Solution Overview Best Regulatory Compliance Solution Best Password Management Solution Mach 2010
Company Overview Founded in 2001 Compliance Driven Security Solutions for…. Shared Account/Service Account Password Management (SAPM*) Remote Vendor Access Developer Access to Production Superuser Privilege Management (SUPM*) Proven Solutions Deployed Across ALL Market Verticals Over 350 installations world-wide including… 4 of top 10 Forbes Ranked Enterprises 3 of top 5 Largest Financial Services Leading enterprises in Manufacturing, Financial, Services, Telecommunications, Pharmaceutical/Chemical, Healthcare and more.. SC Awards 2010 “Best Regulatory Compliance Solution” Finalist Privately Held Profitable w/Organic Growth Headquartered in Delaware R&D Center in Raleigh NC 7x24x365 eDMZ Support Operations World-wide Partnerships * Gartner defined terms & markets
Introducing TPAM Total Privileged Access Management (TPAM) Suite A product Suite designed to solve security and compliance issues associated with privileged users and privileged access Modular design allows flexibility to grow Start with required base modules Add additional modules as needs change
Introducing TPAM TPAM is built on either or Password Auto Repository™ (PAR)  or eGuardPost™ base appliances From either platform you can enable additional modules as needed Buy what you need today Expand if needed in the future
Privileged Password Management Privileged Accounts are typically UBIQUITOUS   Unlike “User” accounts, no individual association Many times have known default passwords Privileged Accounts exist in every system, network device, database, etc. Privileged Accounts have extensive ACCESS and CONTROL Many times full system access and control Configuration and audit controls Regulatory and Compliance AUDIT ISSUES Privileged/Shared/Service/Application account management growing audit area What was acceptable yesterday is NOT accepted today Issues and Challenges
Privileged Password Management Enterprise Requirement Secure  Dual release control Change Controls Enterprise Integration TPAM Suite/PPM Module Extensive built-in security Password encrypted via RSA Bsafe Full Disk encryption via Guardian Edge Embedded hardware firewall Purpose built appliance Dual or more release controls Extensive configurable change control Time based (every X days) Last-use based Force change Extensive integration with Strong authentication solutions Active Directory Ticketing systems
Privileged Password Management Enterprise Requirement Effective workflow Ease of deployment & integration TPAM Suite/PPM Module TPAM Workflow values Web-base client access Role-based Dual authorization controls eMail based notifications Robust small screen support Robust CLI/API Installed & configure in one day Drop-in appliance Client/agentless deployment Tight integration w/AD Import via .csv Full API/CLI Audit, SNMP, Syslog Small screen support example
Privileged Password Management Enterprise Requirement Individual Accountability TPAM Suite/PPM Module Assured via PPM Configuration options to limit password release to one admin at a time. Last-use change control assures unique passwords each release Dual authorization controls PPM delivers individual accountability to shared admin and other accounts
Workflow – Password Request Initiate Password Request Filter & Select Account(s) Enter Date/Time/Duration/Reason Password is needed Optional ticket field.  Can be active (check ticket) or passive. Retrieve Password
Workflow – Small Screen Hyperlink Format Initiate Request * Small screen support configured on a per user basis Filter Request or view most recent Select Password.  Quick Request automatically submits with default reason “Request from mobile device” Enter ticket number (if required) and submit to get password Password  retrieved from handheld.
Application Password Management Embedded/Hard-coded passwords represent an often “hidden” exposure Accounts/passwords known to programmers Back-door accounts Application requirements can vary widely Continuous A2A connectivity Transaction A2A connectivity Issues and Challenges
Application Password Management Enterprise Requirement Replace Embedded Passwords Support “High Demand” transaction type applications TPAM Suite/APM Module Full API/CLI  C/C++ Java .NET Perl PAR Cache Add-on capability Available as Cache appliance or VM Supports central or distributed needs Over 500 requests/second
Privileged Session Management Compliance often drives the need to know WHAT was done during certain privileged or sensitive access – do you need to know exactly what as done by: Remote Vendors? Outsourced service providers? Developers granted access to production systems? Fire-call activities? Users or admins accessing sensitive resources or applications (Financial/Sox servers, HR, etc.) Certain access demands higher audit and control Need to restrict direct resource access Issues and Challenges
Privileged Session Management Enterprise Requirement Fine grain access control Connection controls Session Audit TPAM Solution/PSM Module User control point Limits resource view based on role Full control over connections Dual authorization controls Session time limits Alarm notification session overrun Manual session termination options Unmatched session audit Audit/log all connection requests, approvals FULL session recording with DVR replay
Privileged Session Management Enterprise Requirement Strong Audit TPAM Suite/PSM Module Unmatched session audit Audit/log all connection requests, approvals FULL session recording with DVR replay DVR Style Replay Control Full Session Recording and Replay of ALL activities
Workflow – Session Request  Request a session connection Select from a list of systems  and accounts the specific user has authorization to request connections too. Enter date/time/duration of connection request.  Can request for future date/time to allow advanced approval if under dual authorization control. Once connection approved (or auto approved) simply CONNECT!
Workflow – Session Request User connected and performs required work Session can be configured for interactive or auto-login EVERY action on the target system will be recorded (Keystrokes, mouse, links, etc.) If user session extends beyond requested time, configurable alert notifications of session overrun can be sent Active sessions can be manually terminated by authorized administrators Connection proxy created  to selected System and Account
Workflow – Session Replay Session recordings are kept local or can be automatically archived.  Stored sessions can be searched based on date, system, account, user and/or ticket number Once selected, REPLAY SESSION will retrieve session and replay.
Workflow - Session Replay All session activity is recorded and viewable Via session replay.  Recording are NOT AVI type files – recording size is compressed and VERY manageable. DVR- Style controls allow control of replay of  Recorded sessions.
Privileged Command Management Strong compliance need to restrict Superuser privilege access Need to grant superuser rights without full superuser control Need to restrict what remote vendors or services providers can do Reduction in staff driving a need to “do more with less” Need to delegate certain privileged functions without granting total privileged control Need support across both Unix and Windows platforms Issues and Challenges
Privileged Command Management Enterprise Requirement Superuser Privilege Management (SUPM) Support multi-platform environments TPAM Solution/PCM Module SUPM Values Command level access controls No ability to execute outside of command limit Record all activity  TPAM supports PCM for: Unix Windows Others (coming in future release) Session Restricted to Single Command (this example Computer Management) No other Windows functions available
Workflow – Command Management Commands  are added via the Privileged Command Management Tool.
Workflow – Command Limited Session Same workflow as normal session request. Same workflow as normal session request
Workflow – Command Limited Session Session is to back-end target/account  (Windows A3/e22egp) via PCM, user session is established and user is placed into the specific “command”.  In this example, Computer Management. No access to other target commands, menu’s, etc. is allowed.  The session will only exist within the context of the specific command (eg. Computer Management).  Once the user exits the command, the session is immediately terminated.
TPAM Summary
Deployment Overview
Deployment Options Central deployment of all TPAM management functions Configuration Release controls Change controls Audit Central TPAM Deployment
Deployment Options Business Unit/Geographical control License flexibility – can support central or BU license purchase agreements De-centralized TPAM Management
Deployment Options Central configuration control and audit Distributed (local) password check/change via DPA Only require SSH from PAR to PAR DPA All check/change connectivity (SSH, RDP, etc.) internal to the datacenter/location* Distributed Privileged Password Management
Sample Customers
Sample Customers

More Related Content

PPTX
Sweden dst tpam 2014
PPTX
Dell Password Manager Introduction
PPTX
Dell Password Manager Architecture - Components
PPTX
IAM Password
PPTX
Dell Quest TPAM Privileged Access Control
PDF
Secure Salesforce: CRUD / FLS / Sharing
PDF
Taking a Pragmatic Look at the Salesforce Security Model
PDF
Setting up Security in Your Salesforce Instance
Sweden dst tpam 2014
Dell Password Manager Introduction
Dell Password Manager Architecture - Components
IAM Password
Dell Quest TPAM Privileged Access Control
Secure Salesforce: CRUD / FLS / Sharing
Taking a Pragmatic Look at the Salesforce Security Model
Setting up Security in Your Salesforce Instance

What's hot (20)

PDF
Managing the Role Hierarchy at Enterprise Scale
PDF
Short introduction to SAP security research (sitNL)
DOCX
AM Side details
PPT
Share Point Server Security with Joel Oleson
PPT
Simplify Security And Device Management Final Pres10 23final
PDF
Getting started with Salesforce security
DOCX
Sap security course syllabus
PDF
Identity Manager & AirWatch Cloud Mobile App - Infographic
PPTX
Salesforce Security Best Practices for Every Admin
PPT
Technet System Center Mobile Device Manager Presentation
PPTX
Single sign on - SSO
PPTX
Preparing your enteprise for Hybrid AD Join and Conditional Access
PPT
Role based access control - RBAC
PPTX
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
PPT
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
PDF
Iraje brochure v17 master
PDF
Iraje version 6 presentation
DOC
Chris siteminder
PPT
0828 Windows Server 2008 新安全功能探討
PPTX
Sailpoint Online Training on IAM overview
Managing the Role Hierarchy at Enterprise Scale
Short introduction to SAP security research (sitNL)
AM Side details
Share Point Server Security with Joel Oleson
Simplify Security And Device Management Final Pres10 23final
Getting started with Salesforce security
Sap security course syllabus
Identity Manager & AirWatch Cloud Mobile App - Infographic
Salesforce Security Best Practices for Every Admin
Technet System Center Mobile Device Manager Presentation
Single sign on - SSO
Preparing your enteprise for Hybrid AD Join and Conditional Access
Role based access control - RBAC
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Iraje brochure v17 master
Iraje version 6 presentation
Chris siteminder
0828 Windows Server 2008 新安全功能探討
Sailpoint Online Training on IAM overview
Ad

Similar to e-DMZ Products Overview (20)

PPTX
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
PPT
eFACiLiTY Helpdesk and Knowledge Base System
PPTX
Deploying Microsoft BitLocker
DOC
Amarjeet_Updated_Resume
PPT
ServiceDesk Plus Product Overview
PDF
Mdop session from Microsoft partner boot camp
PPT
How to deploy Windows Mobile to 40,000 users
PPT
Desktop Management: Achieving Unrivaled Performance
PPTX
Implementing security and controls in people soft best practices - may 2017
PPT
Null Meet Ppt
PDF
Privleged Access Management
PPT
On-Demand: Is It Right For Your Company?
PPTX
SCOM Tips and Tricks
PPT
Smart Printing Technical Presentation
PPT
[uengine.org] (kor) uEngine BPM Product Intro
PPTX
Cs Comply And Audit V1.6
PPT
Sap security – thinking with a hacker’s hat
PDF
Environment Manager Policy
PPT
Reduce The Risk Critical To Protect Critical To Monitor
PPTX
2011 Dqn Ameyo Presentation English
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
eFACiLiTY Helpdesk and Knowledge Base System
Deploying Microsoft BitLocker
Amarjeet_Updated_Resume
ServiceDesk Plus Product Overview
Mdop session from Microsoft partner boot camp
How to deploy Windows Mobile to 40,000 users
Desktop Management: Achieving Unrivaled Performance
Implementing security and controls in people soft best practices - may 2017
Null Meet Ppt
Privleged Access Management
On-Demand: Is It Right For Your Company?
SCOM Tips and Tricks
Smart Printing Technical Presentation
[uengine.org] (kor) uEngine BPM Product Intro
Cs Comply And Audit V1.6
Sap security – thinking with a hacker’s hat
Environment Manager Policy
Reduce The Risk Critical To Protect Critical To Monitor
2011 Dqn Ameyo Presentation English
Ad

Recently uploaded (20)

PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Configure Apache Mutual Authentication
PPT
Geologic Time for studying geology for geologist
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
STKI Israel Market Study 2025 version august
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
The various Industrial Revolutions .pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Architecture types and enterprise applications.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
The influence of sentiment analysis in enhancing early warning system model f...
Configure Apache Mutual Authentication
Geologic Time for studying geology for geologist
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Custom Battery Pack Design Considerations for Performance and Safety
Enhancing emotion recognition model for a student engagement use case through...
1 - Historical Antecedents, Social Consideration.pdf
A comparative study of natural language inference in Swahili using monolingua...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
What is a Computer? Input Devices /output devices
Hindi spoken digit analysis for native and non-native speakers
Convolutional neural network based encoder-decoder for efficient real-time ob...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
STKI Israel Market Study 2025 version august
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
The various Industrial Revolutions .pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
Zenith AI: Advanced Artificial Intelligence
Architecture types and enterprise applications.pdf
sbt 2.0: go big (Scala Days 2025 edition)

e-DMZ Products Overview

  • 1. Solution Overview Best Regulatory Compliance Solution Best Password Management Solution Mach 2010
  • 2. Company Overview Founded in 2001 Compliance Driven Security Solutions for…. Shared Account/Service Account Password Management (SAPM*) Remote Vendor Access Developer Access to Production Superuser Privilege Management (SUPM*) Proven Solutions Deployed Across ALL Market Verticals Over 350 installations world-wide including… 4 of top 10 Forbes Ranked Enterprises 3 of top 5 Largest Financial Services Leading enterprises in Manufacturing, Financial, Services, Telecommunications, Pharmaceutical/Chemical, Healthcare and more.. SC Awards 2010 “Best Regulatory Compliance Solution” Finalist Privately Held Profitable w/Organic Growth Headquartered in Delaware R&D Center in Raleigh NC 7x24x365 eDMZ Support Operations World-wide Partnerships * Gartner defined terms & markets
  • 3. Introducing TPAM Total Privileged Access Management (TPAM) Suite A product Suite designed to solve security and compliance issues associated with privileged users and privileged access Modular design allows flexibility to grow Start with required base modules Add additional modules as needs change
  • 4. Introducing TPAM TPAM is built on either or Password Auto Repository™ (PAR) or eGuardPost™ base appliances From either platform you can enable additional modules as needed Buy what you need today Expand if needed in the future
  • 5. Privileged Password Management Privileged Accounts are typically UBIQUITOUS Unlike “User” accounts, no individual association Many times have known default passwords Privileged Accounts exist in every system, network device, database, etc. Privileged Accounts have extensive ACCESS and CONTROL Many times full system access and control Configuration and audit controls Regulatory and Compliance AUDIT ISSUES Privileged/Shared/Service/Application account management growing audit area What was acceptable yesterday is NOT accepted today Issues and Challenges
  • 6. Privileged Password Management Enterprise Requirement Secure Dual release control Change Controls Enterprise Integration TPAM Suite/PPM Module Extensive built-in security Password encrypted via RSA Bsafe Full Disk encryption via Guardian Edge Embedded hardware firewall Purpose built appliance Dual or more release controls Extensive configurable change control Time based (every X days) Last-use based Force change Extensive integration with Strong authentication solutions Active Directory Ticketing systems
  • 7. Privileged Password Management Enterprise Requirement Effective workflow Ease of deployment & integration TPAM Suite/PPM Module TPAM Workflow values Web-base client access Role-based Dual authorization controls eMail based notifications Robust small screen support Robust CLI/API Installed & configure in one day Drop-in appliance Client/agentless deployment Tight integration w/AD Import via .csv Full API/CLI Audit, SNMP, Syslog Small screen support example
  • 8. Privileged Password Management Enterprise Requirement Individual Accountability TPAM Suite/PPM Module Assured via PPM Configuration options to limit password release to one admin at a time. Last-use change control assures unique passwords each release Dual authorization controls PPM delivers individual accountability to shared admin and other accounts
  • 9. Workflow – Password Request Initiate Password Request Filter & Select Account(s) Enter Date/Time/Duration/Reason Password is needed Optional ticket field. Can be active (check ticket) or passive. Retrieve Password
  • 10. Workflow – Small Screen Hyperlink Format Initiate Request * Small screen support configured on a per user basis Filter Request or view most recent Select Password. Quick Request automatically submits with default reason “Request from mobile device” Enter ticket number (if required) and submit to get password Password retrieved from handheld.
  • 11. Application Password Management Embedded/Hard-coded passwords represent an often “hidden” exposure Accounts/passwords known to programmers Back-door accounts Application requirements can vary widely Continuous A2A connectivity Transaction A2A connectivity Issues and Challenges
  • 12. Application Password Management Enterprise Requirement Replace Embedded Passwords Support “High Demand” transaction type applications TPAM Suite/APM Module Full API/CLI C/C++ Java .NET Perl PAR Cache Add-on capability Available as Cache appliance or VM Supports central or distributed needs Over 500 requests/second
  • 13. Privileged Session Management Compliance often drives the need to know WHAT was done during certain privileged or sensitive access – do you need to know exactly what as done by: Remote Vendors? Outsourced service providers? Developers granted access to production systems? Fire-call activities? Users or admins accessing sensitive resources or applications (Financial/Sox servers, HR, etc.) Certain access demands higher audit and control Need to restrict direct resource access Issues and Challenges
  • 14. Privileged Session Management Enterprise Requirement Fine grain access control Connection controls Session Audit TPAM Solution/PSM Module User control point Limits resource view based on role Full control over connections Dual authorization controls Session time limits Alarm notification session overrun Manual session termination options Unmatched session audit Audit/log all connection requests, approvals FULL session recording with DVR replay
  • 15. Privileged Session Management Enterprise Requirement Strong Audit TPAM Suite/PSM Module Unmatched session audit Audit/log all connection requests, approvals FULL session recording with DVR replay DVR Style Replay Control Full Session Recording and Replay of ALL activities
  • 16. Workflow – Session Request Request a session connection Select from a list of systems and accounts the specific user has authorization to request connections too. Enter date/time/duration of connection request. Can request for future date/time to allow advanced approval if under dual authorization control. Once connection approved (or auto approved) simply CONNECT!
  • 17. Workflow – Session Request User connected and performs required work Session can be configured for interactive or auto-login EVERY action on the target system will be recorded (Keystrokes, mouse, links, etc.) If user session extends beyond requested time, configurable alert notifications of session overrun can be sent Active sessions can be manually terminated by authorized administrators Connection proxy created to selected System and Account
  • 18. Workflow – Session Replay Session recordings are kept local or can be automatically archived. Stored sessions can be searched based on date, system, account, user and/or ticket number Once selected, REPLAY SESSION will retrieve session and replay.
  • 19. Workflow - Session Replay All session activity is recorded and viewable Via session replay. Recording are NOT AVI type files – recording size is compressed and VERY manageable. DVR- Style controls allow control of replay of Recorded sessions.
  • 20. Privileged Command Management Strong compliance need to restrict Superuser privilege access Need to grant superuser rights without full superuser control Need to restrict what remote vendors or services providers can do Reduction in staff driving a need to “do more with less” Need to delegate certain privileged functions without granting total privileged control Need support across both Unix and Windows platforms Issues and Challenges
  • 21. Privileged Command Management Enterprise Requirement Superuser Privilege Management (SUPM) Support multi-platform environments TPAM Solution/PCM Module SUPM Values Command level access controls No ability to execute outside of command limit Record all activity TPAM supports PCM for: Unix Windows Others (coming in future release) Session Restricted to Single Command (this example Computer Management) No other Windows functions available
  • 22. Workflow – Command Management Commands are added via the Privileged Command Management Tool.
  • 23. Workflow – Command Limited Session Same workflow as normal session request. Same workflow as normal session request
  • 24. Workflow – Command Limited Session Session is to back-end target/account (Windows A3/e22egp) via PCM, user session is established and user is placed into the specific “command”. In this example, Computer Management. No access to other target commands, menu’s, etc. is allowed. The session will only exist within the context of the specific command (eg. Computer Management). Once the user exits the command, the session is immediately terminated.
  • 27. Deployment Options Central deployment of all TPAM management functions Configuration Release controls Change controls Audit Central TPAM Deployment
  • 28. Deployment Options Business Unit/Geographical control License flexibility – can support central or BU license purchase agreements De-centralized TPAM Management
  • 29. Deployment Options Central configuration control and audit Distributed (local) password check/change via DPA Only require SSH from PAR to PAR DPA All check/change connectivity (SSH, RDP, etc.) internal to the datacenter/location* Distributed Privileged Password Management