SlideShare a Scribd company logo
Enterprise Password Assessment Solution
The Future of Password
Security is Here
60 % or more of passwords used in companies
do not satisfy minimum security requirements.
The number one risk of any IT security architecture, no
matter how thorough and extensive, remains the hu-
man factor – mainly the way users interact with the IT
environment through the use of passwords. A number of
effective measures can be taken to secure an IT security
Universal Password Assessment
Password Strength
infrastructure, for example antivirus programs, firewalls or
the implementation of encryption. Weak passwords in the
authentication process still pose an unpredictably high
risk. And this is what attackers will target.
EPAS – Enterprise Password Assessment Solution
EPAS analyses the objective strength of passwords in
selected target systems. Weak passwords are vulnerable to
malicious cyber-attacks. EPAS is able to assess unsalted,
Password policies commonly enforce length and compo-
sition requirements. Their effectiveness against current
password recovery attacks has been proven to be very low.
Attackers use many different methods in the attempt to
compromise a password, the most common being the dicti-
onary attack. Millions of words - from dictionaries,
literature and passwords from internet password leaks –
statically salted, as well as dynamically salted passwords.
It is customized for system specific encryption and evalua-
tes personal, as well as technical and system accounts.
are used to create millions of password hashes. These has-
hes are then compared to those saved on a company ser-
ver. A policy does not restrict the use of dictionary words
and known derivations, i.e. substituting the @-symbol
for an “a”. The true strength of a password – its resilience
against attacks – can best be evaluated using structural
entropy.
EPAS generates audit reports for each audit job. An
executive summary provides full text and graphical data
to visualize and explain the passwords’ overall quality. In-
EPAS was developed based on more than 15 years of
IT-security auditing. The extensive experience of manual
penetration tests sustainably shows that, without resilient
Detailed and Legally Compliant Reporting
cluded are recovery reasons, structure, compliance status
and various other statistical data. Passwords are never
displayed in clear text.
passwords, all security measures are bound to fail. EPAS
is unique and the only solution to offer a legally compliant
view of your enterprise password landscape.
Built on 15 Years IT-Security Experience
EPAS is a solution developed by Detack GmbH and its
Swiss partner Praetors AG. It is an on-premises SaaS solu-
tion for enterprise wide, automatic and regular password
quality assessment and enforcement for a wide range
of systems. EPAS addresses the overwhelming issue of
maintaining secure passwords in large, heterogeneous
environments containing Microsoft A/D, IBM System z,
SAP and more. EPAS uses a self-developed, patent pen-
ding technology designed for enterprises, to extract all
relevant password data from a target system, and uses
these to assess the resilience of passwords against atta-
cks. EPAS employs only legitimate cipher text extraction
methods and therefore creates no system stability risk for
the target.
Customizable Password Assessment
EPAS audits the recovered passwords against two criteria: a customized password policy
and an objective, entropy-based set of rule. EPAS can simulate various attack methods used
by cyber criminals, such as dictionary or brute force attacks. Dictionaries are customizable
regarding language and customer specific vocabulary or terms.
Password Re-Use Report
Recovered passwords are checked for multiple use. A password can either be used
several times by the same user on different systems or one password can be used by
several users. Both situations pose a high security risk and are subject to immediate
risk mitigation measurements.
Designed for Enterprises
EPAS has been designed to meet the needs of modern enterprises. More than 30 different
systems and databases, ranging from IBM, SAP, Oracle to Microsoft, are supported. Le-
gally compliant reporting offers all security relevant password data whilst respecting the
protection of personal data and satisfying workers councils´ requirements.
Trusted Computing and Encryption
All data EPAS processes is permanently encrypted. Trusted Computing is used to seal the
platform, an additional TPM chip secures software and data integrity by employing cryp-
tographic methods. EPAS applies various hardware and software monitoring elements to
detect physical or software intrusion attempts. Security failsafe mechanisms log events
and shut down in case of intrusion attempts.
Technical and System Accounts
In addition to “heartbeat” users, all technical and system accounts are assessed and
evaluated by EPAS. These accounts authenticate by using either very simple passwords,
default vendor passwords, or no password at all. Yet these accounts usually have the hig-
hest privileges and are sometimes even exempt from a password policy. The authentication
of technical and system accounts to other systems is one of the largest IT security risks.
Notification by E-Mail
Automatic notification is used to prompt users to change their passwords if these are
too weak or do otherwise not comply with defined audit parameters. The same feature
automatically notifies the service administrator of a completed password audit job and
the availability of a report.
Audit Jobs & Job Queuing
An intelligent job and queuing system permits programmable, regular password auditing
with no job collisions. EPAS is highly scalable. It can process simultaneous parallel tasks and
can audit millions of accounts on different systems over a single weekend.
Detack		
www.epas.de	
Seamus.hoole@detack.uk

More Related Content

PPTX
Detack1de
DOCX
Surelog Intelligence
PDF
Security Testing for Test Professionals
PDF
8 Reasons to Choose Logrhythm
DOCX
Why taxonomy is critical
PPT
Lecture 1
PDF
Need of SIEM when You have SOAR
PPT
Survey Presentation About Application Security
Detack1de
Surelog Intelligence
Security Testing for Test Professionals
8 Reasons to Choose Logrhythm
Why taxonomy is critical
Lecture 1
Need of SIEM when You have SOAR
Survey Presentation About Application Security

What's hot (20)

PPTX
How To Select Security Orchestration Vendor
PPTX
What is security testing and why it is so important?
PPT
Security Properties
PPTX
Security operation center (SOC)
PPTX
Protecting Windows Networks From Malware
PPTX
SIEM 101: Get a Clue About IT Security Analysis
PDF
Pangolin whitepaper
PDF
PwnSchool: Exploiting Web APIs
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
Application security
PPTX
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
PPTX
PDF
Open Source IDS Tools: A Beginner's Guide
PDF
Infragard 2004 - Web Attacks and Defenses
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
Building a Next-Generation Security Operations Center (SOC)
PPT
Database Security
PPT
Ch08 Microsoft Operating System Vulnerabilities
DOC
Final Project1
PPTX
Beginner's Guide to SIEM
How To Select Security Orchestration Vendor
What is security testing and why it is so important?
Security Properties
Security operation center (SOC)
Protecting Windows Networks From Malware
SIEM 101: Get a Clue About IT Security Analysis
Pangolin whitepaper
PwnSchool: Exploiting Web APIs
Improve Threat Detection with OSSEC and AlienVault USM
Application security
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
Open Source IDS Tools: A Beginner's Guide
Infragard 2004 - Web Attacks and Defenses
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Building a Next-Generation Security Operations Center (SOC)
Database Security
Ch08 Microsoft Operating System Vulnerabilities
Final Project1
Beginner's Guide to SIEM
Ad

Similar to Epas - Enterprise Password Assessment Solution (20)

PPT
Business Dimension of Expanded Password System
PDF
Security Breaches from Compromised User Logins
PDF
Linux Security best Practices with Fedora
PDF
Privileged identity management
 
DOCX
Running head Assignment 1 Identifying Potential Malicious Attack.docx
PDF
Gartner Security & Risk Management Summit 2018
PDF
Network Security_4th Module_Dr. Shivashankar
PDF
BAIT1103 Chapter 7
PDF
Cyber security
PPTX
Cyber Security # Lec 5
DOCX
1. Security and vulnerability assessment analysis tool - Microsoft.docx
PDF
IS Decisions Company Overview. Solutions to secure your Windows Network.
PPT
Windows network security
PDF
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
PDF
What is Two Factor Authentication
PDF
Ch11 NetSec5e_Intruders and intruderssss
PDF
Ce hv6 module 55 preventing data loss
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
PPT
Dr. Alan Shark
PPT
OPERATING SYSTEM
Business Dimension of Expanded Password System
Security Breaches from Compromised User Logins
Linux Security best Practices with Fedora
Privileged identity management
 
Running head Assignment 1 Identifying Potential Malicious Attack.docx
Gartner Security & Risk Management Summit 2018
Network Security_4th Module_Dr. Shivashankar
BAIT1103 Chapter 7
Cyber security
Cyber Security # Lec 5
1. Security and vulnerability assessment analysis tool - Microsoft.docx
IS Decisions Company Overview. Solutions to secure your Windows Network.
Windows network security
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
What is Two Factor Authentication
Ch11 NetSec5e_Intruders and intruderssss
Ce hv6 module 55 preventing data loss
Crush Common Cybersecurity Threats with Privilege Access Management
Dr. Alan Shark
OPERATING SYSTEM
Ad

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative analysis of optical character recognition models for extracting...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The AUB Centre for AI in Media Proposal.docx
sap open course for s4hana steps from ECC to s4
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Epas - Enterprise Password Assessment Solution

  • 1. Enterprise Password Assessment Solution The Future of Password Security is Here
  • 2. 60 % or more of passwords used in companies do not satisfy minimum security requirements. The number one risk of any IT security architecture, no matter how thorough and extensive, remains the hu- man factor – mainly the way users interact with the IT environment through the use of passwords. A number of effective measures can be taken to secure an IT security Universal Password Assessment Password Strength infrastructure, for example antivirus programs, firewalls or the implementation of encryption. Weak passwords in the authentication process still pose an unpredictably high risk. And this is what attackers will target. EPAS – Enterprise Password Assessment Solution EPAS analyses the objective strength of passwords in selected target systems. Weak passwords are vulnerable to malicious cyber-attacks. EPAS is able to assess unsalted, Password policies commonly enforce length and compo- sition requirements. Their effectiveness against current password recovery attacks has been proven to be very low. Attackers use many different methods in the attempt to compromise a password, the most common being the dicti- onary attack. Millions of words - from dictionaries, literature and passwords from internet password leaks – statically salted, as well as dynamically salted passwords. It is customized for system specific encryption and evalua- tes personal, as well as technical and system accounts. are used to create millions of password hashes. These has- hes are then compared to those saved on a company ser- ver. A policy does not restrict the use of dictionary words and known derivations, i.e. substituting the @-symbol for an “a”. The true strength of a password – its resilience against attacks – can best be evaluated using structural entropy. EPAS generates audit reports for each audit job. An executive summary provides full text and graphical data to visualize and explain the passwords’ overall quality. In- EPAS was developed based on more than 15 years of IT-security auditing. The extensive experience of manual penetration tests sustainably shows that, without resilient Detailed and Legally Compliant Reporting cluded are recovery reasons, structure, compliance status and various other statistical data. Passwords are never displayed in clear text. passwords, all security measures are bound to fail. EPAS is unique and the only solution to offer a legally compliant view of your enterprise password landscape. Built on 15 Years IT-Security Experience EPAS is a solution developed by Detack GmbH and its Swiss partner Praetors AG. It is an on-premises SaaS solu- tion for enterprise wide, automatic and regular password quality assessment and enforcement for a wide range of systems. EPAS addresses the overwhelming issue of maintaining secure passwords in large, heterogeneous environments containing Microsoft A/D, IBM System z, SAP and more. EPAS uses a self-developed, patent pen- ding technology designed for enterprises, to extract all relevant password data from a target system, and uses these to assess the resilience of passwords against atta- cks. EPAS employs only legitimate cipher text extraction methods and therefore creates no system stability risk for the target.
  • 3. Customizable Password Assessment EPAS audits the recovered passwords against two criteria: a customized password policy and an objective, entropy-based set of rule. EPAS can simulate various attack methods used by cyber criminals, such as dictionary or brute force attacks. Dictionaries are customizable regarding language and customer specific vocabulary or terms. Password Re-Use Report Recovered passwords are checked for multiple use. A password can either be used several times by the same user on different systems or one password can be used by several users. Both situations pose a high security risk and are subject to immediate risk mitigation measurements. Designed for Enterprises EPAS has been designed to meet the needs of modern enterprises. More than 30 different systems and databases, ranging from IBM, SAP, Oracle to Microsoft, are supported. Le- gally compliant reporting offers all security relevant password data whilst respecting the protection of personal data and satisfying workers councils´ requirements. Trusted Computing and Encryption All data EPAS processes is permanently encrypted. Trusted Computing is used to seal the platform, an additional TPM chip secures software and data integrity by employing cryp- tographic methods. EPAS applies various hardware and software monitoring elements to detect physical or software intrusion attempts. Security failsafe mechanisms log events and shut down in case of intrusion attempts. Technical and System Accounts In addition to “heartbeat” users, all technical and system accounts are assessed and evaluated by EPAS. These accounts authenticate by using either very simple passwords, default vendor passwords, or no password at all. Yet these accounts usually have the hig- hest privileges and are sometimes even exempt from a password policy. The authentication of technical and system accounts to other systems is one of the largest IT security risks. Notification by E-Mail Automatic notification is used to prompt users to change their passwords if these are too weak or do otherwise not comply with defined audit parameters. The same feature automatically notifies the service administrator of a completed password audit job and the availability of a report. Audit Jobs & Job Queuing An intelligent job and queuing system permits programmable, regular password auditing with no job collisions. EPAS is highly scalable. It can process simultaneous parallel tasks and can audit millions of accounts on different systems over a single weekend.