SlideShare a Scribd company logo
BalaBit IT Security

The logging
 company
External Challenges:
 Security Breaches
External Challenges:
Compliance Pressure to Monitor Users


                          PCI-DSS           ISO27002
 SOX→ COBIT           Chapter 7, 8       A.10.2
                                         Third-party service
DS5.5                 Implement Strong
                                         mngmnt
                                                               HIPAA, Basel
Security monitoring   Access Control
                                         A.10.10
                                                                II, GPG13…
DS9.2                 Chapter 10
                      Audit Access to    Monitoring user          Similar
Config.changes
                      Cardholder Data    activities            requirements!
DS11.6
                      Chapter 12         A.13.2
Securing Data
                      Maintain           Mgmt of Security
                      sec.policy for     Incidents
                      personnel
Internal Challenges:
 „Superuser” Fraud




       Source: BalaBit IT professionals survey, 2011
How to control?



• Identity-management
• Logging
• Activity monitoring
BalaBit IT Security
                  „The syslog-ng company”
• 2011 revenue: $10.3 M (35% annual growth)
• Number of employees: 120
• Number of customers - global:
   – commercial customers: 800
   – open source users: 850.000
• 12 years experience in IT Security
• Global partner network, 80+ partners in 30+ countries
• Awarded to Deloitte Technology Fast 500 and Fast 50 Lists (2010)
syslog-ng Description
• IT environments constantly generate
  important data in log messages
• syslog-ng
    • Collects
    • Filters
    • Classifies
    • Normalizes
    • Stores
    • Transfers
• syslog-ng is not a log analysis tool but it is
  essential to analysis



                                                   8
Product Family
• syslog-ng Open Source Edition
   •   Leader since 1998, de facto standard in 2001
   •   Large, world-wide community
• syslog-ng Premium Edition
   •   Commercial version
   •   Additional features
   •   Professional support
• syslog-ng Store Box
   •   Turnkey appliance
   •   Index, search, reporting
   •   Professional support



                                                      9
syslog-ng Open Source Edition
• Key Features
   •   Flexible message filtering and re-writing
   •   Pattern-based classification
   •   Secure log transfer via SSL/TLS
   •   Flow-control – adaptive message rate control
   •   High speed processing > 650k/sec
• Community
   •   100,000s of users worldwide
   •   Well know by system admins
   •   Included in 3rd party devices
   •   Custom add-ons




                                                      10
syslog-ng Premium Edition

• Additional Features
   • Zero Message Loss
      • Reliable Log Transfer Protocol (RLTP)
      • Client side failover
      • Disk buffer
   • Encrypted log storage
   • SQL source and destination support
   • Windows support
   • Support for more than 50 server
     platforms
• Professional Support


                                                11
Customers
Logging is not enough…
1. Several security events are not logged!
                                                The User Monitoring „Pyramid”
2. Logs typically do not show what was done.
3. Logs often show only obscure techn. details.

                                                             Activity Records -
                                                             security camera




                                                             System logs -
                                                             snapshots
Key questions to answer…
Can you ensure the accountability of your IT staff?

   Can you monitor the actions of your „superusers”?

     Can you reliably control your outsourcing partners?

      Do you really know „who access what” on servers?

     Can you conduct quick and cheap audits at your company?

   Can you present bullet-proof evidence in legal proceedings?

Are you sure you’d pass audits concerning user monitoring?
IT Staff
                   Privileged Activity Monitoring
                          by Shell Control Box
Outsourcing
partners




Managers




                                                 •   Firewall,
VDI users
                                                 •   Network devices,
                                                 •   Databases,
                                                 •   Web/file servers,
                                                 •   Citrix server…
Privileged Activity Monitoring by
          BalaBit Shell Control Box
Shell Control Box (SCB) is an
appliance that controls privileged
access to remote systems and
records the activities into searchable
and re-playable movie-like audit
trails.
Access Control
Security & compliance benefits:

• Central access control gateway
• Multi-protocol support - SSH,
  RDP, VNC, Telnet, Citrix, etc.
• Sub-channel control
  (e.g. file transfer)
• Access by time policy
• 4-eyes authorization
• Real-time access monitoring


Key Benefit: GRANULAR ACCESS POLICY ENFORCEMENT!
Real-time alerting (& blocking)
Security & compliance benefits:

• Alerts for monitoring tools
• Alerts for supervisors
Coming in :
• Terminates session if risky action
• Risky actions are customizable
  (e.g. failed login, program execution,
  credit card number…)



Key Benefit: IMMIDIATE REACTION ON CRITICAL EVENTS!
Audit & Forensics
Security & compliance benefits:

•   Real-time activity monitoring
•   Tamper-proof, HQ audit trails
•   Movie-like playback & search
•   File transfer audit
•   Independent, transparent audit device




Key Benefit: INDEPENDENT TOOL FOR QUICK AUDITS & FORENSICS!
Big SCB Users
Conclusion
    Benefits for business
Faster ROI
•   Faster and higher quality audits
•   Lower troubleshooting and forensics costs
•   Centralized authentication & access control
•   Complete solution for user monitoring


Lower risk
•   Improved regulatory and industry compliance
•   Better employee/partner control
•   Improved accountability of staff
•   Bullet-proof evidence in legal proceedings
•   Setting technical and psychological barrier
Thank you for your attention!

         Gábor Paróczi
         Sales Manager
   gabor.paroczi@balabit.com




                                25

More Related Content

PDF
Les Assises 2015 - Why people are the most important aspect of IT security?
PDF
The New Assure Security: Complete IBM i Compliance and Security
PDF
Authentication Management
PDF
Advanced persistent threats
PDF
Identity and Access Management 101
PDF
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PPTX
Provable Device Cybersecurity in Blockchain Transactions
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Les Assises 2015 - Why people are the most important aspect of IT security?
The New Assure Security: Complete IBM i Compliance and Security
Authentication Management
Advanced persistent threats
Identity and Access Management 101
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
Provable Device Cybersecurity in Blockchain Transactions
#MFSummit2016 Secure: Mind the gap strengthening the information security model

What's hot (20)

PPTX
What's New in EventLog Analyzer - Log Management Software
PPTX
Round table guide
PPTX
Social Distance Your IBM i from Cybersecurity Risk
PPTX
Privileged Access Management (PAM)
PDF
Who will guard the guards
PPTX
P2PE - PCI DSS
PDF
Security 101: Multi-Factor Authentication for IBM i
PPT
Best practises for log management
PPTX
EventLog Analyzer - Product overview
PDF
8-step Guide to Administering Windows without Domain Admin Privileges
PDF
Privileged Access Management
PDF
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
PDF
Tänased võimalused turvalahendustes - Tarvi Tara
PPTX
ManageEngine EventLog Analyzer v7. 2
PPTX
National Digital ID Platform Technical Forum
PDF
Revolutionary Security. Ultimate Performance. Minimal Management.
PPTX
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
PPTX
Safenet Authentication Service, SAS
PPTX
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
PDF
The Tools and Machinery behind the curtain
What's New in EventLog Analyzer - Log Management Software
Round table guide
Social Distance Your IBM i from Cybersecurity Risk
Privileged Access Management (PAM)
Who will guard the guards
P2PE - PCI DSS
Security 101: Multi-Factor Authentication for IBM i
Best practises for log management
EventLog Analyzer - Product overview
8-step Guide to Administering Windows without Domain Admin Privileges
Privileged Access Management
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Tänased võimalused turvalahendustes - Tarvi Tara
ManageEngine EventLog Analyzer v7. 2
National Digital ID Platform Technical Forum
Revolutionary Security. Ultimate Performance. Minimal Management.
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Safenet Authentication Service, SAS
vBrownbag EMEA VCAP6-DCV Design Objcetive 2.7 on Security in Logical Designs
The Tools and Machinery behind the curtain
Ad

Viewers also liked (20)

PPTX
Cybersecurity - Sam Maccherola
PPTX
WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
PDF
Resume example #6
DOC
Pograma jornadas confluencia.v.f
PDF
Oracle Database Backup Service
PDF
Panda Security - Adaptive Defense 360
PDF
Co je nového v XenDesktop 7.6 a XenApp 7.6
PPTX
Security automation
PPSX
Contrail Demo
PDF
#RDVecom : Felix Averlant, Digital Performance Strategist, altima° North Amer...
PDF
Panda Security - Endpoint Protection
PPTX
Exploración herramientas multimedia
PPTX
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
PPSX
Virtualizace datových center
PDF
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
PPSX
XenDesktop and XenApp - 2015 summary & bit of future
PPTX
SucessfulInsiderThreat
PDF
G2 server - Cloud není vhodný pro každého
PDF
Oracle Database Backup Cloud Service
PDF
Oracle Database Appliance Workshop
Cybersecurity - Sam Maccherola
WebLogic Server auf ODA: Erfahrungen aus einem Kundenprojekt
Resume example #6
Pograma jornadas confluencia.v.f
Oracle Database Backup Service
Panda Security - Adaptive Defense 360
Co je nového v XenDesktop 7.6 a XenApp 7.6
Security automation
Contrail Demo
#RDVecom : Felix Averlant, Digital Performance Strategist, altima° North Amer...
Panda Security - Endpoint Protection
Exploración herramientas multimedia
Citrix Desktop Master Class - XenApp/XD Feature Pack 2
Virtualizace datových center
Next-generation Desktop and App Delivery with XenDesktop 7 and Microsoft Syst...
XenDesktop and XenApp - 2015 summary & bit of future
SucessfulInsiderThreat
G2 server - Cloud není vhodný pro každého
Oracle Database Backup Cloud Service
Oracle Database Appliance Workshop
Ad

Similar to DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging (20)

PPT
Intellinx.z watch
PDF
Cloud Security for Startups - From A to E(xit)
PPTX
Change auditing: Determine who changed what, when and where
PPTX
Securing Your MongoDB Deployment
PDF
iSecurity Data Sheet March 2016
PDF
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
PDF
Monitoring and Reporting on IBM i Compliance and Security
PPTX
Manage engine it360
PDF
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
PPTX
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
PPSX
Shield db data security
PPSX
Shield db data security
PPSX
Shield db data security
PPTX
The user s identities
PDF
Entitlement and Compliance Management: Trends and 2012 Vision
PPTX
Lock it Down: Access Control for IBM i
PDF
2023-09-28 aMS Montpellier CIS 365.pdf
PDF
Log Analytics for Distributed Microservices
PDF
Hitachi ID Identity and Access Management Suite
PDF
Presentation database security audit vault & database firewall
Intellinx.z watch
Cloud Security for Startups - From A to E(xit)
Change auditing: Determine who changed what, when and where
Securing Your MongoDB Deployment
iSecurity Data Sheet March 2016
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Monitoring and Reporting on IBM i Compliance and Security
Manage engine it360
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
Downtime is Not an Option: Integrating IBM Z into ServiceNow and Splunk
Shield db data security
Shield db data security
Shield db data security
The user s identities
Entitlement and Compliance Management: Trends and 2012 Vision
Lock it Down: Access Control for IBM i
2023-09-28 aMS Montpellier CIS 365.pdf
Log Analytics for Distributed Microservices
Hitachi ID Identity and Access Management Suite
Presentation database security audit vault & database firewall

More from Andris Soroka (20)

PPTX
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
PPTX
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
PPT
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
PPTX
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
PPTX
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
PDF
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
PPTX
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
PPTX
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
PPTX
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
PPTX
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
PDF
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
PPTX
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
PPTX
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
PDF
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
PPTX
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
PPTX
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
PDF
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
PPTX
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
PPTX
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
PPTX
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25-Week II
A comparative analysis of optical character recognition models for extracting...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cuic standard and advanced reporting.pdf

DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging

  • 1. BalaBit IT Security The logging company
  • 3. External Challenges: Compliance Pressure to Monitor Users PCI-DSS ISO27002 SOX→ COBIT Chapter 7, 8 A.10.2 Third-party service DS5.5 Implement Strong mngmnt HIPAA, Basel Security monitoring Access Control A.10.10 II, GPG13… DS9.2 Chapter 10 Audit Access to Monitoring user Similar Config.changes Cardholder Data activities requirements! DS11.6 Chapter 12 A.13.2 Securing Data Maintain Mgmt of Security sec.policy for Incidents personnel
  • 4. Internal Challenges: „Superuser” Fraud Source: BalaBit IT professionals survey, 2011
  • 5. How to control? • Identity-management • Logging • Activity monitoring
  • 6. BalaBit IT Security „The syslog-ng company” • 2011 revenue: $10.3 M (35% annual growth) • Number of employees: 120 • Number of customers - global: – commercial customers: 800 – open source users: 850.000 • 12 years experience in IT Security • Global partner network, 80+ partners in 30+ countries • Awarded to Deloitte Technology Fast 500 and Fast 50 Lists (2010)
  • 7. syslog-ng Description • IT environments constantly generate important data in log messages • syslog-ng • Collects • Filters • Classifies • Normalizes • Stores • Transfers • syslog-ng is not a log analysis tool but it is essential to analysis 8
  • 8. Product Family • syslog-ng Open Source Edition • Leader since 1998, de facto standard in 2001 • Large, world-wide community • syslog-ng Premium Edition • Commercial version • Additional features • Professional support • syslog-ng Store Box • Turnkey appliance • Index, search, reporting • Professional support 9
  • 9. syslog-ng Open Source Edition • Key Features • Flexible message filtering and re-writing • Pattern-based classification • Secure log transfer via SSL/TLS • Flow-control – adaptive message rate control • High speed processing > 650k/sec • Community • 100,000s of users worldwide • Well know by system admins • Included in 3rd party devices • Custom add-ons 10
  • 10. syslog-ng Premium Edition • Additional Features • Zero Message Loss • Reliable Log Transfer Protocol (RLTP) • Client side failover • Disk buffer • Encrypted log storage • SQL source and destination support • Windows support • Support for more than 50 server platforms • Professional Support 11
  • 12. Logging is not enough… 1. Several security events are not logged! The User Monitoring „Pyramid” 2. Logs typically do not show what was done. 3. Logs often show only obscure techn. details. Activity Records - security camera System logs - snapshots
  • 13. Key questions to answer… Can you ensure the accountability of your IT staff? Can you monitor the actions of your „superusers”? Can you reliably control your outsourcing partners? Do you really know „who access what” on servers? Can you conduct quick and cheap audits at your company? Can you present bullet-proof evidence in legal proceedings? Are you sure you’d pass audits concerning user monitoring?
  • 14. IT Staff Privileged Activity Monitoring by Shell Control Box Outsourcing partners Managers • Firewall, VDI users • Network devices, • Databases, • Web/file servers, • Citrix server…
  • 15. Privileged Activity Monitoring by BalaBit Shell Control Box Shell Control Box (SCB) is an appliance that controls privileged access to remote systems and records the activities into searchable and re-playable movie-like audit trails.
  • 16. Access Control Security & compliance benefits: • Central access control gateway • Multi-protocol support - SSH, RDP, VNC, Telnet, Citrix, etc. • Sub-channel control (e.g. file transfer) • Access by time policy • 4-eyes authorization • Real-time access monitoring Key Benefit: GRANULAR ACCESS POLICY ENFORCEMENT!
  • 17. Real-time alerting (& blocking) Security & compliance benefits: • Alerts for monitoring tools • Alerts for supervisors Coming in : • Terminates session if risky action • Risky actions are customizable (e.g. failed login, program execution, credit card number…) Key Benefit: IMMIDIATE REACTION ON CRITICAL EVENTS!
  • 18. Audit & Forensics Security & compliance benefits: • Real-time activity monitoring • Tamper-proof, HQ audit trails • Movie-like playback & search • File transfer audit • Independent, transparent audit device Key Benefit: INDEPENDENT TOOL FOR QUICK AUDITS & FORENSICS!
  • 20. Conclusion Benefits for business Faster ROI • Faster and higher quality audits • Lower troubleshooting and forensics costs • Centralized authentication & access control • Complete solution for user monitoring Lower risk • Improved regulatory and industry compliance • Better employee/partner control • Improved accountability of staff • Bullet-proof evidence in legal proceedings • Setting technical and psychological barrier
  • 21. Thank you for your attention! Gábor Paróczi Sales Manager gabor.paroczi@balabit.com 25