center in the "cloud first" eraTomica Kaniski
 
Migrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWSMigrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWSAmazon Web Services
 
And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?Tomica Kaniski
 
Windows server 2003_r2
Windows server 2003_r2Windows server 2003_r2
Windows server 2003_r2tameemyousaf
 
ORACLE FUSION - IBANK
ORACLE FUSION - IBANKORACLE FUSION - IBANK
ORACLE FUSION - IBANKibankuk
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Tom Laszewski
 
Microsoft private cloud
Microsoft private cloudMicrosoft private cloud
Microsoft private cloudebuc
 
Oracle Code Keynote with Thomas Kurian
Oracle Code Keynote with Thomas KurianOracle Code Keynote with Thomas Kurian
Oracle Code Keynote with Thomas KurianOracle Developers
 
Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...
Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...
Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...webhostingguy
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overviewgjuljo
 
Microsoft Azure Introduction
Microsoft Azure IntroductionMicrosoft Azure Introduction
Microsoft Azure IntroductionGameLandVN
 
Microsoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessMicrosoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessVinh Nguyen Quang
 
Cross platform mobile backend with mobile services
Cross platform mobile backend with mobile servicesCross platform mobile backend with mobile services
Cross platform mobile backend with mobile servicesJames Quick
 
Windows 2008 Overview
Windows 2008 OverviewWindows 2008 Overview
Windows 2008 OverviewAmit Gatenyo
 
SWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSSWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSwebhostingguy
 

Semelhante a Delegation (20)

What's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMSWhat's New In Microsoft System Center 2016 & OMS
What's New In Microsoft System Center 2016 & OMS
 
iPlanet presentation
iPlanet presentationiPlanet presentation
iPlanet presentation
 
A Managed Platform Will Change Your Business
A Managed Platform Will Change Your BusinessA Managed Platform Will Change Your Business
A Managed Platform Will Change Your Business
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)Pramodkumar_SQL_DBA(5YRS EXP)
Pramodkumar_SQL_DBA(5YRS EXP)
 
KD2017_System Center in the "cloud first" era
KD2017_System Center in the "cloud first" eraKD2017_System Center in the "cloud first" era
KD2017_System Center in the "cloud first" era
 
Migrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWSMigrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWS
 
And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?
 
Windows server 2003_r2
Windows server 2003_r2Windows server 2003_r2
Windows server 2003_r2
 
ORACLE FUSION - IBANK
ORACLE FUSION - IBANKORACLE FUSION - IBANK
ORACLE FUSION - IBANK
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
Microsoft private cloud
Microsoft private cloudMicrosoft private cloud
Microsoft private cloud
 
Oracle Code Keynote with Thomas Kurian
Oracle Code Keynote with Thomas KurianOracle Code Keynote with Thomas Kurian
Oracle Code Keynote with Thomas Kurian
 
Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...
Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...
Tier 1 - Mac Virtual Machines and Virtual PC. Automation and ...
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overview
 
Microsoft Azure Introduction
Microsoft Azure IntroductionMicrosoft Azure Introduction
Microsoft Azure Introduction
 
Microsoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessMicrosoft azure - the cloud for modern business
Microsoft azure - the cloud for modern business
 
Cross platform mobile backend with mobile services
Cross platform mobile backend with mobile servicesCross platform mobile backend with mobile services
Cross platform mobile backend with mobile services
 
Windows 2008 Overview
Windows 2008 OverviewWindows 2008 Overview
Windows 2008 Overview
 
SWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSSWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaS
 

Delegation

  • 2.
  • 17. Unificar o login via Diretório AD
  • 18.
  • 20. Enterprise Single Sign On SimplificarControle e Acesso: Unix, Linux, and Mac no AD Vintela Authentication Services Applications no AD-based single sign-on/reduced sign-on environment (SAP, Siebel, Oracle, DB2, others) Vintela Authentication Services Vintela Single Sign-on for Java A2A e A2DB
  • 22. SAPM ElevarPrivilégio, QuandoNecessário “… shared account password management tools will be used by more than 50% of large enterprises by year end 2010 to manage passwords for shared accounts.” Market Overview: Shared-Account/Software-Account Password Management Tools “SAPM tools enable organizations to manage passwords for shared and software accounts more effectively and efficiently than manual processes.” Market Overview: Shared-Account/Software-Account Password Management Tools
  • 23. SAPM
  • 24. SAPM
  • 25. Simplificar com Inteligência Autorizar Regras Políticas Acesso Senhas
  • 26. Porque? Privileged Account Password Management “… shared account password management tools will be used by more than 50% of large enterprises by year end 2010 to manage passwords for shared accounts.” Market Overview: Shared-Account/Software-Account Password Management Tools “In any organization, the use of every platform and device ultimately relies on superuser accounts, which are the most powerful in the organization.“ Best Practices for Managing Shared Superuser and Firecall Accounts “SAPM tools enable organizations to manage passwords for shared and software accounts more effectively and efficiently than manual processes.” Market Overview: Shared-Account/Software-Account Password Management Tools
  • 27. Analyst & Media Coverage “The Enterprise Random Password Manager from Lieberman Software is an extremely powerful tool which automatically discovers, updates, stores and allows secure recovery of every privileged account password throughout the enterprise.“ SC Magazine Group Test: Password Management - August 2009
  • 28. Contas de PrivilégioElevadoTudonaEmpresa Servers & Workstations Todososhardwares TodososS.O.s Banco de Dados Datacenter Appliances Routers & switches Aceleradores Securança Aplicações Line-of-business Web services Database & middleware Backup Gerenciamento de Identidade e Acesso Gerenciamento de Sistemas
  • 29. Contas de PrivilégioElevadoOndeAplicar ? MudançasPlanejadasMudançasnão-Planejadas Rollouts de Aplicações Hardware Deploy Corporate mergers Outsourcing Guest Accounts Mudanças de Funções (Employment) Delegação e Overlap de Funções MudançaPessoas Falhas de defaults Falta de Expiração Complexidade AtaquesSociais Ataques de “Nomes” Serv1, Serv2, Serv3
  • 30. Contas de PrivilégioElevadoComo Resolver? Identificae documentatodososativos de TI, privileged accounts e interdependências. Delegaapenasosacessos de privileged accounts de forma temporal (time basis), usandomínimo de privilege, com propósito de documentação. Fortaleceregras de tamanho, unicidade e frequência de mudanças, sincronizando as mudanças e dependências. Monitorae alerta, além de documentartodososacessos: usuais e não.
  • 31.
  • 33.
  • 36. Setup and Configuration
  • 38.
  • 39. Password Change Synchronization Prevents Lockouts and Service DisruptionsApplications IIS, ASP.NET, SharePoint, scripts, configuration files, … Databases MS SQL Server, Oracle, MySQL, Sybase ASE, IBM DB2 SMB, SSH, … OleDB Directories MS Active Directory, Oracle Internet Directory and all LDAP-compliant directories LDAP ManagementConsole Windows Computers Windows Server 2008, 2003, 2000, NT4, Windows 7, Vista, XP SMB SSH Linux, UNIX, and Mainframe Sun Solaris, HP-UX, IBM AIX, Red Hat Linux, IBM AS/400, OS/390, … SSH Network Devices Cisco IOS devices and other routers, switches, firewalls, …
  • 40. IdentificarContinuous Auto-Discovery Servers Desktops Aplicações Hdw WebServers Appliances Databases Backup ERPM
  • 41. DelegarSecure Password Recovery Role Based Time Based Auditoria e Alerta DuplaCustótia MudançasComitadas & Propagadas ERPM Console Web
  • 42.
  • 47.
  • 49.
  • 51. Ajuda a Colaboradores Executive Management Controle dos Ativos Corporativos Requerimentos Regulatórios Melhorar a Agilidade, sem correr riscos Diretor de TI Aumentar Eficiência Alinar Processos de TI com Política Controle das Mudanças: Planejadas e Não Administrador Automatiza tarefas tediosas e propensa a erros Controle com Discovery Contínuo Eliminar a conformidade “incerta”
  • 52. Use Cases & Demo
  • 53. Lieberman & Microsoft Product Development Relationship Recognized innovator and leader in Privileged Password Protection and Random Password Management “Managed” Gold Certified Partner since 1999 System Center Strategic Alliance Partner Most Microsoft Windows Product Certifications of Any Management Vendor Six certified products with nearly 20 Windows 7, Server 2008, Hyper-V, Vista, XP & 2000 certifications Industry Focus Public Sector Financial Services Healthcare
  • 54. Lieberman & VendorsJoint Marketing Relationship

Notas do Editor

  1. The market is evolving into the Dynamic Data center. Customers today are dealing with challenges with VM tracking, Identification, and controlling VM sprawl, and configuration drift. As the number of VM’s grows it is important to have a way to manage the operational and compliance requirements for these environments.
  2. As you probably know, privileged identities are accounts that have elevated permission to access potentially sensitive data, run programs, or change configuration settings. To put it simply, privileged accounts like the keys to the kingdom of IT.And, privileged accounts are found virtually everywhere…On every server and workstation platform…On networking and datacenter appliances like routers and switches, load balancers, security appliances…And on almost every type of software you can name, including line-of-business applications, Web services, databases and middleware.Not only are privileged accounts powerful and widespread, but if not controlled these credentials become accessible to more and more personnel over time…
  3. New application rollouts and hardware deployments, changes in corporate structure (say, mergers), outsourcing to independent contractors, and changes in employee roles are examples of ways that access can spread in planned ways.There are also unplanned ways that access can spread. For example, as people leave the company they often take password secrets with them. Or, if passwords aren’t changed frequently enough, lack adequate complexity, or are reused across independent hardware and software assets they become more vulnerable over time.As we’ll discuss next, failure to adequately control privileged account access carries a number of risks…
  4. It takes just four, basic steps to regain control of privileged identities. These steps are easy to remember because they’re abbreviated as I.D.E.A….First, it’s essential to identify all of the privileged identities that are present on critical IT assets in your infrastructure, whether on server or desktop operating systems, network appliances, line-of-business applications, and so on. And, you’ve got to understand which of these identities are interdependent, so that when you change the credentials of one account you know to update the dependent accounts to avoid lockouts and service disruptions.Next, you’ll want to delegate access to these accounts so that only appropriate personnel can login to critical IT assets, always in a timely manner whenever needed, over a secure communication channel, using the least privilege required (to reduce the potential for damaging errors), with a documented purpose, only during designated times.It’s also essential to enforce rules for password strength, uniqueness (so that a password isn’t reused except where absolutely necessary) and change frequency, synchronizing all of those changes across dependent processes.Finally, having right auditing and alerting processes makes individuals accountable for privileged access, sets the right organizational tone, and alerts management to any unusual events. Let’s take a closer look at how Enterprise Random Password Manager, the privileged identity management solution from Lieberman Software, makes it possible to accomplish these four steps…
  5. Enterprise Random Password Manager is distinguished for its ability to discover privileged accounts throughout your infrastructure……on a wide range of server and desktop operating systems; on databases including SQL Server, Oracle, Sybase, and DB2; on Web services platforms, line-of-business applications, network and security appliances, backup systems, and more.After you install Enterprise Random Password Manager, whenever authorized users need access to these systems they get unique passwords, issued on-demand for one-time use, over a secure Web console…
  6. … Access is role-based, time-controlled so that the passwords expire and are changed after a configured period, audited and alert-generating so that there’s full accountability, and there’s full support for industry-standard, two-factor authentication like RSA SecurID.Enterprise Random Password Manager generates each new password…
  7. … according to configured rules for complexity, uniqueness (to avoid reuse), and change frequency, and it stores these passwords in a secure vault.All password changes are synchronized…
  8. … according to configured rules for complexity, uniqueness (to avoid reuse), and change frequency, and it stores these passwords in a secure vault.All password changes are synchronized…
  9. … these are examples of how Enterprise Random Password Manager helps our customers comply with PCI-DSS standards.As you can imagine, Enterprise Random Password Manager provides value to many different job roles within IT. For example, we help executive management…
  10. … these are examples of how Enterprise Random Password Manager helps our customers comply with PCI-DSS standards.As you can imagine, Enterprise Random Password Manager provides value to many different job roles within IT. For example, we help executive management…
  11. For example, we help executive management…… protect corporate assets by ensuring that only the right personnel have access to sensitive data and can make changes to IT assets that could impact critical business processes…… and, as we’ve discussed, we help assure compliance with critical industry initiatives like Sarbanes-Oxley, HIPAA, Gramm-Leach-Bliley, and many others…… and, as was the case the financial institution that needed an immediate, decisive response when its domain credentials were exposed online, we help our customers to be more agile in the face of new security threats.For IT directors and other managers……we help improve the efficiency of IT staff so they’re spending less time granting access, changing passwords, and documenting the result….… we provide the reporting features they need to show that IT processes are working to support the company’s security policies…… and, we help these managers to mitigate the risks that privileged accounts otherwise introduce in the organization’s day-to-day business as new systems and applications are brought online, changes are made in the infrastructure, or employees join and leave the company.Finally, for the IT administrator…… our products eliminate so many of the cumbersome, error-prone tasks that they face in administering and documenting account access, allowing them to focus on more strategic work that can further their careers…… the products improve security and accountability so that administrators can react more quickly and avoid the blame for service disruptions and security issues…… and, they make it far easier for administrators to provide their managers the detailed information they need, without impacting day-to-day productivity.With that, let’s move on to a live demonstration of Enterprise Random Password Manager.