백서 수집 도서실:
ObserveIT의 감사 분석 전문가로부터의 사용자 감사 교육
The Security Threat Trifecta
The greatest source of IT risk in your organization has changed, and it is imperative that you look at the intersection of three business-critical elements found in every organization: people, activities and applications. This ebook will provide you with insight into and conclusive solutions to the greatest IT security risk to organizations today.
Mitigating Your Biggest Security Risk: Your Users
While many think IT administrators are the biggest threat to your company's security, this is not the case - a staggering 84% of internal data breaches come from regular business users with no administrative privileges. Download this ebook from ObserveIT to learn how to mitigate this major security risk by employing tools that monitor not only individual users but also applications, as well as security best practices.
EMA Report: Mitigating User-Based Risks
Do you know your risky users? Though every organization wants to believe all threats are external, the fastest growing IT security risk actually stems from within – your users. Your business users, IT users, and trusted contractors, need access to applications and data to do their jobs— but, this interaction is also the source of the fastest growing IT security risk. Learn more about mitigating user based risks to ensure your enterprise data is protected.
Gartner: Your Critical Missing Security Vantage Point
IT security has long been synonymous with a focus on prevention and infrastructure. The rapid increase in data breaches at organization like Target, LivingSocial and Home Depot clearly highlights how prevention and infrastructure security alone are not enough; we need to add the user vantage point. Learn more about the need for user-based security and user-based threats in this Garter research report.
Strangers in Your Servers: Making Working with Contractors More Secure
Nearly 90% of data breaches are accomplished via remote access to a company's systems and 76% of data-breaches investigated were due to the direct exploitation of remote vendor access channels. However, Internet-based remote access systems are critical for numerous business functions, so simply eliminating them is not an option. ObserveIT's unique approach to session recording and analysis is the future-proof way forward.
Ensuring Security While Maintaining Privacy
Under the increasing burden of regulatory compliance such as PCI, HIPAA, SOX, NERC and ISO 27001, companies are more and more seeking some form of monitoring platform for recording employee activity. Not surprisingly, this has been met with concern on the part of employees, who fear that employee monitoring is stepping on their rights to privacy in the workplace. However, a combination of transparency and common sense can bridge these two seemingly diametric positions. After all, if an employer seeks to simply meet regulatory compliance, and can do so without infringing on employee rights, then both sides will benefit from greater efficiency, clarity and profitability...
How ObserveIT Addresses Key Hong Kong IT Security Guidelines
A high-level look at how ObserveIT's user activity recording and logging solution addresses a number of the key Guidelines. Also mentioned are a number of the Hong Kong Monetary Authority's General Principles for Technology Risk Management [TM-G-1] (version V.1–24.06.03) addressed by ObserveIT.
How ObserveIT Addresses Key National Indian Gaming Commission IT Controls
The National Indian Gaming Commission's Minimum Internal Control Standards for Class II Gaming specifies, in 25 CFR Part 543.20, the minimum internal control standards required for information technology and information technology data. ObserveIT's session recording and logging solution is the perfect means to implement key controls involve the logging and monitoring of all activity performed on sensitive systems.
How ObserveIT Addresses Key Australian Information Security Controls
The Australian Government's Information Security Manual (September 2012) specifies a wide range of information security governance controls. This document presents a high-level look at how ObserveIT's server session recording solution addresses 10 of those controls.
How ObserveIT Addresses Key India DoT Remote Access Security Requirements
In January 2013, the Department of Telecommunications of the Government of India's Ministry of Communications & IT contacted all telecom service providers in India with a set of security and auditing requirements for remote access systems. This document presents a high-level look at how ObserveIT's server session recording solution addresses a number of these key auditing requirements.
How ObserveIT Addresses Key Polish Banking ICT Security Recommendations
In January 2013, the Polish Financial Supervision Authority published Recommendation D, a set of recommendations regarding the management of risks inherent in IT and telecommunication systems used by the banking industry. This document presents a high-level look at how ObserveIT's server session recording solution addresses a number of the key recommendations outlined in Recommendation D.
User Auditing Options for Linux and Solaris
A variety of methods exist for auditing user activity in UNIX and Linux environments. This whitepaper looks at the 5 most popular methods for auditing. Each method is described, along with actionable tips for how to make the best use of each method. In addition, guidance is provided to show what type of auditing each method is best suited for.
If you spend a few minutes browsing the websites of Log Management and SIEM tool vendors, you might come away with the conclusion that all your system audit and compliance problems are solved. Unfortunately, this rosy picture seems to ignore the ever-present problem of blindspots in audit reports: If your apps don't log it, your audit report won't show it.
When Logs Don't Help, by PCI guru Dr. Anton Chuvakin
This paper covers the critical challenges of implementing PCI DSS controls and suggests creative solutions for related compliance and security issues. Specifically, the hard problem of security monitoring and log review in cloud, legacy, and custom application environment is discussed in depth. Additionally, clarification of key PCI DSS compensating controls is provided. This paper will help you satisfy the regulatory requirements and improve security of your sensitive and regulated data.
Recording Remote Access
In the following article, I will demonstrate how to record remote-access VPN gateway sessions. In this deployment, all secure remote access sessions are routed through one or more central remote access gateways, with secondary remote desktop sessions serving as the method to access internal Windows or UNIX servers. All sessions gateway are fully audited and recorded. This recorded session allows Auditors and IT managers to have a full visual audit trail of all connections; identify the source of each connection; and view a step-by-step replay of the actions taken and applications accessed on these machines...
Outgoing VDI Gateways
It is very common for enterprises to use a Terminal Server or Citrix gateway in order to give external vendors access to internal servers or resources. However, we are starting to see a growing adoption of a "mirror-image" of this solution: Service providers that need to connect to multiple customer locations (using different protocols, according to customer requirements) who want to provide a single access point through which all outgoing traffic is routed. These service providers have achieved two important benefits with their outgoing gateway architecture: 1) Ease of administration and lower costs for managing multiple access methods; and 2) Full audit visibility of all actions performed on client servers during remote support sessions...