Bomgar Discovery Report

Similar documents
Understand & Prepare for EU GDPR Requirements

All the resources you need to get buy-in from your team and advocate for the tools you need.

Secure Access & SWIFT Customer Security Controls Framework

HIPAA Regulatory Compliance

Top 5 Reasons. The Business Case for Bomgar Remote Support

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Automating the Top 20 CIS Critical Security Controls

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Skybox Product Tour. Installation and Starting Your Product Tour Tour Login Credentials: User Name: skyboxview Password: skyboxview

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Best Practices in Securing a Multicloud World

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

AKAMAI CLOUD SECURITY SOLUTIONS

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Security Provider Integration SAML Single Sign-On

CyberArk Privileged Threat Analytics

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

Bomgar Privileged Access Smart Cards

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

ForeScout ControlFabric TM Architecture

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Office 365 Buyers Guide: Best Practices for Securing Office 365

The Evolution of Data Center Security, Risk and Compliance

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

RSA NetWitness Suite Respond in Minutes, Not Months

Attackers Process. Compromise the Root of the Domain Network: Active Directory

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

THE ACCENTURE CYBER DEFENSE SOLUTION

Security Provider Integration Kerberos Server

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

STEVE GOODING JUNE 15, 2018

Security Provider Integration SAML Single Sign-On

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

Bomgar Connect ios Rep Console 2.2.7

Managing Microsoft 365 Identity and Access

CA Security Management

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Security in Bomgar Remote Support

Bomgar SIEM Tool Plugin Installation and Administration

Security Provider Integration RADIUS Server

CS 356 Operating System Security. Fall 2013

the SWIFT Customer Security

CloudSOC and Security.cloud for Microsoft Office 365

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Bomgar Connect Android Rep Console 2.2.6

SIEMLESS THREAT DETECTION FOR AWS

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

FFIEC Cybersecurity Assessment Tool

ADDRESSING TODAY S VULNERABILITIES

Tripwire State of Cyber Hygiene Report

TRUE SECURITY-AS-A-SERVICE

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

IT Services IT LOGGING POLICY

Critical Hygiene for Preventing Major Breaches

The Business Case for Network Segmentation

Oracle Database Security Assessment Tool

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

Defense in Depth. Constructing Your Walls for Your Enterprise. Mike D Arezzo Director of Security April 21, 2016

Teradata and Protegrity High-Value Protection for High-Value Data

2015 VORMETRIC INSIDER THREAT REPORT

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

align security instill confidence

Transforming Security from Defense in Depth to Comprehensive Security Assurance

The Artificial Intelligence Revolution in Cybersecurity

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Cloud Security Myths Paul Mazzucco, Chief Security Officer

Symantec Security Monitoring Services

Two-Factor Authentication Guide Bomgar Remote Support

Smart Cards for Remote Authentication 3. Prerequisites 3. Install the Smart Card Driver 4

SYMANTEC DATA CENTER SECURITY

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

How CyberArk can help mitigate security vulnerabilities in Industrial Control Systems

National State Auditors Association Vulnerability Management: An Audit Primer September 20, 2018

RSA INCIDENT RESPONSE SERVICES

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

SIEMLESS THREAT MANAGEMENT

Secure access to your enterprise. Enforce risk-based conditional access in real time

ABB Ability Cyber Security Services Protection against cyber threats takes ability

Information Security Controls Policy

DIGITAL TRUST Making digital work by making digital secure

RED IM Integration with Bomgar Privileged Access

PROTECT AND AUDIT SENSITIVE DATA

Next Generation Privilege Identity Management

Bomgar PA Integration with ServiceNow

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

LEAST PRIVILEGE ADOPTION VIA

Transcription:

BOMGAR DISCOVERY REPORT Bomgar Discovery Report This report is designed to give you important information about the privileged credentials regularly being used to access endpoints and systems on your network, including: AD Domain Local Windows Service The first step in addressing security risks from privileged users such as insiders and third parties is a high level assessment of the privileged accounts on your network. The Bomgar Discovery Report provides key information on the scope of these privileged accounts, including not just the number of credentials but also password age. Why This Data Is Important The vast majority of data breaches today involve compromised or stolen credentials. Both hackers and malicious insiders regularly use legitimate privileged credentials to initiate breaches and move undetected in IT networks for weeks or months, quickly elevating access levels across systems to then exfiltrate data or spread malware. The risk related to the inappropriate or dangerous use of privileged credentials cannot be adequately addressed without understanding their scope in your network. How To Use This Report The data in this report is available for your organization to utilize in the effort to protect your organization from cyber threats. The Bomgar team is available as a resource when you are ready to take these actions: Ask questions about the data in this report Run a more in-depth discovery exercise utilizing automated, continuous discovery available with Bomgar Privileged Identity that protects privileged credentials at scale Evaluate Bomgar Privileged Identity as a solution to simplify the management of privileged credentials and reduce cyber breach risk Learn more about how Bomgar Privileged Identity empowers you to proactively defend your organization from the ongoing threats of compromised privileged credentials. View a Demo: bomgar.com/privileged-identity/demo

Service Account Analysis This data represents the total number of Service found during the Discovery process. A service account is a special account type that belongs to an application or service, instead of to an individual end user. SERVICE ACCOUNTS SUMMARY PASSWORD AGE NON-EXPIRING SERVICE ACCOUNTS 6 Service 90+ Days Service < 0 Days 2 TOP SERVICE ACCOUNTS BY NUMBER OF DEPENDENT APPLICATIONS Hernandez LaurenceRhodes ShawnRiley BillMorgan Robin Service accounts present a unique security and usability threat, especially if the service accounts require privileged login credentials and have multiple dependencies across various systems and locations. Non-expiring service accounts increase the potential risk of attacks from threat actors. Bringing these accounts under management secures the credentials while managing the complexity of dependencies.

Active Directory Account Analysis This data represents the total number of Active Directory accounts found during the Discovery process. These accounts are separated based on their status as an admin or non-admin account as well as whether they are set to expire or not expire based on their password policy. ACTIVE DIRECTORY ACCOUNT SUMMARY PASSWORD AGE NON-EXPIRING ACTIVE DIRECTORY ACCOUNTS 56 448 42 604 AD 2 27 0-90 Days 90+ Days 56 AD < 0 Days 52 HIGH RISK AD ACCOUNTS ACCOUNT NAME PASSWORD AGE (IF NON-EXPIRING) # SERVICES CONTROLLED BY THIS ACCOUNT. Hernandez -- 5 2. Tammy 288 4. BillMorgan 57 8 4. HeatherSimmons 78 4 5. KevinPrice -- 5 Non-expiring accounts are a security risk as they can be compromised and utilized by malicious actors who can then use the credentials in perpetuity, especially for admin accounts. If these privileged accounts with elevated credentials are compromised, they can be used very quickly to move laterally across your network and pivot into other areas of your network. In just a matter of hours, hackers can use them to initiate a breach and introduce malware or exfiltrate sensitive data.

Local Account Analysis This data represents the total number of Local found during the Discovery process. Local user accounts are stored locally on the server, and are assigned rights and permissions on a particular server only. LOCAL ACCOUNT SUMMARY PASSWORD AGE NON-EXPIRING LOCAL ACCOUNTS 90+ Days 0 2 22 Local 7 0 Local < 0 Days 9 Non-expiring passwords on Local can present a serious threat to an organization by providing a threat actor with the means necessary to compromise an organization s network, yet they are often overlooked and hard to report on in aggregate across the enterprise. As organizations are faced with a continuously changing environment of local accounts as new servers are added, bringing these local accounts under management proactively protects them.

Scan Summary SERVICE ACCOUNTS SCAN SUMMARY Service 6 Total Services 5 IIS App Pools 6 DCOM Components 6 COM+ Applications 2 Scheduled Tasks 0 Windows Services with Passwords with password age less than 0 days 2 with password age 0-90 days 0 with password age 90+ days ACTIVE DIRECTORY ACCOUNTS SCAN SUMMARY AD 604 Computers 9 with Passwords 56 60 with Passwords with password age less than 0 days 52 with password age 0-90 days with password age 90+ days LOCAL ACCOUNTS SCAN SUMMARY Local Computers Scanned 4 with Passwords 0 4 with Passwords with password age less than 0 days 9 with password age 0-90 days 0 with password age 90+ days Failure to frequently change privileged account credentials can put your network at risk for attacks from insiders and external threats. Furthermore, privileged account passwords that remain unchanged for longer than 60 days can result in compliance failures for standards such as PCI, HIPAA, GDPR, and others.

Scan Exceptions COMPUTER somecomputer somecomputer2 somecomputer2 MESSAGE Unable to discovery COM+ accounts on somecomputer. Please ensure that the server can accept service control messages or some other technical sounding firewall related thing that you might have to do to make this process work in the expected manner. Unable to discovery COM+ accounts on somecomputer. Please ensure that the server can accept service control messages or some other technical sounding firewall related thing that you might have to do to make this process work in the expected manner. Nothing really happended, this is a test fatal message.

BOMGAR DISCOVERY REPORT Mitigating The Risk of Privileged Credentials Controlling and effectively managing privileged credentials, such as the ones covered in this report, is a primary security priority for a companies across industries and geographies. Not only does a credential management solution protect your most sensitive and critical privileged accounts from hackers, it is often a requirement to meet a variety of industry compliance mandates such as PCI, HIPAA, NERC, or GDPR. When evaluating credential management solutions for your organization, key considersations include: SERVICE ACCOUNTS How are service account credentials managed within the solution? Can service account passwords be rotated automatically without disrupting their dependent applications or dependencies? AUTOMATION Does the tool continuously discover credentials? Automated discovery prevents credentials from falling through the cracks as your network changes on a daily basis. SPEED AND SCALE How many credentials can reasonably be stored? How fast are passwords rotated? Most organizations have hundreds or thousands of privileged accounts, and the time it takes to continuously rotate is important. Contact Bomgar today to learn more about how Bomgar Privileged Identity empowers you to proactively defend your organization from the ongoing threats of compromised privileged credentials. view a demo: bomgar.com/privileged-identity/demo ABOUT BOMGAR Bomgar is the leader in Secure Access solutions that empower businesses. Bomgar s leading remote support, privileged access management, and identity management solutions help support and security professionals improve productivity and security by enabling secure, controlled connections to any system or device, anywhere in the world. More than,000 organizations across 80 countries use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar is privately held with offices in Atlanta, Jackson, Washington D.C., Frankfurt, London, Paris, and Singapore. Connect with Bomgar at www.bomgar.com. CONTACT I INFO@BOMGAR.COM I 866-205-650 (U.S.) I +44 (0)628-480-20 (U.K./EMEA) I BOMGAR.COM 208 BOMGAR CORPORATION. ALL RIGHTS RESERVED WORLDWIDE. BOMGAR AND THE BOMGAR LOGO ARE TRADEMARKS OF BOMGAR CORPORATION; OTHER TRADEMARKS SHOWN ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS.