balabit - shell control box
TRANSCRIPT
![Page 1: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/1.jpg)
SHELL CONTROL BOXBest-of-breed Privileged User Monitoring
![Page 2: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/2.jpg)
BALABIT
• Log Management syslog-ng
• Privileged User MonitoringShell Control Box
• User Behavior Analytics Blindspotter
Leading Provider of Contextual Security Intelligence
![Page 3: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/3.jpg)
55 %
Internal misuseby
PRIVILEGE ABUSE
60 %
Incidentsby
SYSTEM ADMINS
PRIVILEGED ACCOUNT MISUSE
* Source: Verizon 2015 Data Breach Investigations Report
40 %
Top threat actionsby
STOLEN CREDENTIALS
![Page 4: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/4.jpg)
BALABITSHELL CONTROL BOX
Best-of-breed Solution for Privileged User Monitoring
![Page 5: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/5.jpg)
SHELL CONTROL BOXPrivileged User Activity Monitoring
Controlsprivileged access to remote servers
Preventsmalicious actions
Recordsactivities into movie-like audit trails
Reportsactions for compliance and/or
decision support reasons
![Page 6: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/6.jpg)
TURNKEY, INDEPENDENT AND TRANSPARENT AUDITING
![Page 7: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/7.jpg)
GRANULAR ACCESS CONTROL
![Page 8: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/8.jpg)
15
4-EYES AUTHORIZATION& REAL-TIME MONITORING
![Page 9: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/9.jpg)
REAL-TIME PREVENTION OF MALICIOUS ACTIVITIES
Prevent malicious actions not just record!
![Page 10: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/10.jpg)
FAST IT TROUBLESHOOTING & FORENSICS
![Page 11: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/11.jpg)
MOVIE-LIKE PLAYBACK OF RECORDED SESSIONS
![Page 12: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/12.jpg)
HOST INDEPENDENT REPORTING
REPORTS ON:• Usernames, • Configuration changes, • Most used commands,• Privilege escalations, • Source & destination hosts,• Access channels,• Failed logins,• PCI DSS status, etc.
![Page 13: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/13.jpg)
SEAMLESS ENTERPRISE INTEGRATION
![Page 14: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/14.jpg)
MARKET DRIVERS
COMPLIANCE International standards
Local legislationCompany policy
SECURITY Monitor IT staff
Control outsource & cloud adminsAudit terminal services users
OPERATIONAL EFFICIENCY Fast Troubleshooting & Forensics
Quick audits
1 2 3
![Page 15: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/15.jpg)
KEY QUESTIONS TO ANSWER…
Can you ensure the accountability of your staff?
Can you monitor the actions of your „superusers”?
Can you reliably control your outsourcing partners?
Do you really know „who did what” on your key servers?
Are you sure you’d pass audits concerning user monitoring? 0102030405
![Page 16: Balabit - Shell Control Box](https://reader036.vdocuments.net/reader036/viewer/2022062522/587d54f31a28abee158b56d1/html5/thumbnails/16.jpg)
„Balabit SCB is the only serious product on the market that is capable of securely monitoring
SSH sessionsӯyvind Gielink, IT security
Officer, Telenor
TESTIMONIALS
„ Balabit is the first company in IT business,
which provided a solution in promised
time...”
Michael Fendt, System & Network Engineer, Fiducia IT
„ SCB is a core component of Alfa
Bank’s new Information Security Strategy.“
Andrey Fedotov, Head of IT Security, Alfa Bank