0% found this document useful (0 votes)
54 views1 page

Cybersecurity Monitoring Insights

The document discusses use cases for the ObserveIT user monitoring tool across different industries and user groups. Key points include: - ObserveIT is used to monitor privileged users, remote vendors, and general employees across banking, healthcare, telecom, government, retail, and other sectors. - It provides visibility into activities on Windows, Linux, and Citrix servers including privilege escalation, application access, file transfers, and remote sessions. - Users appreciate ObserveIT's ease of use, powerful forensic capabilities, and ability to reduce audit times and assist with investigations. It helps organizations meet compliance requirements for standards like PCI, SOX, and HIPAA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views1 page

Cybersecurity Monitoring Insights

The document discusses use cases for the ObserveIT user monitoring tool across different industries and user groups. Key points include: - ObserveIT is used to monitor privileged users, remote vendors, and general employees across banking, healthcare, telecom, government, retail, and other sectors. - It provides visibility into activities on Windows, Linux, and Citrix servers including privilege escalation, application access, file transfers, and remote sessions. - Users appreciate ObserveIT's ease of use, powerful forensic capabilities, and ability to reduce audit times and assist with investigations. It helps organizations meet compliance requirements for standards like PCI, SOX, and HIPAA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Privileged User

Third Party Vendor


Business User

Banking / Finance Healthcare / Insurance Telecommunications


ObserveIT User Group: Cyber Security Division ObserveIT User Group: Information Security ObserveIT User Group: Enterprise Architecture
- Monitors 1,600 privileged users who access databases and extract sensitive data - Monitored over 2000 employees and 25 critical applications - Monitoring Unix/Linux sessions specifically mapped to PCI compliance
- Monitors remote vendor activity to verify they stick to service level agreements - Tracked changes to insurance claims and data movement to external drives - Focused on activities including escalating privileges and new user creation
- "The best forensic tool for Citrix VDI sessions" - Built automated reports to track any offshore vendor activity on critical servers - No other platform shows scripts and processes that are triggered by Linux sessions

ObserveIT User Group: Technical Support ObserveIT User Group: Information Security ObserveIT User Group: Infrastructure
- Monitors over 100 shared user accounts during Unix / Linux sessions - PHI protection/monitoring critical business applications (PeopleSoft etc.) - Currently deploying to track all HTC contractor access and sessions
- Investigates suspicious behavior such as running SUDO (super user) commands - Focused on applications that don't have own logging capability due to visibility gap - Access is restricted to Citrix terminal servers where all activity is monitored
- "We provide forensic visibility w/in Linux that’s unlike any other tool" - "We love the ability to maintain user privacy in apps like BoA and Gmail" - Needed proof of monitoring capabilities from Canadian government mandate

ObserveIT User Group: Infrastructure ObserveIT User Group: Information Security ObserveIT User Group: Network Infrastructure
- Troubleshooting when issues occur during third party access - Capturing all outside vendor actions when interacting with PHI data - Mandatory company policy to monitor all third party activity on VDI sessions
- Use us to avoid any "finger pointing" from 20+ vendors and contractors - Vendors have constant access to over 100 servers - Track specific vendor file access, configuration changes that are made
- "One click investigations make this incredibly easy" - They were using Symantec DLP but nothing gave them visibility like ObserveIT - Love the ability to search for specific users and date / time stamps

ObserveIT User Group: Information Security ObserveIT User Group: Enterprise Computing Services ObserveIT User Group: Information Security
- 70 outside contractors only use desktops with OIT installed - Monitoring Siemens remote vendors and privileged user activity on critical servers - Monitoring remote vendor sessions within secure environments hosted by Citrix
- Have caught several contractors lying about total hours worked - Set up alerts and report for when servers or applications go down - Smart Auditor was not a robust enough platform to handle security requirements
- Created reports whenever privileged users try to stop key services running on servers - Smart Auditor also very clunky, not well supported by Citrix. Just an add on feature

ObserveIT User Group: Information Security ObserveIT User Group: Information Security ObserveIT User Group: Network Infrastructure
- Monitors 200 IT users who can access or modify any critical banking application -Need to monitor any access to PCI data, specifically vendors that are making config changes - Their clients have mandate to record any interactions with their data
- Used to comply with FDIC audits and reduces audit times by 5x - Most concerned around investigating fraud incidents - Uses ObserveIT metadata reports and screen captures to verify data integrity
- "The fact that we can audit activity within any application is incredible" - No other product could provide this visibility on Linux / Unix servers - "ObserveIT helps us acquire new client relations due to these safeguards."

Other (Government / Technology / Casino) Retail / Media


ObserveIT User Group: Information Technology ObserveIT User Group: Infrastructure
- Monitoring server activity such as restarting servers, escalating privileges - Monitoring 400 Citrix TS servers for privileged user activity. User sessions fed into Splunk
- Previous internal audits showed gaps in monitoring cloud-based application activity - Use ObserveIT to identify root cause when apps get shut down, malware is downloaded
- ObserveIT helps fulfill key audit requirements for SOX, PCI and SSAE - "It's the best tool to gain visibility & run a fast investigation, especially for Citrix XenApp"

ObserveIT User Group: Information Technology ObserveIT User Group: Compliance and Security
- Monitoring contractors on Windows Servers & Linux/Unix - Specifically monitoring database access, change control for SOX compliance
- They had an incident on a server that wasn't covered making investigation painful - Specific high risk actions include privilege escalation, new user creation, system tampering
- "The ability of the tool to show exactly vendors are doing is unparalleled." - Also concerned with shared account hopping and large file copy events

ObserveIT User Group: Information Technology ObserveIT User Group: Information Services
- Requirement to monitoring all employees that have access to PII in hosted apps - Auditing access to HR files, folders and applications hosting PII data
- Need to know where PII data is moving via print jobs, USB access and downloads - Real time alerts set on out of policy behavior (USB activity, large copy/paste)
- "Ease of use is huge benefit. Only takes one "non-technical" person to run ObserveIT" - Highest priority target is authorized users snooping and sharing client information

ObserveIT User Group: Information Security ObserveIT User Group: Information Technology
- Court system requires monitoring of all government employees and officials - Monitoring 1,800 business user VDI sessions through Citrix
- Discovered priv users harvesting passwords, pirating movies, creating backdoor access - Had incidents with data fraud in the past with no way to investigate what was occurring
- "The best tool for full visibility and quick investigations." - OIT forensic capability works exactly as intended - ensures nothing suspicious is happening

ObserveIT User Group: Infrastructure ObserveIT User Group: Information Security


- Gaming Commission requires remote vendor keystroke logging - Monitoring business users that have access to critical apps that relate to process support
- Specific date to be collected includes access date, time, server name, support case ID - Most concerned around users that access IP and customer information
- "OIT has helped reduce time and stress from the monthly audits." - Target specific users with poor performance reviews, 2 weeks notice, & pending layoffs.

You might also like