1 Prevent cyber attacks. SEE what you are missing.
2 See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk management framework to be able to prioritize and drive investment decisions (Masters, SC Magazine, Jan 2014) CISO, Pacific Gas & Electric Driven by the need to support evolving business objectives, enterprise IT infrastructures have grown increasingly larger, more complex and more dynamic over the years. In order to secure these burgeoning infrastructures, network professionals have deployed equally complex and sophisticated security controls, such as firewalls, intrusion prevention systems and access control lists. Yet, despite these controls, cyber attacks continue, enabling cyber-criminals to steal intellectual property and valuable business secrets. The reason? While the controls themselves are effective at their tasks, they are deployed and managed in silos. The log files, configuration files and interminable reports these controls produce are also too large and complex to analyze manually, which limits visibility into the entire security picture and doesn t create actionable results. Without a comprehensive solution for monitoring, analyzing and managing risk enterprise-wide, security gaps form and security professionals are blind to them. Executive Summary RedSeal s automated intelligence gives you the power to understand your network, identify security gaps and prevent cyber attacks. Get a comprehensive understanding of where security is working, where improvement is needed and where the greatest attack risks lie. What must be done to increase situational awareness of the network infrastructure and close gaps in security? Visualize and understand your infrastructure with an up-to-date network map. Proactively protect critical assets through dynamic data analysis. Continuously ensure your network is in compliance. Locate and prioritize the biggest risks among a large volume of identified vulnerabilities. Efficiently prioritize incident response during an attack. Implement a consistent process to ensure access rules are implemented as designed. Include security and risk impact analysis in change management. RedSeal s end-to-end solution provides the network visibility and analytics you need to control your network from the inside out.
3 If you can t SEE it, you can t secure it. SEE what you ve been missing. The RedSeal Platform is a cyber security intelligence system that is based on proactive end-to-end complex network modeling and analysis. It provides network, security, and risk management teams with a firm understanding of where security is working, where improvement is needed and where the greatest attack risks lie. It replaces blind security management with a platform that enables enterprises to: Visualize and analyze the network infrastructure Prevent cyber attacks Automate and ensure compliance The RedSeal Platform works without disturbing network traffic. It imports the configuration of network devices (Routers, Switches, Firewall, Load Balancers, Wireless Controllers, etc.) by repositories or live connections. Then, it builds the virtual reality model of the network and applies sophisticated mathematical computations to determine, for every endpoint, what can access what through what path. From there, the RedSeal Platform can do further analysis on risk and exposure by importing the vulnerability scan data and applying the access intelligence to it. As a result, users can utilize this analytical intelligence to instantly see what the access violations are, what the top exposures are and what the overall risk situation is. Deployment Options The RedSeal Platform is offered in three form factors for ultimate deployment flexibility: Hardware Appliance A powerful, Linux-based appliance that delivers the best performance for mid to large enterprises Virtual Appliance (OVA) A virtual instance that can be deployed and managed in standard virtualization environments Software (Windows-Based) Standalone software that can be installed on Windows servers Licensing RedSeal Platform licensing is very straightforward: The license is based on the number of L3 devices managed. There are no separately charged modules and functions. There are no fees for end hosts and there are no extra hidden costs. RedSeal Platform licenses are also charged ONCE, which means one unique L3 device can be managed by as many licensed RedSeal Platform instances as desired. This enables enterprises to implement flexible deployment scenarios that fit their needs. FEATURES The following tables list some major features of the RedSeal Platform: Visualize & Analyze Dashboards Maps & Views Risk Heat Map Instant Visual Threat Queries Detailed Path Explorer End-to-End Access Query Zones & Policies Best-Practice Checks Automated PCI/NERC/STIG Compliance Figure 1: Topology Map Figure 2: Risk Map Figure 3: Zones & Policies
4 Prevent Cyber Attacks Vulnerability Scan Data Integration Exposure-Based Attack Risk Analysis Virtual Attack Simulation Rule-Change Impact Analysis Exposure Based Patching Remediation Prioritization SECURITY STARTS with A solid building requires careful design, planning, and fastidious monitoring during the construction phase to ensure that implementation adheres to design. Infrastructure security requires the same process. Prior to adding more security controls and in preparation for changing access policies, the RedSeal Platform should be in place before you expand your network. The RedSeal Platform not only provides analytics-based, wholenetwork risk visibility, but also guides and validates the process of security implementation to ensure that it follows the blueprint. Figure 4: Attack Risk Analysis Report The longer a network operates without RedSeal, the more risky it can become. The lack of visibility will not help build and maintain a secure network. Before deploying a variety of security point solutions, enterprises need to take the first and most basic step get the RedSeal Platform and visualize vulnerabilities and compliance issues before they grow out of control. Different teams, multiple ways to deliver value. The RedSeal Platform is a system that will become a cornerstone for operations of both security teams and network teams. Each team has its top benefits. For CISOs and CIOs: For Security Teams: For Network Teams: Figure 5: Hosts Risk Report Scale & Integration Hierarchical Server Manager Ticketing Systems Integration egrc Systems Integration SIEM Systems Integration Endpoint Management Systems Integration Full-Blown North Bound API Actionable security metrics. Proactively understand and monitor the overall security state of the network through automated and quantifiable attack risk metrics for situational awareness. Deploy new networks securely. Ensure security architecture from the start. Assess the attack risk at every step of the build-out (new branches, new data centers, etc.). Operational excellence. Efficiently carry out remediation through attack-based prioritization. Automatically identify violations to ensure compliance. Proactively ensure a bulletproof security architecture. Continuously and automatically assess potential security holes by visualizing and analyzing the infrastructure risks. Exposure-based vulnerability management. Readily prioritize the vulnerability remediation tasks by utilizing the calculated potential attack risk. Avoid compliance penalties. Automatically identify violations to ensure constant compliance and automatically provide proofs for external audit. Constantly maintain accurate visibility. Always up-to-date network topology (no more out-of-date Visio diagrams). Validate access changes ahead of time. Ensure security and compliance. Identify the security impact of a change before applying it. Implement Prioritized Incident Response (IR). Prioritize incidents based on potential breach determined by actual access analysis and severity correlation.
5 When we tied our vulnerability discovery process directly to our asset database, RedSeal flagged some critical assets that weren t properly documented. It used to be very time consuming and expensive to analyze the impact of discovered vulnerabilities. RedSeal s fully automated process has saved us a great deal of time and thousands of dollars in analysis. SVP and Enterprise Architecture Director, UMB Financial Corp. RedSeal helps us solve one of our most daunting security challenges: making sure that the network only allows the access that is absolutely necessary for the business. VP and CSO, Polk RedSeal was simple and painless to install, plus, it s very scalable, which is critical because of the fast-changing nature of our environment. CISO, Interval International About RedSeal Netw rks Visibility brings control. Control enables prevention. Without visibility into your end-to-end network security architecture, you re vulnerable to attacks. If you can t see it, you can t secure it. RedSeal s automated intelligence gives you the power to understand your network, identify security gaps and prevent cyber attacks. It lets you prioritize vulnerabilities and fix your most critical security gaps - before hackers can find them. RedSeal Networks, the leading provider of network infrastructure security management, is the only end-to-end solution that provides the network visibility and analytics you need to prevent cyber attacks from the inside out. For more information about RedSeal Networks: or
FIREMON SECURITY MANAGER Regain control of firewalls with comprehensive firewall management The enterprise network is a complex machine. New network segments, new hosts and zero-day vulnerabilities are
Continuous Cyber Situational Awareness Continuous monitoring of security controls and comprehensive cyber situational awareness represent the building blocks of proactive network security. A publication
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The
IT@Intel White Paper Intel IT IT Best Practices Private Cloud and Cloud Architecture December 2011 Best Practices for Building an Enterprise Private Cloud Executive Overview As we begin the final phases
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
E-SPIN PROFESSIONAL BOOK NETWORK MANAGEMENT NETWORK AND SERVER MANAGEMENT ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMPREHENSIVE MONITORING FOR NETWORKS, SYSTEMS APPLICATIONS,
Understanding inventory, configuration and IT asset management Introduction...2 Defining inventory, configuration and IT asset management...2 Primary success enablers...3 Inventory management...4 Building
Hybrid: The Next Generation Cloud Interviews Among CIOs of the Fortune 1000 and Inc. 5000 IT Solutions Survey Wakefield Research 2 EXECUTIVE SUMMARY: Hybrid The Next Generation Cloud M ost Chief Information
BSM and Enterprise IT Infrastructure Monitoring Guide & Reference 1. Adopting Service-oriented Monitoring for Your Evolving IT Infrastructure 2. Giving Your Constituents Real-time Visibility to Business
MOVING THE DATA CENTER FROM CHAOS TO CONTROL BEST PRACTICES IN DATA CENTER INFRASTRUCTURE MANAGEMENT WITH INTEGRATED PROCESSES AND TECHNOLOGIES WHITE PAPER 101 TABLE OF CONTENTS 01 EXECUTIVE SUMMARY 03
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
WHITE PAPER 1ntroduction... 2 Zenoss Enterprise: Functional Overview... 3 Zenoss Architecture: Four Tiers, Model-Driven... 6 Issues in Today s Dynamic Datacenters... 12 Summary: Five Ways Zenoss Enterprise
Unified Security Monitoring Best Practices June 8, 2011 (Revision 1) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
Top 10 SIEM Implementer s Checklist Operationalizing Information Security Compliments of AccelOps www.accelops.com Table of Contents Executive Summary....................................................................
WHITE PAPER: EDISCOVERY AND LITIGATION READINESS Becoming Litigation Ready Through Proactive Information Governance OCTOBER 2008 Peter Pepiton II CA INFORMATION GOVERNANCE SOLUTIONS Table of Contents Executive
PHYSICAL SECURITY OVER INFORMATION TECHNOLOGY GUIDANCE DOCUMENT March 2014 This guidance document has been produced by CPNI in conjunction with MWR InfoSecurity. Disclaimer Reference to any specific commercial
IT@Intel White Paper Intel IT IT Best Practices Cloud Computing and Information Security January 2012 Virtualizing High-Security Servers in a Private Cloud Executive Overview Our HTZ architecture and design
Cost-Effective Alternatives to Software Asset Management kpmg.com Contents Executive Summary 1 Introduction 2 Key SAM issues 4 A cost-effective approach to SAM 6 Benefits of SAM 8 Conclusion 9 Cost-Effective
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business
PeopleSoft Red Paper Series Securing Your PeopleSoft Application Environment July 2010 Including: How to Plan for Security How to Secure Customized System Exposing PeopleSoft outside the Firewall Securing
Software Usage Analysis Version 1.3 Implementation Guide Implementation Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer