Mais conteúdo relacionado Semelhante a Cutting-Edge Network Behavior Audit Technology from BMST (20) Cutting-Edge Network Behavior Audit Technology from BMST2. Agenda 1. Opportunity and Business Overview 2. Technology and Products 3. Scenarios and Solutions 4. Our Customers 5. About BMST 2 ©Copyright, BMST Co. 2009 December 13, 2009 3. What Gartner Top 10 and NSA Say? Gartner TOP 10 2010 1 Cloud computing, 2 Advanced analytics, 3 Client computing, 4 IT for Green,5 Reshaping the data center 6 Social computing, 7 Security - activity monitoring. …Information security professionals face the challenge of detecting malicious activity in a constant stream of discrete events that are usually associated with an authorized user and are generated from multiple network, system and application sources. At the same time, security departments are facing increasing demands for ever-greater log analysis and reporting to support audit requirements... 8 Flash memory, 9 Virtualization for availability, 10 Mobile applications. Security is not just the perimeter; layered defenses must be inside of the network and on the applications and databases if we really want to protect information. We haven’t done nearly enough to protect applications and databases…and the magnitude of loses around insider threats are underreported. William (Bill) Crowell – former Deputy Director of the NSA 3 ©Copyright, BMST Co. 2009 December 13, 2009 6. Don’t you need compliance? What to show external auditors on complete organization IT operation records? 7. How to monitor and find the violation of authorized users in real time? 8. How to guarantee the security policy are followed correctly?4 ©Copyright, BMST Co. 2009 December 13, 2009 26. Session-Auditor Deployment SSH RDP Telnet ICA Rlogin VNC FTP Oracle Sybase …… Administrator WebApp& Web Services Enterprise Apps (ERP/CRM) SAS Traffic IT系统管理员/ 兼职安全管理 Recorded Servers Unix/Linux Console Windows Network Security SAD Auditor Mission critical 企业应用 (SAP, Oracle等) 27. Critical System Critical System Critical System Critical System SAS SAS SAS SAS Administrator SAD SAD Administrator SAC Auditor Distributed and Hierarchical Deployment 29. Session Auditor Product Family Session Auditor Lite is one 2-in-1 appliance, integrated SAS and SAD Storage SAS and SAD support distributed and hierarchical deployment, bringing users further flexibility Network Throughput 10 ©Copyright, BMST Co. 2009 December 13, 2009 36. Our Customers Session Auditor has been widely adopted by industry leading customers from telco, finance, service providers, consulting firms, governments and etc. Please visit http://bmst.net/solution for more details. 12 ©Copyright, BMST Co. 2009 December 13, 2009