Lumension Security Vulnerability Management Solution. Automating the Vulnerability Management Lifecycle

Size: px
Start display at page:

Download "Lumension Security Vulnerability Management Solution. Automating the Vulnerability Management Lifecycle"

Transcription

1 Lumension Security Vulnerability Management Solution Automating the Vulnerability Management Lifecycle November 2008

2 Table of Contents Proactive Vulnerability Management 2 Uncovering Vulnerabilities A Never-Ending Process 2 Managing the Vulnerability Lifecycle 3 Discovering Assets 4 The Security Management Console 4 Defining Discovery Jobs 4 Interpreting Discovery Results 5 Assessing and Prioritizing Risks 7 Managing Security Configurations 9 Establishing Remediation Policies 9 Mitigating Non-Patchable Risks 10 Remediating Vulnerabilities 10 Educating Users 10 Deploying Agents 10 Testing Patches 11 Deploying Patches 11 Scheduling Remediation Jobs 11 Manual and Policy-Based Remediation 12 Reporting and Monitoring 12 An Integrated Solution for Managing the Vulnerability Lifecycle 14 Expand Your Control with Lumension 14 About Lumension Security 15

3 Proactive Vulnerability Management Any computer that is exposed to the internet, unsanctioned applications, or unprotected storage devices can be infected with viruses, Trojans, worms, keyloggers, spyware, rootkits, and other malware. By preying upon vulnerabilities in operating systems and applications from ubiquitous internet browsers to and office productivity suites these infections can quickly lead to stolen data, disrupted operations, and threats to the privacy of customers and employees. In 2007 alone, well over 6,000 new vulnerabilities were reported, an average of 124 per week. Nearly 90% of those vulnerabilities could be exploited remotely 1. In addition, poorly installed or misconfigured devices can create vulnerabilities that allow data corruption, eavesdropping, and theft. Because vulnerabilities can be found literally everywhere from gateways and routers to DNS servers, web servers, desktops, and laptops many IT departments run a catch as catch can defense. But using swarms of IT personnel to constantly hunt down vulnerabilities, figure out and then apply the appropriate patches, and hope for the best is a waste of resources. Automating the vulnerability management lifecycle discovery, assessment, prioritization, remediation, and reporting lets you keep your information resources safe from external threats around the clock, freeing IT personnel to work on business-focused projects. Uncovering Vulnerabilities A Never-Ending Process Automating vulnerability management dramatically improves your defense against malware even as it increases the operating efficiency of computing resources. It patches known risks, of course, but it also addresses endpoint misconfigurations, compliance with regulatory or corporate policies, outdated or inaccurate security mechanisms, and unauthorized services and applications. Since new malware threats and configuration vulnerabilities continue to appear every day, it s critical that you automate the never-ending process of discovering assets, monitoring risks, and remediating as needed. In addition, your computing environment is constantly changing as you continuously add, replace, and modify computers, devices, servers, and software. You need a way to monitor both the ever-changing assets attached to your network and the mobile devices that interact with it devices made even more vulnerable by their ability to operate outside the firewall. With a combination of network- and agent-based scanning, you can track both networked and mobile assets. Network-based scanning performs periodic sweeps of networked assets and records the status and compliance outliers for all operating computers. Such a solution is relatively easy to deploy, as nothing needs to be installed on individual devices. However, it is likely to occasionally miss devices, such as laptops and PDAs, that are connected only periodically. Agent-based monitoring ensures that every device on which the agent is installed reports its status, configurations, vulnerabilities, and need for patches. Agents also make it possible for organizations to install and manage patches for each asset. Intermittently connected devices report when attached to the network, even through VPN or an internet connection. Devices that are always on and connected report on a specified schedule, reducing network bandwidth consumption. An integrated solution that incorporates both network- and agent-based scans and assessments offers the best of both worlds. Network scanning takes snapshots of the state of all connected assets, while agents monitor individual assets for vulnerabilities and configuration issues as well as manage installation of patches for both online and mobile devices. Such a unified system helps organizations avoid the costs of integrating and correlating databases and schemas from multiple security vendors, while making it possible to create a global report of assets and vulnerabilities. Finally, it eliminates the need for multiple security and operational IT teams, making the solution easier to deploy with a shorter learning curve for IT. 1. Aberdeen Group, Vulnerability Management, July 2008.

4 The Lumension Security Vulnerability Management Solution fully integrates asset discovery with vulnerability assessment, remediation, and reporting. By combining network-based asset discovery and agentbased vulnerability management, Lumension gives operational and security teams an integrated toolset for policy management, assessment, enforcement, compliance, and change management. Managing the Vulnerability Lifecycle Vulnerability management is a constant cycle of discovering assets, assessing vulnerabilities, and prioritizing actions to remediate risks patching where possible and mitigating everything else. The cycle continues with follow-up scanning, monitoring, and reporting to validate successful patching and compliance. Each phase sets up success for the next, increasing the efficiency and accuracy of the whole. Discover Discover all network assets Report Numerous reporting options Reporting across entire enterprise network Assess Vulnerability and configuration assessment Network & agentbased scanners with integrated view Remediate Deploy security patches Mitigate risk with custom remediations Prioritize Prioritize threats and mitigation actions Figure 1 : Vulnerability Management Lifecycle The vulnerability management lifecycle consists of five phases: Discovering assets Assessing vulnerabilities and misconfigurations and prioritizing risks Mitigating non-patchable risks Remediating vulnerabilities Reporting and monitoring The Lumension Security Vulnerability Management Solution integrates all of these phases.

5 Discovering Assets Discovering all of the computing assets and operating systems in your environment is the first step toward understanding the risks associated with existing vulnerabilities and configuration issues. Just knowing you have hundreds of un-patched systems can be useful albeit stressful but if you also know the functions of those systems (e.g., finance, marketing, production), you can start prioritizing the risks according to severity and potential impact. The Lumension Security Vulnerability Management Solution offers both network- and agent-based methods of scanning and categorizing assets. Each method has its place in a unified VM strategy. Figure 2 : The Lumension Security Management Console is the central point for scanning, assessing, prioritizing, remediating, and reporting. The Security Management Console The Lumension Security Management Console is your first line of defense, providing a view of all assets currently attached to the network. Agents installed on offline assets will check in each time these assets boot up or connect to the network. You can run a manual network discovery as needed, or set up a regular schedule. Similarly, agents will provide detailed information when desired, or can be set to report asset status on a schedule. Assets without agents can be updated with client agent software directly from the console as needed. Defining Discovery Jobs Understanding your risks and vulnerabilities begins with discovering all of your network and mobile assets. Setting up a discovery job consists of choosing the parameters for a scan based on network architecture and the assets you wish to uncover. Discovery jobs can be defined to run on virtually any schedule you choose hourly, daily, weekly, monthly or at a given time of day to limit impact on network traffic.

6 Figure 3 : To set up the discovery phase, define a job with the appropriate security credentials and range of discovery options and then define a schedule. You can probe the network using ping, ICMP, port scanning, SNMP, Windows versions, DNS names, MAC addresses, or NetBIOS names. Specify one or more of the following discovery methods to limit a scan to a specific range: IP range Wildcard scan Active Directory domain controller Name target Network neighborhood Previously discovered targets Import a list of predefined targets You can also choose to include or exclude specific ranges from a search. For example, you may wish to restrict access to a subnet of secure servers to specific security personnel. If you have multiple networks, you can set up a centralized server to act as the repository for scans from each network. For example, a company might have subnets in three regional offices plus a central database at headquarters. Each subnet scanner can send results to the central server, from which the CSO can maintain a bird s-eye view of all risks. Interpreting Discovery Results The result of a network discovery provides an overview of assets from which you can drill down for detail. Discovery scans reveal many aspects, such as asset IP addresses, MAC addresses, OS, agent status and versions, and a rating of the criticality of each asset.

7 Figure 4 : A scan of network assets can be viewed by criticality, access state, agent status, IP address, DNS, or operating system. The system assigns a criticality rating based on OS and asset types: a server is more critical than a laptop, but a switch has greater weight than a file server. Sorting by variables can expose the vulnerabilities or configuration challenges affecting a specific OS or application release. From this point, you can create groups and classify assets based on a variety of criteria: Groups defined by IP address, geography, department, or types of users Criticality by domain servers, gateways, and switches Web servers and mail servers PCs and laptops Disconnected devices If agents are installed on some or all assets, monitoring becomes a matter of each agent reporting on a regular basis not necessarily at the same time as a network scan. This enables you to keep watch over offline and mobile assets as well as over systems that are always online. Figure 5 : Discovery results show agent status (idle, offline, not installed), versions, and last check-in time.

8 Assessing and Prioritizing Risks You can use the results of the discovery phase to scan and assess the types of vulnerabilities, misconfigurations, and levels of risks on the discovered assets. For a previously un-patched network, you may want to start with small groups of critical machines, such as those in the finance department, which can be grouped by IP address or network neighborhood. Using the Lumension Security Management Console, you can define a scan job that interrogates the machines found in the discovery phase. Pre-configured scans can be customized for your assets, or you can design scan jobs from scratch to meet your needs. Figure 6 : Scan jobs are defined in the Lumension Security Management Console to interrogate the assets uncovered in the discovery phase. Some of the criteria you can use for vulnerability scans are: Vulnerability Sets, such as BSD, CERT, CIAC, CVE, NIST, NT4_0, Network Device, Password, Password Checker, Platform Independent, Policy, and QuickScan Credentials that may be required to access the machines being interrogated Ports, services, shares, users, and groups You initiate a scan job from the Management Console and it returns all the vulnerabilities found for the criteria you set for the job. Figure 7 : Focusing on groups of assets helps reveal the range and severity of vulnerabilities. Here the system highlights a DNS client that could allow spoofing.

9 Of course, the number of vulnerabilities in an environment depends on how well patched the systems are to begin with, and how much control users have over individual machines. The results of an assessment scan can be sorted by patch severity, status, CVE identifier, and CERT identifier, among other methods. The sorting capability lets you focus on high-severity warnings first. Figure 8 : A detail summary provides information on the ramifications of each vulnerability and on how to remediate the issue. The Lumension Security Management Console lets you drill down to see the details of a particular vulnerability, including links to additional descriptions of the issue from vendors and the National Institute of Standards and Technology (NIST). The detail summary of each vulnerability provides a description illustrating how the vulnerability causes damage, along with type; category; severity; identifications by CVE, Bugtraq, CERT, and CIAC; and information about available patches. The system also computes a Score, which is a weighted number (1 100), combining criticality and number of vulnerabilities. Assets with a high Score (80 100) need immediate attention. Based on the Score of affected machines and your judgment of the impact a vulnerability exploit could have on your business, you can prioritize and decide which vulnerabilities to patch on which machines, and in what order. To do so consistently and efficiently, you will need to establish your own vulnerability remediation policies.

10 Figure 9 : The Target view of a scan reveals the vulnerabilities of each machine and the Score ranking to help you prioritize remediations. Managing Security Configurations Vulnerabilities can also stem from a plethora of misconfigurations that create security gaps and performance problems that in turn lead to increasing support costs from constant rebuilding of PCs. These misconfigurations can range from common oversights, such as leaving administrator access open on a PC, to hidden registry settings in applications that leave the machine susceptible to backdoors. The Lumension solution assesses for software, operating system, and application configuration vulnerabilities resulting from incorrect installations and even from users meddling with system settings. The Lumension Security Vulnerability Management Solution leverages best practices from leading security think tanks, including the National Institute of Standards and Technology (NIST), which developed the Security Content Automation Protocol (SCAP), a repository of security content to help automate and standardize technical control compliance activities as well as vulnerability checks of both application misconfigurations and software flaws. In particular, organizations committed to meeting the Federal Desktop Core Configuration (FDCC) standard from the U.S. OMB and NIST can use Lumension Security s configuration management capabilities to scan and verify compliance with the 200+ configuration rules. The solution can monitor and report on FDCC configuration issues to help you correct and comply with these regulations. In the commercial sector, FDCC policies can be easily applied as industry best-practices. Organizations can also upload their own policies to monitor for misconfigurations in specialized software or modified operating systems. Establishing Remediation Policies Armed with the information from your discovery and assessment scans, you can prepare the policies that will guide your remediation strategy and tactics. These policies are unique to every organization, depending on size, complexity, and the need to comply with specific governmental and legal regulations. Remediation policies should also be consistent with any existing corporate policies. There are, however, basic guidelines you can follow to establish your remediation policies.

11 Determine the most critical assets for your operations: servers to keep the flow of communication going at all times, web servers for your customer-facing storefront, and database servers for your ERP system. Your internal and external service-level agreements will dictate the priority of remediation. Set timeframes for applying critical patches. For example, two weeks for all personal computers; two days for business servers. Determine vulnerability scan timeframes: daily, weekly, monthly, or by groups of assets. For example, laptops as they connect to the network, database servers every week, gateways and switches every day. Test your policy compliance with industry best-practice security configuration standards and regulations, such as FDCC, and set tolerance thresholds to remain compliant. Codifying these types of decisions will help you apply remediations in a consistent and timely manner across your organization. Mitigating Non-Patchable Risks A subset of revealed vulnerabilities and configuration issues may not be immediately patchable or even appropriate to patch. These include: Open ports that can be vulnerable to attack and should be closed Inappropriate firewall settings Autorun CDs that can load malicious code when a CD is inserted New flaws for which no patches are yet available Computers with non-compliant FDCC configurations (e.g., active guest or admin accounts) In many of these cases, you will need to change settings manually (firewalls, ports) or fine-tune configurations to alleviate the vulnerability. Other situations may require mitigating the vulnerability until a permanent fix is found. In some cases, taking an asset offline is the only prudent answer. If you are also using Lumension Security Endpoint Protection Solution, you can use application whitelisting to prevent critically vulnerable applications from launching until they are patched. Remediating Vulnerabilities You ve discovered assets and scanned them for vulnerabilities, analyzed and prioritized the vulnerability and risk reports, and mitigated where possible. Now comes the coup de grâce: remediating the vulnerabilities for which you have patches and fixes. Educating Users An important step in the implementation of any IT management system is educating personnel on what to expect with the new level of control. In the case of vulnerability management, users need to understand that patches will be rolled out as needed. In many cases, the patching process requires a reboot of a machine. Inevitably, this may cause interruptions in people s routines. Employees need to know which computers need to be left on and connected to the network. Mobile computer users will be affected when they reconnect to the network. Agents can notify the user when a patch is being downloaded, applied, and if there is a need for a reboot. Deploying Agents In order to install patches and fix configuration issues, an agent needs to be installed on each asset. You may decide to roll out the client agents during your regular updates to computers with your existing change management system, or you can deploy agents individually to assets that need remediation. 10

12 The Lumension Security Management Console provides a quick way to see if agents are installed on a specific device, and if not, an easy method to install and configure an agent on any networked machine. Testing Patches Testing your patches is a critical first step to assure not only that the patches install and work correctly, but that they do not interfere with other applications. You should have a special baseline of machines, representing the range of configurations on your network, to test the patches. Assign these to a Test Group and let the agents install patches, reboot, and then evaluate the results for application conflicts. When the remediations pass the baseline test machines, you are ready to apply them to a diverse set of employee machines. You should first set up a group of assets that include one or two machines from several departments, ensuring that they represent the range of applications and configurations found in your organization. Deploying Patches Once the remediations are installed and tested on these sample real world machines, you are ready to deploy them across the enterprise based on the risk policies you have formulated. Typically, you will patch the assets with the highest severity rating and impact on your business, and then work your way down the scale of risk. For example, if your business relies heavily on customer s, your mail servers will be at the very top of the remediation list, in concert with your policies for their maintenance downtime. Figure 10 : Focusing on specific machines or vulnerabilities to start patching the most urgent risks. Scheduling Remediation Jobs The administrator of patch deployment uses the Remediation Wizard to define each patch job. Jobs can cover hundreds of assets or just one, depending on the severity and number of machines affected. Patches cannot be distributed without the explicit authorization of the administrator. Figure 11 : With the Remediation Wizard, a few clicks let you patch a set of vulnerabilities by defining the machine to be patched, the schedule, and the reboot options. 11

13 The administrator can specify several options for deployment: Reboot schedule allows you to set reboots according to an individual agent s policies, at a specific time, or not at all. Sequential deployment minimizes network traffic by breaking up patch files as they are transmitted to agents. Parallel deployment distributes critical patches to multiple agents all at once. Quiet Mode does not alert the user of the machine that a patch is being installed and does not require user interaction. QChain installs multiple patches with one final restart (instead of rebooting after each patch). Once you define and save a patch job, it will launch according to schedule, instructing agents to download specific patch files and install them according to predefined rules. Manual and Policy-Based Remediation Most networked assets, such as servers and desktop PCs, are exposed to a constant stream of risks. Viruses and other threats are routinely uncovered by NIST and other agencies and reported as threats. The Lumension Security Vulnerability Management Solution automatically downloads the latest patch definitions and files from the Lumension Vulnerability Management Server so that assessment scans are upto-date on the latest threats. Lumension makes it easy to perform manual ad hoc remediation to fix urgent vulnerabilities, and to set up policy-based schedules for remediation (e.g., patch mail servers Saturdays at 1 AM; critical patches must be installed within 2 days) according to your established enterprise and security configuration policies. With agents installed on all your assets, threats are reported as they are detected, regardless of the network scanning cycle. Agents automatically request patches for detected vulnerabilities. The remediation administrator must approve the deployment of the patch and schedule the deployment (e.g., immediately, within 24 hours). Agents that receive a patch automatically apply them, and reboot as defined by the job s schedule. Agents are particularly valuable for laptops and other mobile devices. When a mobile or offline computer reconnects via the internet or LAN/WAN, its agents immediately request updates to newly discovered vulnerabilities, download remediation packages, install them in the proper order, and report the remediation status to the central console. Reporting and Monitoring Reporting, the final phase of the vulnerability management lifecycle, proves the value of your efforts. Customers, suppliers, and regulatory agencies require confirmation that your systems meet certain standards and verification that patching and configuration management are making your systems more secure. Reporting also serves as the foundation for ongoing monitoring and discovery. Reporting tracks trends in new and fixed vulnerabilities. A decrease in vulnerability and fast turnaround to remediation show progress and the ability to keep security risks under control. In addition, Lumension Security s integrated configuration management solution allows easy monitoring and the export of policy-driven configuration reports to demonstrate compliance with government, customers, and legal standards. Reports also provide a view into trends of vulnerability severity fewer critical warnings or rising alerts for specific operating systems or applications indicate you are on top of the situation. 12

14 Figure 12 : Reports, especially Executive Summaries, provide evidence of progress or alert you to the need for more frequent scans and remediation. Summaries and executive reports provide a foundation for reviewing enterprise security policies, dealing with criticality, and instituting changes to increase effectiveness. 13

15 An Integrated Solution for Managing the Vulnerability Lifecycle Lumension Security Vulnerability Management is ideal for IT environments consisting of heterogeneous platforms and applications. It is a cost-effective, in-depth vulnerability assessment, remediation, and security configuration management solution for managing multiple operating systems, such as Windows, Linux, UNIX, OSX, and the wide range of applications that run on them. Using open standards such as NIST and CVE, the solution ensures that as vulnerabilities continue to attack your computing environment, your system is aware of and can deal proactively with constantly evolving patches. In addition to subscription-based secure configuration contents and checklists available from the National Vulnerability Database, Lumension Security Vulnerability Management Solution embraces open standards. You can create, import, and map custom configuration policy contents and regulatory compliance schemes, such as NIST SP , NSA Security Guide, DISA Security Guide, Microsoft Security Best Practice Guide, and incorporate your own specific best practices or local regulations as appropriate. Lumension Security Vulnerability Management works hand-in-hand with the Lumension Security Data Protection and Endpoint Protection solutions to build a proactive security shield that defends your information systems and vital data. For example, patches are automatically added to a shared application whitelist, ensuring proper operation as systems are updated. In addition, the whitelist is aware of existing vulnerabilities and can block unpatched or corrupted applications from running should a threat be great enough. Expand Your Control with Lumension Lumension Security Solutions provide granular and far-reaching control of your most critical vulnerability, data protection, and endpoint security issues. As discussed in this paper, Lumension Security Vulnerability Management Solution gives enterprises an inventory and vulnerability management solution that identifies software, hardware, and services throughout your network. It monitors how assets are used or misused and closes vulnerability and configuration gaps, helping ensure compliance with configuration and security policies. With Lumension Security Endpoint Protection Solution, whitelisting guards your systems by allowing only approved processes and applications to run. It automatically protects your systems against malware and viral programs while improving total data security and overall system performance. Lumension Security Data Protection Solution for device control lets you manage storage endpoints to stop leakage of sensitive information, with detailed forensics of who is moving data and where. Lumension Security gives you control over your IT resources today. For more information, contact Lumension at or

16 About Lumension Security Lumension Security, formed by the combination of PatchLink Corporation and SecureWave S.A., is a recognized global security software solution company, providing optimal protection and control of enterprise endpoints for more than 5,100 customers and 14 million nodes worldwide. Leveraging its proven Proactive Security Model, Lumension Security enables organizations to effectively manage risk at the endpoint by delivering best-of-breed, policy-based solutions that simplify the entire security management lifecycle. This includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting & Compliance. Headquartered in Scottsdale, Arizona, Lumension has offices worldwide, including in Virginia, Florida, Luxembourg, the United Kingdom, Spain, Australia, Hong Kong, and Singapore. PatchLink, now Lumension, was founded in 1991 by Sean Moshir. Global Headquarters North Greenway Hayden Loop, Suite 100 Scottsdale, AZ United States of America phone: fax:

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Version 7.0 SP1 Evaluation Guide September 2010 Version 2.4 Copyright 2010, Lumension, Inc. Table of Contents Lumension Endpoint

More information

Endpoint Security Management

Endpoint Security Management Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect

More information

Lumension Endpoint Management and Security Suite

Lumension Endpoint Management and Security Suite Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module

More information

Lumension Guide to Patch Management Best Practices

Lumension Guide to Patch Management Best Practices Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security

More information

Why Free Patch Management Tools Could Cost You More

Why Free Patch Management Tools Could Cost You More Why Free Patch Management Tools Could Cost You More Selecting the right solution can save your organization time and money By KACE & Lumension Table of Contents 1.0 Introduction... 3 2.0 Point Patching

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...

More information

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta. Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks

More information

How To Manage A System Vulnerability Management Program

How To Manage A System Vulnerability Management Program System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices WHITE PAPER Best Practices for Securing Remote and Mobile Devices Table of Contents Executive Summary 3 The Rise of Mobile and Remote Computing 3 Risks from Remote Computing 3 Risks for Mobile Workers

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat PCI COMPLIANCE Achieving Payment Card Industry (PCI) Data Security Standard Compliance With Lumension Security Vulnerability Management and Endpoint Security Solutions Cardholder Data at Risk While technology

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014 Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two

More information

Practical Patch Compliance

Practical Patch Compliance Practical Patch Compliance Relieving IT Security Audit Pain, From the Data Center to the Desktop Microsoft s System Center Configuration Manager doesn t handle every aspect of Linux/UNIX and third-party

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Whitepaper. Securing Visitor Access through Network Access Control Technology

Whitepaper. Securing Visitor Access through Network Access Control Technology Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.

More information

Reining in the Effects of Uncontrolled Change

Reining in the Effects of Uncontrolled Change WHITE PAPER Reining in the Effects of Uncontrolled Change The value of IT service management in addressing security, compliance, and operational effectiveness In IT management, as in business as a whole,

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Streamlining Patch Testing and Deployment

Streamlining Patch Testing and Deployment Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

IBM Tivoli Endpoint Manager for Security and Compliance

IBM Tivoli Endpoint Manager for Security and Compliance IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Agent vs. Agent-less auditing

Agent vs. Agent-less auditing Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide

Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Planning your migration with Service Pack 1 This document provides guidance for customers who plan

More information

Avoiding the Top 5 Vulnerability Management Mistakes

Avoiding the Top 5 Vulnerability Management Mistakes WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

Proactively Managing Servers with Dell KACE and Open Manage Essentials

Proactively Managing Servers with Dell KACE and Open Manage Essentials Proactively Managing Servers with Dell KACE and Open Manage Essentials A Dell Technical White Paper Dell KACE Dell Open Manage Essentials THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Integrated Threat & Security Management.

Integrated Threat & Security Management. Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Features Business Perspective. www.eset.com

Features Business Perspective. www.eset.com Features Business Perspective www.eset.com Endpoint Protection Antivirus / Antispyware Auto-Scan of Removable Media Host-based Intrusion Prevention System (HIPS) Client Antispam Cross-platform Protection

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Hardware Inventory Management Greater Boston District

Hardware Inventory Management Greater Boston District Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the

More information

Network Security and Vulnerability Assessment Solutions

Network Security and Vulnerability Assessment Solutions Network Security and Vulnerability Assessment Solutions Unified Vulnerability Management It s a known fact that the exponential growth and successful exploitation of vulnerabilities create increasingly

More information

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

5 Steps to Advanced Threat Protection

5 Steps to Advanced Threat Protection 5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious

More information

Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000

Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000 800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

Dedicated and Distributed Vulnerability Management

Dedicated and Distributed Vulnerability Management Dedicated and Distributed Vulnerability Management December 2002 (Updated February 2007) Ron Gula Chief Technology Officer Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 THE NEED FOR VULNERABILITY

More information

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0. Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...

More information

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information