Netwrix Portfolio
Netwrix Portfolio
Netwrix portfolio
Contacts:
[email protected]
Housekeeping
Agenda
▪ About Company
▪ Netwrix vision
▪ Netwrix solutions and products
▪ In depth PAM; AD Security; DAG; FIM,PolicyPak
▪ Q and A
4
Customer base: More than 11,500 customers ▪ Healthcare & pharma ▪ Strongpoint (February 2021)
IDENTITY
End-to-end solutions
Netwrix Solutions
Data Access Privileged Access Active Directory Ransomware Compliance
Governance Management Security Protection
Reduce the Minimize your Secure even the Mitigate the risk of Prove compliance
likelihood of a data privileged access most complex ransomware and with hard evidence
breach by making risks and take Active Directory limit its potential and slash time
access to data admin activity and Azure AD from impact on data and spent on audits and
exclusive. under control. end to end. operations. preparation.
Unstructured Data Structured Data Directory Cloud Servers Workstations Devices Applications
7 CONFIDENTIAL
Data Access
Governance
Privileged Ransomware
Access protection
Management
Minimize your Mitigate the risk of
privileged access risks ransomware and limit
and take admin its potential impact on
activity under control. data and operations.
Unstructured Data Structured Data Directory Cloud Servers Workstations Devices Applications
8 CONFIDENTIAL
Netwrix Auditor
StealthAudit /Defend
Netwrix Data
Classification Netwrix Auditor
Netwrix Auditor
Data Classification
StealthAudit
StealthAudit / Defend /
Defend/Intercept/ Search, content search,
Data security, process, StealthRecover
Recover enterprise search,
cycle, automatically PolicyPak, eDiscovery
reduce exposure Password Policy ChangeTracker
Enforcer
PasswordPolicy
ChangeTracker
Enforcer
Netwrix Auditor
SBPam StealthRecover
PolicyPak PolicyPak
Malware, ransomware,
Minimize Risk, Adopt ChangeTracker scanning threats, threat
Zero standing reporting
Privilege
Varonis
Spirion
Sailpoint
Lepide
Quest Varonis
Search, content search,
Data security, process,
ManageEngine Sailpoint enterprise search,
cycle, automatically eDiscovery
reduce exposure
Lepide Nuix
Cyberark
Any Vendor,
Delinea Quest
Beyondtrust Malware, ransomware,
Minimize Risk, Adopt scanning threats, threat
Zero standing reporting
Privilege
Outcomes: Products:
SMB Enterprise
Outcomes: Products:
SMB Enterprise
Outcomes: Products:
SMB Enterprise
Compliance Solutions
Outcomes: Products:
SMB Enterprise
Outcomes: Products:
SMB Enterprise
Competition
Netwrix removes the complexities around Installation, day to day management and scalability
Summary
▪ 3rd generation PAM solution
Qualifying Questions
• Do you know where your Privilege accounts are
• How many domain admin users do you have?
• How many users are local administrators on Servers?
• How many privilege accounts do you have?
• how do you monitor privilege activity, internally for users and Vendors?
• How do you manage occasional Privilege elevation for users?
• How do you manage all privilege credentials?
• How do you manager privilege accounts used for Windows Services and scheduled tasks?
• How do you audit all privilege activity?
• How do you control access to external entities?
• How do you limit the scope of existing admins to reduce risk?
• How do you remediate and enforce membership of Local privilege groups?
• How do you baseline privilege accounts on systems?
• how do you control & record access to Web page privilege such as Azure AD, & non IT admin sites such as HR and Sales Ops?
• Cost
• How much do you currently spend both in time and cost on Privileged Access Management solutions
• What if we can reduce that Cost both financially – Simple licensing & time Remove complexity
• Provide fast return on Investment
• Compliance
• Do you have to adhere to any compliance regulations? How will you prove that privileged access in your organization is under control?
• How do you prove to auditors what and where your privilege accounts are?
27 CONFIDENTIAL
• Keywords: Privilege Access, Compliance, Domain Admins, Computer Admins, Privilege Abuse & Misuse, Zero Trust, Zero Standing
Privilege, Reduce Standing Privilege, Just-in-Time Provisioning, Proxy, Session recording, Ephemeral Access
• Services: Partners can shadow for free and complete the partner accreditation on LMS to be able to provide services
28 CONFIDENTIAL
The move to the cloud has exacerbated, not simplified, the security
challenge.
Most AD security solutions leave gaps that adversaries love.
Understand what exists Clean up stale accounts Detect suspicious Contain threats fast Roll back unwanted
in your AD, how AD is and empty groups. behavior and with automated AD changes and
configured, and who advanced threats in responses. recover entire AD
Enforce strong
has access to what. passwords. real time. domains.
Simplify incident
Identify risks such as Eliminate standing investigation and Use lessons learned
weak passwords, privilege. make more informed to prevent similar
excessive privilege, and response decisions. incidents from
Harden DC security
insecure DC happening again.
configurations.
configurations.
Block risky behavior.
32 CONFIDENTIAL
Identify sensitive Remediate excessive Spot suspicious Block undesired Create recovery plan
data, its owners access. activity around data, actions and incorporate
and who has such as unusual automatically. lessons learned.
Let data owners
access. access or privilege
manage access to Investigate the
elevation attempts.
Spot risks around it, their data in order incident to
such as open to maintain security. formulate the best
access. response.
35 CONFIDENTIAL
Windows file
NAS SQL Oracle
servers
Azure
Microsoft 365 AWS S3 AWS databases
databases
Box Dropbox
Directory services
Competition
▪ Netwrix more feature rich
▪ Netwrix supports Structured and unstructured
▪ Netwrix 100% channel Focused
▪ Netwrix Easy to deal with
▪ Netwrix quick return on investment
▪ Capability to displace Varonis
▪ 100K plus deals
▪ Scalability - 50000 users or more
▪ You can deliver the services - 100%
39 CONFIDENTIAL
Qualifying Questions
• All breaches start with either a change or the need • Ease of use
Competition
▪ Netwrix provides Threat Intelligence Technology that suppress 90%+
of Change Noise and False positives
▪ On average customers reduce costs by 60% over a three-year period
▪ Netwrix Change Tracker modern architecture can support at a
minimum 10 times more devices with a single console than Tripwire
▪ Certified integrations into leading ITSM and SIEMs platforms
▪ Simple to use UI and Licensing Model (per device per year)
44 CONFIDENTIAL
Qualifying Questions
1. Have you implemented any security framework such as NIST or CIS?
2. What IT service desk (or ITSM) do you use and do you operate a system of planned changes within your IT Operations?
5. Do you have a ‘Security Information and Event Management’ (SIEM) solution in place and if so which one?
6. What do you use for Secure Configuration Management (SCM) & File Integrity Monitoring (FIM) and overall Change
Detection?
8. If nothing in place, do you need a solution? Why? Is it a live project with budget set?
Outcomes: Products:
SMB Enterprise
▪ Stop Ransomware from USB / removables ▪ Transition from GPOs to MDM (Intune) and/or
▪ Stop data exfiltration via USB / removables PolicyPak Cloud
• No schema updates!
• No RMM tools to purchase
1. Do you have users with full local admin rights anywhere? Want to get out of the Local admin business but provide
privileges when needed?
2. Got any apps which show UAC prompts?
3. Got any regular users who need to add printers or change network card settings?
4. Got any regular users who need to install or uninstall their own non-standard software (Itunes, UPS QuickShip.)? Some
applications ship every month. Wouldn’t it be great for end users to keep SOME of their software self-updated… like
iTunes, UPS Quickship and one-off-apps?
1.Would it increase your security to manage and block USB and removable media?
2. How would you like to prevent data leaks from USB sticks or malware on USB sticks?
Questions?
Thank You!
70 CONFIDENTIAL
▪ More expensive
• More expensive
▪ Only address AD auditing issues
• Extremely Complex
▪ Older technology
• Vault based, not JIT
▪ Easy rip and replace for us
• Difficult and costly to use and deploy