ecsi - the agile it security
DESCRIPTION
We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises.TRANSCRIPT
![Page 1: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/1.jpg)
The Agile IT security
CRIME S
CENE eC
SI OFFIC
ERS ONLY
![Page 2: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/2.jpg)
Everything changed
Mobile
Outsource
Social
Consumerization
Business
IT User
![Page 3: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/3.jpg)
Tomorrow: contextual security
CONTROL
OB
SE
RV
AT
ION
External
Internal
Today: overweight of control
![Page 4: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/4.jpg)
The benefits of contextual security
Bur
eauc
racy
Cos
ts
Sta
ff M
oral
e
IT A
gilit
y
Sec
urity
Source: Gartner
![Page 5: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/5.jpg)
eCSI principles
1 Transparency
2 Accountability
3 Responsibility
4 Proportionality
5 Adaptability
WHAT YOU NEED IS:
Real-time monitoring
![Page 6: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/6.jpg)
How monitoring
complements control?
HIGH-QUALITY
MONITORING
REAL-TIMEREACTION
INTELLIGENTDATA ANALYSIS
![Page 7: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/7.jpg)
Prevention by monitoring
1 2 3 4 5 6 7 8 9
Prevention Forensics
Initial intrusion
Outbound connection
Expand access
Strengthen foothold
Exfiltrate data
Cover tracks
![Page 8: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/8.jpg)
BalaBit eCSI Suite
Syslog-ng Shell Control Box
Blindspotter
• Reliable logging• Wide range of sources• High-performance
• Independent data source• Detailed footage• Control functions
• Social network model• Real-time dashboards• Priority list
• Zoom function• Run-on authentication• Privacy warranty
![Page 9: eCSI - The Agile IT security](https://reader036.vdocuments.net/reader036/viewer/2022070316/5560ca06d8b42a08088b48f5/html5/thumbnails/9.jpg)
END
CRIME S
CENE eC
SI OFFIC
ERS ONLY