Protecting Your IP with Perforce Helix and Interset
Transcript of Protecting Your IP with Perforce Helix and Interset
![Page 1: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/1.jpg)
Protecting Your IP with Perforce Helix and IntersetCharles McLouthMark BennettKima Hayuk
![Page 2: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/2.jpg)
2
Introductions
Charles McLouth• Director of Technical Sales, Perforce
Mark Bennet• Vice President, Interset
Kima Hayuk• IP Protection Program Manager, Electronic Arts
![Page 3: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/3.jpg)
3
Agenda
Review Helix features for Security
Review capabilities of Interset Threat Detection
Review real world case studies
A Customer’s perspective
![Page 4: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/4.jpg)
4
Helix Features for Security
Server Security Levels• Level 3 – Ticket-based authentication (p4 login)• Level 4 – Level 3 plus Service Users required for service users
Strong passwords – At least two of the following:• The password contains uppercase letters. • The password contains lowercase letters. • The password contains nonalphabetic characters.
![Page 5: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/5.jpg)
5
Protections
Rules for Access
![Page 6: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/6.jpg)
6
Protections
Apply to User or Group
![Page 7: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/7.jpg)
7
Protections
Grant/Restrict to a pattern or specific file
![Page 8: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/8.jpg)
8
Protections
Grant/Restrict to a specific IP Address or Range
![Page 9: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/9.jpg)
9
LDAP
Delegate Authentication to LDAP
LDAP / Active
Directory
![Page 10: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/10.jpg)
10
LDAP
Delegate Authentication to LDAP
LDAP / Active
Directory
P4-Developers P4-Developers
![Page 11: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/11.jpg)
Interset Threat Detection
![Page 12: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/12.jpg)
Behavioral Analytics: Remove Noise, Focus On The Real Threat
Cover More Use Cases• Compromised Accounts• Insider Threat• Negligent User• Data At Risk, Data Theft
Focus on Highest Risks• Highest risk data assets• Highest risk machines &
devices• Highest risk users/accounts• Riskiest applications running
React Quickly• Immediate incident context• Rapid incident exploration• Flexible, multi-purpose workflow• Integrate into existing IR
process
Visi
bilit
yA
ccur
acy
Res
pons
e
![Page 13: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/13.jpg)
Visibility: Visualizing the Attach Path
• Authentication Data• Account
Compromise
Stage: Establish Foothold, Escalate Privileges
• Repository Access & Usage Data• Account
Compromise
• Insider Threat
Stage: Internal Recon
• Data Movement• Insider Threat
• Account Compromise
• Data Movement/Theft
Stage: Stage & Exfiltrate Data
![Page 14: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/14.jpg)
46
80
99
Accuracy: Visualize Attack Path, Analytics Assigning Risk
Security Operations Centre
Escalate Investigate Remediate
![Page 15: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/15.jpg)
UBA is fast, accurate, and actionable
SIEM
Endpoints
AD/LDAP Connectors
ActionableInformation
SIEM
Scalable Big-Data PlatformCloud, Hybrid, or On-Premise Delivery
Security Operations• Incident context• Accounts at risk• Data at riskIT Operations• System impact• Operational riskInvestigators• Incident context• Event level record• Data compromiseHuman Resources• Employee involved• Leaver theft• Watch listLegal• Incident alert• Incident context
Data Acquisition Incident ResponseAnalysis
File 1871.3XAT
User 277
Machine HK4M
CORRELATE BASELINE ANALYZE EXPLORE
UBA PLATFORM
Structured Data
Extensible Analytics Engine
IP Repository Connectors
![Page 16: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/16.jpg)
Real World Examples
![Page 17: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/17.jpg)
17
A Customer Case Study
![Page 18: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/18.jpg)
18
![Page 19: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/19.jpg)
19
![Page 20: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/20.jpg)
20
![Page 21: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/21.jpg)
21
Managing Risk in the Enterprise
A Customer Perspective: Electronic ArtsKima Hayuk, IP Protection Program Manager
• EA Security & Risk Management • 18 Year EA Veteran of QA, CE & Studio Operations
• Governance: Policies & Standards• Employee Training & Awareness• Internal Security Consultant: Tools & Process• Compliance Assessment Officer• IP Related Incident Response
![Page 22: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/22.jpg)
22
Managing Risk in the Enterprise
Electronic Arts: An IP-centric Organization• Growth by Merger & Acquisition• Heterogeneous Cultural Norms & Technology Adoption
The Challenge: How to manage IP risk while supporting• Culture of Creativity & Innovation• Globally Distributed Development• Inter-Studio Collaboration and Knowledge Transfer• Highly Dynamic & Mobile Workforce
![Page 23: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/23.jpg)
23
Managing Risk in the Enterprise
Standardization & Centralization – Consider Perforce as Single System• Operating Systems, Virtual Machines, Security Controls• Authentication, Scanning, Vulnerability Patching• System & Application Monitoring• Access Request, Approval & Management
Holistic Perspective – Protect everything with access to Perforce• Secure Development Environment – Upstream & Downstream Systems• Network Segmentation - between & within game teams• Endpoint Protection – secure client workspace
Enable Best Practices & Automation – Dev Teams as Partners• Facilitate user access reviews by information owners• Automate access provisioning & deprovisioning• Identify & Investigate Anomalous User Behavior
![Page 24: Protecting Your IP with Perforce Helix and Interset](https://reader034.fdocuments.net/reader034/viewer/2022042618/58a745fb1a28ab01548b4bab/html5/thumbnails/24.jpg)
24
Managing Risk in the Enterprise
User Behavior Analytics for Insider Threat Detection Mandated by Policy but Difficult to Accomplish
Helix Threat Detection Deployed at EA after successful Proof of Concept Relatively Easy & Quick to Deploy Challenge in Complying with Privacy Regulations Operationalized within BSOC w/ Escalations Integration with other Security Tools