Business Environment

Report
ObserveIT:
User Activity Monitoring
Your Full Name Here
[email protected]
Month 2014
Copyright © 2014 ObserveIT. All rights reserved.
All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for informational purposes only.
www.observeit.com
ObserveIT Software that acts like a security camera on your servers!

 Video camera: Recordings of all user activity
 Summary of key actions: Alerts for problematic activity

2
800+ Enterprise Customers
Healthcare / Pharma
Financial
Telco & Media
Manufacturing
Retail / Service
Utilities & Logistics
IT Services
Government
Gaming
3
800+ Enterprise Customers
Healthcare / Pharma
4
800+ Enterprise Customers
Financial
5
800+ Enterprise Customers
Telco & Media
ARGENTINA
6
800+ Enterprise Customers
Manufacturing
7
800+ Enterprise Customers
Retail / Services
8
800+ Enterprise Customers
Utilities / Logistics / Energy
9
800+ Enterprise Customers
IT Services / Technology
10
800+ Enterprise Customers
Government
11
800+ Enterprise Customers
Gaming
12
Business challenges that ObserveIT addresses
Remote Vendor
Monitoring
• Impact human behavior
• Transparent SLA and billing
• Eliminate ‘Finger pointing’
Compliance &
Security Accountability
Root Cause Analysis &
Documentation
• Reduce compliance costs for
GETTING compliant and
STAYING compliant
• Satisfy PCI, HIPAA, SOX, ISO
• Immediate root-cause answers
• Document best-practices
13
An Analogy
Bank Branch Office
Bank Computer Servers
Companies invest in access control
but once users gain access,
there is little knowledge of
who they are and what they do!
(Even though 71% of data breaches
involve privileged user credentials)
They both hold money…
…They both have Access Control…
...Here they also have security cameras…
…Here, they don’t!
14
Why?
Because system logs are built by DEVELOPERS for DEBUG!
Only 1% of(and
datanot
breaches
are
by SECURITY
ADMINS for SECURITY AUDIT)
discovered by log analysis!
(Even in large orgs with established SIEM processes,
the number is still only 8%!)
“
“
“
“
I don’t have this problem.
I’ve got log analysis!
The picture isn’t quite as
rosy as you think.
15
Can you tell what
happened here?
Replay Video
Wouldn’t it be easier
with a ‘Replay Video’
button?
Video Replay shows
exactly what happened
16
And many commonly used apps don’t even have their own logs!
• DESKTOP APPS
DESKTOP APPS
•
•
•
•
Firefox / Chrome / IE
MS Excel / Word
Outlook
Skype
REMOTE & VIRTUAL
• Remote Desktop
• VMware vSphere
ADMIN TOOLS
•
•
•
•
Registry Editor
SQL Manager
Toad
Network Config
TEXT EDITORS
• vi
• Notepad
17
System Logs are like
Fingerprints
They show the results/outcome
what
took place
System Logs areoflike
Fingerprints
User Audit Logs are like
Surveillance Recordings
They show exactly what
took place!
“
“
Both are valid…
…But the video log goes right to the point!
18
Our Solution
1: Video Capture
Video
Session
Recording
‘Admin‘
= Alex
Logs on as ‘Administrator’
X X X
ITthe
Alex
Admin
2: Video Content Analysis
List of apps,
files, URLs
accessed
3: Shared-user Identification
Corporate
Server or Desktop
WHO is doing WHAT
on our network???
Cool! Now I know.
Audit Reporting DB &
SIEM Log Collector
User
Alex
Video
Play!
Text Log
App1, App2
Sam the
Security Officer
19
Demo Links:
Powerpoint demo: Click here to show
Live hosted demo: http://demo.observeit.com
Internal demo: http://184.106.234.181:4884/ObserveIT
YouTube demos:
English: http://www.youtube.com/watch?v=uSki27KvDk0&hd=1
Korean: http://www.youtube.com/watch?v=k5wLbREixco&hd=1
Chinese: http://www.youtube.com/watch?v=KVT-1dX_CoA&hd=1
Japanese: http://www.youtube.com/watch?v=7uwXlHpLeTc&hd=1
French: http://www.youtube.com/watch?v=wC31aXpkGOg&hd=1
LIVE DEMO
Russian: http://www.youtube.com/watch?v=fzVhLfSb2nY&hd=1
Business challenges & Customer use-cases
Remote Vendor
Monitoring
• Impact human behavior
• Transparent SLA and billing
• Eliminate ‘Finger pointing’
Compliance &
Security Accountability
Root Cause Analysis &
Documentation
• Reduce compliance costs for
GETTING compliant and
STAYING compliant
• Satisfy PCI, HIPAA, SOX, ISO
• Immediate root-cause answers
• Document best-practices
21
But I like my SIEM tool!
So do we!
22
Add value
• View ObserveIT users’ activity in SIEM
• Direct link to the ObserveIT Video URL from the SIEM
• Ability to correlate ObserveIT events with other
system events
• Ability to define rules/alerts based on ObserveIT
user’s recorded events
23
Current system log report not clear enough?
Then link to the video replay!
SIEM Platform
OS and DB System
Log Report
Video Player
Event…
Event…
Event…
System Dashboard
ObserveIT User
Log Report
Event…
Event…
Event…
Simple & automated correlation rules:
Timestamp + user + machine  Video Replay
24
ObserveIT Video and Text Logs in CA UARM
List of every app run
Timeline view
Breakdown by users
and servers
Detailed action listing
Click ‘Play the video!’
icon to view
25
ObserveIT Video and Text Logs in Arcsight
Dashboard
breakdown of user
activity
Each action can link to
open a video replay
Video replay of user actions,
within the Arcsight console
26
ObserveIT Video and Logs in Splunk – Activity Dashboard
Search Window
Dashboard breakdowns
Detailed text logs of
user actions
Click icon to launch
video replay
ObserveIT Video and Logs in Splunk – Browse Sessions
Search Window
Session details (Windows)
Session details (Unix)
Click icon to launch
video replay
ObserveIT Video and Logs in Splunk – Session details
Click icon to launch video replay
per action
ObserveIT Video and Logs in LogRhythm
ObserveIT Video and Text Logs in RSA enVision
Metadata filtering
Event listing
31
LIVE DEMO PART II: SIEM INTEGRATION
ObserveIT Compliance Coverage
for PCI, HIPAA, ISO27001, SOX, NERC/FERC
Compliance Requirements
ObserveIT Solution
• Assign unique ID to each person
with computer access
(ex: PCI Requirement 8)
ObserveIT Secondary Identification
• Track all access to network
resources and sensitive data
(ex: PCI Requirement 10)
ObserveIT Session Recording
• Maintain policies that address
information security
(ex: PCI Requirement 12)
ObserveIT Policy Messaging
33
Getting compliant is only the first step:
Reduce compliance costs now AND in the future
GET COMPLIANT:
•
All apps
–
•
•
Captures every user action, including
video replay
All platforms
–
–
•
Windows, Linux, Unix
VMs, Cloud, Remote access, Direct access
Satisfy auditor inquiries
–
–
Generate logs for apps that don’t have
internal logs
All actions
–
STAY COMPLIANT:
•
Stop the “re-correlation” cycle!
–
•
On-the-spot response
(No need to send requests back to
research team)
System changes ≠ SIEM correlation
realignment
Video Replay = Non-repudiation!
– Zero doubt surrounding audit
conclusiveness
34
Alerting via Network Management
• Same architectural concept as SIEM Integration
– Mainly for metadata integration
• Triggers system alerts or actions based on log activity
35
DEPLOYMENT SCENARIO OPTIONS
Standard Agent-based Deployment
•
•
•
•
Agent installed
each monitored
Administrators
access on
ObserveIT
audit machine
• Agent becomes active only when user session starts
• ASP.NET application in IIS
• Data capture is triggered by user activity (mouse movement, text typing,
Data
Storage
Mgmt
Serverinterface
receives
data
from
Agents
• Primary
forsession
video replay
and
reporting
etc.). No recording takes place while user is idle
ASP.NET
application
IIS • Microsoft
• Also
used forinconfiguration
and admin
tasks database
SQL Server
• Communicates with Mgmt Server via HTTP on customizable port, with
Collects
all data
delivered
by the
• Web
console
includes
granular
policy
rules for limiting
(orAgents
optonal
file-system
storage)
optional SSL encryption
Analyzesaccess
and categorizes
and sends
to DB data,
Servermetadata and screenshots
to sensitivedata,
data
•
Stores
all
config
• Offline mode buffers recorded info (customizable buffer size)
Communicates with Agents for
config
updates via standard TCP port 1433
• All
connections
• Watchdog mechanism
prevents
tampering
ObserveIT
Agents
ObserveIT
Web Console
ObserveIT
Management
Server
Remote
Users
Database
Server
Metadata Logs
& Video Capture
Local
Login
Desktop
AD
Network
Mgmt
SIEM
BI
Open API and Data Integration
• Standards-based
• Simple integration
37
Gateway Jump-Server Deployment
Corporate Servers
SSH
PuTTY
(no agent installed)
MSTSC
Gateway
Server
Corporate Desktops
Internet
(no agent installed)
ObserveIT
Agent
Remote and local users
Corporate Servers
(no agent installed)
ObserveIT
Management Server
38
Hybrid Deployment
Corporate Servers
SSH
PuTTY
(no agent installed)
MSTSC
Gateway
Server
Corporate Desktops
Internet
(no agent installed)
ObserveIT
Agent
Remote and local users
Direct login
(not via gateway)
Sensitive production servers
(agent installed)
ObserveIT
Management Server
39
Gateway Jump-Server Deployment
Customer #1 Servers
SSH
PuTTY
(no agent installed)
MSTSC
Gateway
Server
Internet
Remote and local users
Customer #2 Servers
(no agent installed)
ObserveIT
Agent
Customer #3 Servers
(no agent installed)
ObserveIT
Management Server
40
Citrix Published Apps Deployment
Published Apps
Citrix
Server
Remote
Access
ObserveIT
Agent
ObserveIT
Management Server
41
HOW AGENT WORKS
ObserveIT Architecture:
How the Windows Agent Works
Synchronized capture via
Active Process of OS
Screen
Capture
Real-time
User action
triggers Agent
capture
User logon wakes
up the Agent
Captured metadata & image
packaged and sent to Mgmt
Server for storage
Metadata
Capture
URL
Window Title
Etc.
43
ObserveIT Architecture:
How the Linux/Unix Agent Works
User-mode executable that
is bound to every secure
shell or telnet session
CLI I/O
Capture
Real-time
TTY CLI activity
triggers Agent
capture
User logon wakes
up the Agent
Captured metadata & I/O
packaged and sent to
Mgmt Server for storage
Metadata
Capture
System Calls
Resources Effected
Etc.
44
KEY FEATURES: WHAT MAKES OBSERVEIT GREAT
Generate logs for every app
(Even those with no internal logging!!)
WHAT DID THE USER DO?
A human-understandable list
of every user action
Cloud-based app: Salesforce.com
System utilities: GPO, Notepad
Legacy software: financial package
46
Video analysis generates intelligent text metadata
for Searching and Navigation
ObserveIT captures:
• User
• Server
• Date
• App launched
• Files opened
• URLs
• Window titles
• Underlying system calls
Launch video replay at the
precise location of interest
47
Recording all protocols
Telnet
Windows Console
(Ctrl-Alt-Del)
Unix/Linux Console
• Agnostic to network protocol and client application
• Remote sessions and also local console sessions
• Windows, Unix, Linux
48
Logs tied to Video recording: Windows sessions
Audit Log
USER SESSION REPLAY:
Bulletproof forensics for
security investigation
Replay Window
CAPTURES ALL ACTIONS:
Mouse movement, text entry, UI
interaction, window activity
PLAYBACK NAVIGATION:
Move quickly between apps that the
user ran
49
Logs tied to Video recording: Unix/Linux sessions
Audit Log
List of each
user command
Replay Window
Exact video playback
of screen
50
Privileged/Shared User Identification
ObserveIT requires named user
account credentials prior to granting
access to system
User logs on as generic
“administrator”
Each session audit is now
tagged with an actual name:
Login userid: administrator
Actual user: Daniel
Active Directory used
for authentication
51
Policy Messaging
NOTE: PCI-DSS compliance regulations
require that user activity be audited.
Send policy and status
updates to each user exactly
when they log in to server
All activity during this login session will
be recorded. Please confirm that you
are aware that you are being recorded.
Capture optional user
feedback or ticket # for
detailed issue tracking
Ensure that policy standards
are explicitly acknowledged
52
Real-time Playback
On-air icon launches
real-time playback
View session activity
“live", while users are
still active
53
Report Automation:
Pre-built and custom compliance reports
Schedule reports to run
automatically for email delivery
in HTML, XML and Excel
Canned compliance audits
and build-your-own
investigation reports
Design report according to
precise requirements: Content
Inclusion, Data Filtering,
Sorting and Grouping
54
Double-password privacy assurance:
Addresses employee privacy mandates
Two passwords:
One for Management. Second
for union rep or legal counsel
Textual audit logs can be accessed
by compliance officers for security
audits, but video replay requires
employee rep authorization
(both passwords)
55
API Interface
Control ObserveIT Agent via
scripting and custom DLLs
within your corporate
applications
Start, stop, pause and resume
recorded sessions based on custom
events based on process IDs, process
names or web URLs
56
Robust Security
• Agent ↔ Server communication
•
•
•
•
AES Encryption - Rijndael
Token exchange
SSL protocol (optional)
IPSec tunnel (optional)
• Database storage
•
•
Digital signatures on captured sessions
Standard SQL database inherits your enterprise
data security practices
• Watchdog mechanism
•
•
•
Restarts the Agent if the process is ended
If watchdog process itself is stopped, Agent
triggers watchdog restart
Email alert sent on watchdog/agent tampering
57
Recording Policy Rules
Determine what apps to
record, whether to record
metadata, and specify
stealth-mode per user
Granular include/exclude
policy rules per server,
user/user group or application
to determine recording policy
58
Pervasive User Permissions
• Granular permissions /
access control
• Define rules for each user
• Specify which sessions the user may playback
• Permission-based filtering
affects all content access
•
•
•
•
Reports
Searching
Video playback
Metadata browsing
• Tight Active Directory
integration
• Manage permissions groups in your native AD
repository
• Access to ObserveIT Web
Console is also audited
• ObserveIT audits itself
• Addresses regulatory
compliance requirements
59
CUSTOMER SUCCESS STORIES
HIPAA Compliance Auditing
Business Environment
• Medical imaging products (MRI, CT, US, X-Ray) deployed at
hospitals and medical centers worldwide
• Customer support process requires remote session access to
deployed systems
Industry: Medical Equipment Manufacturer
Solution: Compliance Report Automation (HIPAA)
Company: Toshiba Medical Systems
Challenge
• Strict HIPAA compliance regulations must be enforced and
demonstrable
• In addition, SLA commitments require visibility of service times
and durations
Solution
•
•
•
•
ObserveIT deployed in a Gateway architecture
All access routed via agent-monitored Citrix gateway
Actual systems being accessed remain agent-less
Toshiba achieved 24x7 SLA reports, including granular incident
summaries
• Automatic generation of HIPAA regulatory documentation, led
to reduced compliance costs and improved customer (hospital)
satisfaction
61
PCI Compliance at a Market Transaction Clearinghouse
Business Environment
• A major clearinghouse must provide concrete PCI documentation
Challenge
Industry: Financial Services
Solution: Compliance Report Automation (PCI)
• Each audit report cycle was a major effort of log collection
• Audits were often judged incomplete when exact cause of system
change was unidentified
Solution
• Since deploying ObserveIT, audit reporting has become fully
automated
• Zero audit rejects have occurred
62
Remote Vendor Monitoring at Coca-Cola
Business Environment
• Bottling and production line software for geographically
diverse sites
• Centralized ERP platform for sales, fulfillment and
compensation
• Many platforms supported by 3rd Party solution providers
Industry: Food&Beverage Manufacturing
Solution: Remote Vendor Monitoring
Company: Coca-Cola
Challenge
• Ensure 100% accountability for any system access violation
• Eliminate downtime errors caused by inappropriate login usage
• Increase security of domain admin environment
Solution
• ObserveIT deployed on all systems that are accessed via RDP by
remote vendors
• IT admins also monitored on sensitive domain admin servers
• As a result, Coca-Cola saw a significant decrease in system
availability issues caused by improper user actions
“
As soon as vendors discovered
that all actions are being
recorded, it became much
easier to manage them.
Moti Landes
IT Div. CISO
”
63
Medical Systems Remote Auditing
Business Environment
• Corporate servers host business applications for both internal
and customer-facing solutions
• Servers are managed and accessed by various privileged user
staff members
• Access is also open to multiple external vendor contractors
Industry: Medical Equipment Manufacturer
Solution: Remote Vendor Auditing
Company: Siemens Medical Instruments
Challenge
• Before ObserveIT, there was no practical way to log user activities
on these servers.
Solution
• ObserveIT provides accountability of all internal and outsource
vendor admins
• Reporting and searching is used to focus on critical issues
• Fast deployment ensured quick and painless uptime:
“All we needed to do was to install a small agent on the servers
to be monitored and the recording starts immediately, without
even requiring any configuration and settings”
“
Not only was ObserveIT able
to record every single user
session on the servers, the
recordings are also fully
indexed, allowing me to
zoom in on areas of interest.
Robert Ng,
Siemens
”
64
Customer Audits and ISO 27001 at BELLIN Treasury
Business Environment
• Hosted treasury software solutions deployed in 7 data centers
worldwide for over 6,000 customers
• System support and development teams must access servers
via RDP
• Customers demand precise audit validation on-demand
Industry: Financial Software Services
Solution: Compliance Auditing
Company: Bellin Treasury
Challenge
• Proactively provide customers with evidence of bulletproof
audit trail process
• Satisfy the regulatory mandates of each of the customer
environments worldwide
Solution
• ObserveIT deployed on all production servers worldwide
• One-time setup and hands-free operations keeps maintenance
costs down
• Customer satisifaction increased signficiantly
• Solution submitted as central part of ISO 27001 certification
process
“
We enjoy showing off to our
customers that every user
action is recorded. This
increases confidence all
around.
”
Rick Beecroft,
Area Manager, Americas and Pacific Rim
65
Remote Vendor Monitoring at Visa (LeumiCard)
Business Environment
• LeumiCard’s highly-secured data center runs on several
platforms, all with sensitive mission-critical applications.
Challenge
• Operations and maintenance require system access by various
privileged internal users via RDP.
• Corporate control reports require documentation of exactly what
takes place on each production server, and to be able to explain
why the action was necessary.
Solution
• Shared-account (administrator) users must provide secondary
named-user credentials from Active Directory
• User must acknowledge that s/he is aware that s/he is logging into
a production server.
• Video recording captures a video replay of each user session.
• Daily email control reports are delivered automatically to each
manager, according to area of responsibility. Each of these
managers can then replay sessions that relate to their systems
Industry: Financial Services
Solution: Remote Vendor Monitoring
Company: LeumiCard
“
This has dramatically decreased
the number of user sessions on
production machines. Users are
more likely to find an alternative
way to do their job via secondary
test servers, which means a
reduced number of entries in my
daily control reports.
”
Ofer Ben Artzy,
Manager of Infrastructure Systems
66
ISO 27001 Compliance for Remote User Audits
Business Environment
• Large government and corporate customers demand ISO
compliance
• Mission-critical ERP platform managed by an external service
provider
• Corporate philosophy focuses on “safety, certainty and high
standards”
Industry: Utilities / Construction
Solution: Compliance Report Automation (ISO 27001)
Company: Electrotim
Challenge
• Compliance requirements call for monitoring and logging the
activities of all external users who access the network
Solution
• ObserveIT was deployed on corporate servers and TS machines
• Combination of visual screenshots plus full indexing of text is used
for easy searching
• Secure logging of all access to the system by remote connection
• Fast access to the logs during the examination of each incident
“
Implementation has been
dictated to prevent problems
with third parties having access
to our IT system.
”
Przemysław Jasiński
IT Department Manager
67
Remote Admin User Monitoring
Business Environment
• Payment transaction platform distributed across Europe
• Supporting 60,000 ATM machines
• Clearing 90,000,000 transactions per day
Industry: Financial Services
Solution: Remote Vendor Monitoring
Company: VocaLink
Challenge
• Control access to system resources, including shared privileges
between two merged corporate entities during period of merger
• Achieve common system management and visibility
Solution
• 2008: ObserveIT deployed to monitor and audit server activity
during corporate merger
• 2009: Successful visibility results from merger activity lead to
system-wide deployment
68
Remote Admin User Monitoring
Business Environment
• Web-based system connects families with a range of health,
social service and other federal and state support programs
• Deployed and managed on 93 servers and 91 workstations
across 3 geographically separated data centers
Industry: Healthcare IT
Solution: Privileged User Auditing
Company: Center to Promote HealthCare Access
Challenge
• The Center is dedicated to providing usability, ease of access
and responsiveness, without compromising any aspects of
data security or compliance.
• Given the sensitivity of personal heath records data and the
internal and government regulations regarding data access
compliance, The Center sought to augment its security with
an auditing solution that would detail all data and server
access
“
This is critical for keeping our
servers up and running, and also to
answer management’s
needs to demonstrate compliance.
Solution
• Peace-of-mind from knowing exactly what developers and
admins are doing
• Immediate fulfillment of compliance usage reports
• Faster response time to system faults
“
We still need to document every
server access by IT Admins and
internal staff developers.
”
”
Vinay Singh
IT Operations Manager
69
Reducing Errors Caused by 3rd Party Vendors
Business Environment
• 1200-server IT environment in 3 hosting centers
• Business applications (Billing, CRM, etc.) and Customer-facing
applications (Revenue generating mobile services)
Challenge
Industry: Telecommunications
Solution: Root-Cause Analysis + Vendor Monitor
Company: Pelephone
• Maintain QoS with multiple 3rd party apps
• Track activities of privileged vendor access
Solution
• ObserveIT initially deployed on 5 internal business app
servers, and resolves high-visibility outage on mission-critical
app: Identified improper actions by outsource vendor.
• ObserveIT next is deployed on entire IT platform
• ObserveIT integrated into CA environment
• Multiple customer-facing outages solved
• Positive ROI via elimination of revenue losses from service
outages
• Vendor billing decreased once they realized they were being
recorded
“
Since we deployed ObserveIT,
users are much more careful with
their server activity. Knowing
that your actions can be replayed
has a remarkable effect.
”
Isaac Milshtein
Director, IT Operations
70
Managed Services Monitoring at an IT Services Firm
Business Environment
• IT support vendor provides system management services for
over 40 major Global 1000 clients
Industry: IT Services
Solution: Managed Services Monitoring
Challenge
• Each customer has different connection protocol requirements
(some via VNC, some via RDP, some via Citrix, etc.)
Solution
• After deploying ObserveIT on an outgoing gateway, all
sessions on customer servers are recorded
• Since deployment, there have been fewer accusations from
customers regarding system problems
• For the few issues that were raised, the vendor immediately
provided recordings that proved that all actions were proper
71
Thank You!
Your Full Name
[email protected]
Copyright © 2014 ObserveIT. All rights reserved.
All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for informational purposes only.
www.observeit.com
EMPLOYEE PRIVACY POLICY:
HOW OBSERVEIT COMPLIES WITH STRICT PRIVACY LAWS
Meeting Dual Requirements
Privacy Requirements
Compliancy Requirements
User Consent
Separation of personal
communications
Secure Storage &
Limited Access
US
Federal Law: Electronic Communications
Privacy Act
State Laws: ex: California Workplace
Surveillance Labor Code
User Accountability
Wide scope of
activity logging
PCI-DSS
ISO 27001
SOX
FSA
Internal Corporate Compliance
EU and European National Laws
DPD 95/46/EC (EU)
Human Rights Act (UK)
BDSG (Germany)
CNIL (France)
74
How to answer both needs:
1.
2.
3.
Inform users of recording policy
Only monitor what must be monitored
Protect recordings from unnecessary replay
75
1. Inform users of recording policy
• Users are aware of WHAT and WHY as soon as they log in
NOTE: PCI-DSS compliance regulations
require that user activity be audited.
All activity during this login session will
be recorded. Please confirm that you
are aware that you are being recorded.
76
2. Only monitor what must be monitored
• Granular control of what is recorded
– Ex 1: Record NOTHING EXCEPT activity within SAP application
– Ex 2: Record EVERYTHING EXCEPT Skype and personal email app
Determine what apps to record
(include/exclude rules per app, per
user, and per machine)
77
3. Protect recordings from unnecessary replay
• ‘4-eyes’ double-password privacy safeguards
– Management holds one password, legal council / union rep holds the second password
– Security Auditor can review list of applications run, but CANNOT replay video of user
sessions!
– To replay video, legal council or union rep must consent and add password
Two passwords:
One for Management. Second
for union rep or legal council.
Video replay is locked without
union/legal approval
78
For more information...
• See our Whitepaper on Employee Privacy issues:
http://observeit-sys.com/Support/Whitepapers?req=privacy
79
IDENTITY THEFT DETECTION
80
The Identity Theft Problem
Majority of data breaches involve
stolen credentials or guessable
credentials.
Majority of data breaches are
discovered externally.
(customers, law enforcement, fraud detection,
press, WikiLeaks)
ObserveIT’s Identity Theft Detection
The Idea:
End users help detect identity theft.
Bob
UID:Bob from BobsPC
is OK!
Hey Bob,
Bob’s Was
PC this really you?
Bob’s Credentials
Don’t fly solo: Bring end
users into the
identity theft detection loop.
How it works: Yes
No
Notify user each time someone logs in using his
credentials
from somewhere other than his PC.
Bob’s Home PC
(Similar to method used by Facebook, Gmail, Salesforce, etc.)
Bob’s Credentials
Some Server
Check the whitelist:
UID Client
Bob BobsPC
Bob BobsHomePC
UID:Bob from BobsHomePC
from NotBobsPC
is NOTUID:Bob
OK!
is NOT OK!
After all, they know best if it was really them!
Not Bob
Not Bob’s PC
Bob’s CredentialsHey Sam,
Can weHey
add Sam,
UID:Bob from BobsHomePC
You need to investigate!
to the whitelist?
Yes
No
Sam the
Secuirty Manager
What it looks like
Email notification to end user
Whitelist pairing by Administrator
ID Theft Alert
sentAlert
to Administrator
System
revew by Administrator
04/03/2012
PROD-APACHE
CorpNet
Bonnie
Never

similar documents