VULNERABILITY MANAGEMENT TECHNOLOGY REPORT. ncircle IP360 OCTOBER
|
|
|
- Georgina Quinn
- 10 years ago
- Views:
Transcription
1 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT ncircle IP360 OCTOBER
2 2 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT CONTENTS ncircle IP360 ncircle, 101 Second Street, Suite 400, San Francisco, CA Phone: +1 (415) Fax: +1 (415) Test Environment and Network...3 Test Reports and Assessments...4 Checkmark Certification Standard and Premium...5 Vulnerabilities...6 West Coast Labs Vulnerabilities Classification...7 The Product...8 Developments in the IP360 Technology...9 Test Report...10 Test Results...17 West Coast Labs Conclusion...18 Security Features Buyers Guide...19 West Coast Labs, William Knox House, Britannic Way, Llandarcy, Swansea, SA10 6EL, UK. Tel : , Fax :
3 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 3 TEST ENVIRONMENT AND NETWORK For this Technology Report, West Coast Labs engineers created a network infrastructure similar to that found in most corporate IT environments. Each solution entered into this Technology Report was required to perform vulnerability tests against this network. The network used by WCL consisted of between 20 and 30 distinct hosts, and included routers, managed switches, network servers, client machines, and printers. Included within the available services were web servers, mail servers, file and database servers. Customized web applications, designed by engineers at West Coast Labs and containing common scripting errors, were installed on servers across the network. A variety of Operating Systems were used on the network, on different hardware platforms. A number of virtual hosts were also included. In building the network, some of the machines and services were installed with default settings. Various levels of patching were applied across the range of Operating Systems. In addition, a number of common mis-configurations were made in setting up and deploying particular services. Every host on the test network was imaged prior to testing, and restored to the original state before each round of testing for the individual solutions. The test network was protected by a router, and ACLs were set to restrict access to the test network to and from IP addresses specified by the participating vendor, if appropriate. If the solution under test needed no Internet connectivity then the router was configured to block all access to and from the Internet for the period of test. The test network was available to each solution for a 48 hour period.
4 4 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT TEST REPORTS AND ASSESSMENTS WCL have assessed the individual vulnerability assessment reports from each solution on the following basis, with Vulnerabilities on the target network classified under 4 headings: Critical vulnerabilities those that allow an attacker with minimal knowledge or skill to compromise the integrity of the network: this may include gaining control of a server or network device, gaining illegitimate access to network resources or disrupting normal network operations. Severe vulnerabilities those that allow illegitimate access to, or control over, network resources, but that require considerable knowledge or skill on the part of the attacker. Non-critical vulnerabilities those that allow attackers to gain access to specific information stored on the network, including security settings. This could result in potential misuse of network resources. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on hosts, directory browsing, disclosure of filtering rules and security mechanisms. Information leaks these allow attackers to collect sensitive information about the network and the hosts (open ports, services, precise version of software installed etc.) The performance of each solution under test was evaluated on the following criteria: The ease of deployment of the solution The number of vulnerabilities correctly identified in each class The completeness of the report, including identification of any network changes made The clarity of presentation of the findings
5 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 5 CHECKMARK CERTIFICATION Soilutions under test in this Technology Report are eligible for the Checkmark Vulnerability Assessment certification. In order to achieve the Standard Checkmark Certification for Vulnerability Assessment the candidate solution must identify at a minimum 100% of the Critical Vulnerabilities and 75% of the Serious Vulnerabilities. However, those developers identifying 100% of the Critical Vulnerabilities and a minimum 90% of the Serious Vulnerabilities will be awarded the Premium Checkmark Certification for Vulnerability Assessment.
6 6 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT VULNERABILITIES To ensure that the test network mirrored that found in many businesses, a variety of operating systems, on different hardware platforms, were included. A Windows domain was set up using a Windows 2003 Server and a mix of workstations running Windows XP and Windows 2000 Professional. Some Sun Servers running various Solaris distributions provided web services and file storage, assorted Linux boxes were included running Debian and RedHat distributions, and a host running BeOS completed the mix. Some of the servers were installed with default settings and varying levels of patching were applied: some hosts were patched fully up to date while others had been left out of the process. Also, a number of common mis-configurations were made in setting up servers, and deploying particular services. For example, Windows servers were configured with open network shares, ftp servers with anonymous write access, smtp servers configured as open proxies. These are configuration errors that can have profound effects on network security but can easily be implemented by a hard-pressed administrator as a temporary quick fix to a connectivity problem. The Windows 2003 Domain Controller hosted an UltraVNC server using a weak password, the DNS server itself was configured to be compatible with pre-2000 machines. Also installed on the PDC was IIS version 5.0 running default services. Alongside the Primary Domain Controller, a mail server was configured running Microsoft Exchange 2000, and this server also had an instance of UltraVNC running alongside popular game servers with known vulnerabilities. One of the client machines was host to a vulnerable.asp script written in-house by WCL engineers. This had a number of common programming errors in it allowing a user to bypass security measures using a number of different techniques. A bank of Linux machines running a variety of Linux flavors and distributions completed the list of servers. The Linux systems were host to an array of services including FTP, sendmail, apache, and samba. Each of these was mis-configured with common errors, for example anonymous ftp access with write permissions and publicly writeable samba shares. Each of the user client workstations were patched to different levels using official Microsoft Service Packs, historical patches and Windows Update. These machines then had different applications installed, ranging from popular game servers and UltraVNC through to IIS 5.0 and remote admin. Some machines were included in the Windows Domain. Back Orifice was installed on one machine on an unusual port. The test network thus consisted of a series of machines with differing hardware specifications, operating systems, patch levels, and software installations, and multiple vulnerabilities. This Technology Report also saw the inclusion of common vulnerabilities found in software from leading vendors used worldwide along with those on the SANS Top 20.
7 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 7 WEST COAST LABS VULNERABILITIES CLASSIFICATION As a basis of the test program, West Coast Labs engineers built a series of known vulnerabilities in the network on which each of the solutions was installed. To mimic those vulnerabilities found in many corporate IT environments, the risk level of these varied between Critical, Serious, and Minimal. As part of the scope of testing and certification, particular attention was paid to how each of the products detected and classified those vulnerabilities deemed by West Coast Labs to be of either Critical or Serious risk. So that the performance of each product can clearly be understood, this report contains some examples of the types of vulnerability listed as Critical and Serious. CRITICAL VULNERABILITIES MS-Blaster patches not installed on servers FTP server with anonymous, writeable access Publicly available file shares using NetBIOS and Samba Blank Administrator passwords Back Orifice installations Open SMTP relays Completely unpatched operating systems (base installs) Base install of Windows Media Player 9 with no security patches Sun Solaris RPC vulnerabilities SERIOUS VULNERABILITIES Partially patched operating systems to known levels Default or weak passwords VNC servers Popular game servers with known vulnerabilities FTP servers with non-writeable anonymous access Web sites with back-end scripting vulnerabilities Instant Messaging clients Virtual office software Microsoft Desktop Remote Access The classification of the above vulnerabilities is based on information provided by external sources including the SANS Top 20, Bugtraq, and other well known vulnerability lists and sites.
8 8 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT THE PRODUCT IP360 FROM NCIRCLE ncircle SAYS ABOUT THE IP360 ncircle IP360 is a scalable, enterprise-class vulnerability and risk management system that proactively delivers a comprehensive view of network risk and enables cost-effective risk reduction. ncircle SAYS ABOUT THE IP360 BUSINESS BENEFITS ncircle IP360 is a comprehensive proactive security solution that helps organizations cost effectively measure, manage, and reduce network security risk. ncircle IP360 s unique, comprehensive risk profiling technology delivers endpoint intelligence that serves as the foundation for a balanced security ecosystem. ncircle IP360 enables organizations to: Measure network security risk using objective metrics Manage network security risk through dashboard reporting and integration with enterprise systems Reduce network security risk by focusing IT resources where they are needed most ncircle IP360 also helps companies drive continuous regulatory and security policy compliance through endpoint intelligence discovery, risk metrics, and automation. ncircle SAYS ABOUT THE IP360 TECHNICAL BENEFITS ncircle IP360 discovers detailed intelligence about IP-enabled devices on the network, and utilizes best-in-class reporting and analytics to prioritize vulnerabilities and provide a comprehensive view of network risk. Delivered via hardened, non-windows appliances and designed for scalability, rapid deployment, and ease of management, IP360 is ideal for large, globally-distributed networks. ncircle IP360 delivers: Comprehensive, agentless network discovery and profiling of all network assets Vulnerability and security risk assessment across global networks Comprehensive, flexible reporting for regulatory and security policy compliance ncircle IP360 identifies over 1400 operating systems, 3800 applications, and 3500 vulnerabilities, and coverage grows daily.
9 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 9 DEVELOPMENTS IN THE IP360 TECHNOLOGY AS STATED BY ncircle ncircle IP360 was designed from inception to support extreme increases in the numbers of vulnerabilities over time, and it shows in ncircle s market-leading coverage. The product itself was designed to discover non-intrusively and without using agents the operating system, applications, and vulnerabilities on all IP-enabled devices. In the last twelve months, IP360 has gained the ability to gather more detailed information about each device, including specific host configurations such as password requirements and file permissions. Also added is the ability to test for vulnerabilities using credentials via SSH and SNMP, which joins Windows credentialed testing (SMB) and remote, non-credentialed testing as methods of discovery. ncircle VERT ncircle IP360 is backed by ncircle VERT (Vulnerability and Exposures Research Team) ensuring the most comprehensive and current offering in the industry. VERT focuses their efforts on identifying vulnerabilities as they emerge and building accurate, non-intrusive signatures that identify the latest vulnerabilities and applications for ncircle s customers. 24-HOUR MICROSOFT SERVICE LEVEL AGREEMENT ncircle provides customers with a 24-hour Service Level Agreement that commits to provide vulnerability checks, within 24 hours, for all Microsoft Security Advisories. With this guarantee, ncircle s customers can be assured that within 24 hours of the announcement of a vulnerability by Microsoft, ncircle will provide a check with which they can test their systems for the vulnerability. No other vulnerability management vendor has made such a commitment to its customers.
10 10 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT TEST REPORT INTRODUCTION IP360 is an Enterprise level security solution developed by ncircle that can be deployed in a range of configurations to suit any network environment from a single site to a global infrastructure. The IP360 security solution consists of two separate device types. The first is the VnE Manager, which acts as the controlling unit, and the second device is the Device Profiler or DP for short. The VnE Manager is of a standard rack mountable size and come complete with all the kit required for fitting. Taking off the removable faceplate gives access to the removable RAID disks as well as the onboard DVD and floppy disk drives. Also included on the front of the device are USB and VGA ports providing the ability to quickly attach a monitor and keyboard if necessary. The rear of the box provides two further USB interfaces and a PS2 keyboard port, a VGA port, and three network connections. One of these NICs is reserved for a console connection. The DP is physically smaller in size than the VnE, ideal for global based companies shipping a number of these units to a variety of locations. Similar to the VnE, the DP is also rack mountable. Connectivity is provided by a number of interfaces situated on the back panel of the unit, and include PS2, USB, RJ45, and VGA connections. As a precaution against data theft, all information gathered by the DP is reported directly to the VnE Manager over a secure connection. Further to this, the DP contains no internal hard drive but boots directly from a front mounted Flash Disk. This adds yet another layer of security. Multiple instances of each device can be deployed with the option either of having a series of DPs all reporting to the one VNE Manager or having clusters of DPs reporting to their own VnE Manager on a per site basis.
11 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 11 TEST REPORT DEPLOYMENT - INSTALLATION AND CONFIGURATION The initial setup and configuration of the VnE Manager may be performed either across a serial connection based console or by plugging a keyboard and monitor directly into the appliance. Upon connecting to the VnE Manager via the console port, the user is presented with a clean and easy to use interface and is asked to enter standard networking information including the addresses of the gateway and name server, as well as a private IP address. There are a number of other options accessible from this console, including diagnostic tools. These tools provide the user with the ability to perform a basic set of network tests to check for connectivity, for example providing ping and traceroute functionality. Also available is the ability to manage and update the applications within the IP360 solution. Updates can be performed from this console either via a live network connection or by manually downloading the updates onto CD/DVD and inserting the disc into the aforementioned drive. Connecting to the DP, either via serial cable or plugging in a monitor and keyboard directly, gives access to a UNIX based console. This provides similar tools to those on the VnE Manager such as the ability to run pings and traceroutes along with diagnostic functionality to configure the local network address. The time required for this phase is minimal and both appliances can be quickly setup and ready for further configuration.
12 12 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT TEST REPORT THE MAIN INTERFACE AND SCANNING On completion of the initial configuration, the user is then able to connect to the well-constructed and intuitive secure web interface for the IP360. Within this interface the Administrator can complete the remaining configuration tasks such as the creation of user accounts. When creating user accounts, the Administrator can specify the individual time zone of the user along with the user group and the role that the user will fill. Assigning these users to groups and handing out specific roles allows for greater control over the management of IP360, whilst still allowing some of the responsibility to be devolved. To assist with the construction of a user base, IP360 provides the ability to import a list of users directly from a.csv file. Once the process of creating the users is finished, the status of each user can be ascertained with the help of coloured markers. These markers appear next to each name and are coloured green, grey, or red showing the user as online, offline, or locked out respectively. User activity can be further monitored through the use of the audit tool that reports on any actions taken by each of the individual users. The Administrator can select one or more of the created user accounts and search for entries relating to a host of different categories over varying time frames. These searches can either relate to the more common login and logout events, or widened to include changes to specific system settings. With the use of this in-depth auditing tool, a very clear audit trail of events can be constructed that records the actions of every individual user.
13 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 13 TEST REPORT Networks may be created as either individual IP address ranges or, usefully for the larger companies working across multiple sites, as network groups. Those networks created as a group are shown in a network tree, clearly displaying which network belongs to which site. As an example, an Administrator might choose to group all Linux based machines inside a particular office separately from those running Windows, and using IP360 they could be entered as different network groups that belong to the same site. This provides an Administrator with great help when dealing with an organization that uses hundreds of IP addresses across dozens of ranges and physical locations. Before starting the first scan a Scan Profile must be created, and it is here that options relating to information including scheduling, credentials, and ports are configured. Also configured are options connected to the depth of scanning, most notably IP360 s Application Scan. This tool can be used to accurately identify the specific applications in use on each machine, in turn this aids in the discovery of any associated vulnerabilities. In order to mitigate the effect scanning has on a network, IP360 can be configured to limit the volume of network traffic being generated on a per second basis and scans can be set either to run at a specific time or to be run continuously. Using this latter option allows the administrator to constantly be aware of any new vulnerabilities that appear on the network. A limit can be set on the number of instances per day that an individual scan can be run, while a time window can be designated for scans that create a high volume of traffic. The administrator is, however, still free to run an on-demand scan at any point using any of the created Scan Profiles.
14 14 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT TEST REPORT One of IP360 s key features is Host Policy Baselining, which is the ability to assign any given host as the standard to which all other hosts should be compared. In effect, this allows the user to spend time configuring one single machine to perfectly match their organization s security policy and then to scan the network or networks looking for those workstations that deviate from this standard. The use of this feature can reduce the inherent risk of false positive results. Host Policy Baselining will aid in immediately identifying programs and applications that are either installed by a user or any other means such as malware. REPORTING Detailed reports can be created that include a wealth of information to aid the removal of vulnerabilities from a network environment. By clicking on the Scan History link, a list of every scan recently performed is displayed. This list can be sorted by various fields including the network group, the Scan Profile used, and the DP used. The data generated in these reports includes a summary of the occurrences of each individual vulnerability, information about each discovered host, and a list of discovered applications. Also available is a list of every discovered vulnerability that are scored anywhere between 1 and 40,000. Using this highly granular scale, the IP360 gives each discovered vulnerability a unique score. This is instead of a series of vulnerabilities all listed as critical, thus giving the administrator a clear indication of the most serious vulnerabilities.
15 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 15 TEST REPORT In all areas of use the IP360 endeavours to present as much information to the user as possible and nowhere is this more obvious than through the use of the solution's Focus feature, another technology unique to ncircle. This powerful tool allows the administrator to view and compare all data relating to their network and with proper use can greatly enhance the ability of a network security team to identify and remove network vulnerabilities. One use of Focus is to display results for a specific machine. At the top of the page, basic information relating to the machine is displayed including the domain name, MAC address, operating system, network group, and network address. Continuing down the page, a series of calendars display each month the machine was scanned; highlighting the specific dates. Clicking on these dates opens a small pop-up window that lists the DP and Scan Profile used to run the scan, along with the resulting vulnerability score. There is also an option for comparing the scan results from different dates to help detect any potential trends. Tables containing lists of vulnerabilities and applications detected on the machine take up the bulk of the screen; each individual entry into these tables provides a hyperlink to further data relating to the item. Clicking on an entry will display ncircle s ID for the vulnerability along with the score, approximate skill required to take advantage of the vulnerability, and the type of solution available. Following on from this information, ncircle presents a more detailed description of the solution along with a comprehensive solution to it s removal.
16 16 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT TEST REPORT A key feature of IP360 is its ability to assist first and second line support teams that use Remedy to manage support calls. Using the interface available on IP360, an Administrator is able to create a ticket relating to a specific vulnerability on a specific machine and IP360 can then automatically send this ticket on to Remedy. If a support engineer then works on a specific vulnerability and closes the ticket, IP360 automatically scans the machine again looking for any trace of the vulnerability, re-opening the ticket if the fault is again found.
17 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 17 TEST RESULTS IP360 performed well during testing, maintaining a high degree of detection while supplying a vast amount of analytical data. Of special recognition is IP360 s Focus feature, use of which allowed data to be thoroughly examined during testing and would be a very useful tool for any network Administrator. IP360 successfully detected 100% of the Critical vulnerabilities and over 90% of the Serious vulnerabilities on the West Coast Labs test network. The IP360 appliance has been awarded the Premium Checkmark Certification for Vulnerability Assessment.
18 18 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT WEST COAST LABS CONCLUSION ncircle s IP360 is a powerful vulnerability management solution providing strong security solution for any corporation looking to protect themselves in an increasingly hostile IT world. IP360 provides a significant amount of information that is analyzed and categorized using powerful reporting and analytical tools unique to ncircle, allowing Security Administrators to quickly target, remediate or remove vulnerabilities. The high level of scalability provided by the solution can help mitigate threats to even the largest of IT infrastructures.
19 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT 19 SECURITY FEATURES BUYERS GUIDE AS STATED BY ncircle ncircle Focus A new feature of IP360, ncircle Focus is a real-time data synthesis and active analysis tool that enables security professionals to immediately assess network risk and focus their actions. Focus is a unique tool and a major advancement that breaks from traditional reporting paradigms, offers security analysts instant and unparalleled insight into risks on their networks, enabling security professionals to take the most efficient actions to proactively reduce their network security risk. Comprehensive Network Profiling - IP360 discovers all hosts, applications, services, and vulnerabilities, providing a comprehensive view of your network and building the foundation for effective risk management and compliance processes. Granular Scoring and Asset Values IP360 discovers a wealth of data about the hosts that reside on a network, but rather than provide that data in an endless list like traditional solutions, IP360 prioritizes remediation tasks, enabling users to focus on the items that will most effectively reduce risk on critical systems. IP360 utilizes a highly granular scoring methodology, system asset values, and optionally network topology information to provide true prioritization. ncircle Topology Risk Analyzer - ncircle Topology Risk Analyzer incorporates network topology, or line of sight, risk analysis into ncircle IP360, providing an order of magnitude improvement in prioritizing vulnerability remediation. The Topology Risk Analyzer enables IT staff to identify the top few vulnerabilities from the thousands on their networks that will most effectively reduce risk on critical systems. Only ncircle offers this breakthrough technology as an integrated option in a vulnerability and risk management solution. Integration/Open Architecture - IP360 utilizes open standards, enabling the integration of vulnerability and risk management into existing business processes and IT systems such as help desk, asset management, and other security solutions. The comprehensive endpoint intelligence gathered by IP360 can be leveraged to enhance existing solutions and drive automation within the security ecosystem through ncircle s command-and-control API. Architecture - IP360 was designed from inception for large, global deployments, centralized management, and maximum data security. A typical deployment consists of a central VnE Manager console appliance, and one or more distributed Device Profiler appliances allocated based on number of hosts and network layout. Device Profilers discover all IP-enabled devices on the network, profile the operating systems, applications, and vulnerabilities on each host, and communicate the information back to the VnE Manager for consolidation and centralized reporting.
20 20 VULNERABILITY MANAGEMENT TECHNOLOGY REPORT SECURITY FEATURES BUYERS GUIDE Appliance-based All IP360 appliances employ a hardened (non-windows) operating system with all non-essential services and hardware ports disabled to ensure that they introduce no new vulnerabilities to the network. All communication between the IP360 appliances is encrypted and authenticated using 128-bit SSL to protect the integrity and confidentiality of vulnerability information in transit. IP360 Device Profiler appliances use flash-based storage with no local hard drives to ensure that no vulnerability data is ever at risk on the distributed Device Profilers. Centralized Reporting ncircle IP360 provides an easy-to-use Web interface for all functions including administration, configuration, reporting, and workflow. Customized reports are available for all audiences, from technically-focused security administrators to executives, providing an objective and comprehensive view of risk on the network. Scalability - IP360's distributed architecture enables scalability from small departmental networks to the largest global enterprise, delivering rapid deployment and automated product updates to eliminate the burdens of traditional software maintenance. This design also localizes audit traffic to reduce bandwidth consumption and avoid network bottlenecks. IP360's distributed architecture and centralized management enables organizations to rapidly and cost-effectively scale the system without further investment in IT resources. Role-based Access Controls - The industry-best Role-based Access Controls within IP360 enable customers to align remediation policies to internal security and ownership policies to ensure individuals can only remediate and report on hosts and networks assigned to them. Host Policy Baselining - Using IP360, organizations may define a "gold standard" system based on the operating system, applications and vulnerabilities. They may then quantify the business risk associated with that host, and measure other hosts against that standard.
ISS Internet Scanner
VULNERABILITY ASSESSMENT TECHNOLOGY REPORT ISS Internet Scanner OCTOBER 2006 www.westcoastlabs.org 2 VULNERABILITY ASSESSMENT TECHNOLOGY REPORT CONTENTS ISS Internet Scanner Internet Security Systems,
Vulnerability Assessment Technology Report
August 2005 Vulnerability Assessment Technology Report Rapid7 NeXpose Vulnerability Assessment Technology Report 2 Contents Test Specifications 3 Vulnerabilities 5 The Product 6 Test Report 8 Test Results
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Lumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation
Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation Version 7.0 SP1 Evaluation Guide September 2010 Version 2.4 Copyright 2010, Lumension, Inc. Table of Contents Lumension Endpoint
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
Patch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
APC Enterprise KVM Switches
APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
File Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Solution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Comodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
SurfControl EmailFilter for SMTP
ANTI SPAM SOLUTIONS TECHNOLOGY REPORT SurfControl EmailFilter for SMTP JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS SurfControl EmailFilter for SMTP SurfControl,
Network Security and Vulnerability Assessment Solutions
Network Security and Vulnerability Assessment Solutions Unified Vulnerability Management It s a known fact that the exponential growth and successful exploitation of vulnerabilities create increasingly
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
GFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Tumbleweed MailGate Secure Messenger
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
PacketTrap One Resource for Managed Services
Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010. Quick Installation Guide
8/16-Port IP KVM Switch IKVM-8010 / IKVM-16010 Quick Installation Guide Table Of Contents Chapter 1 Introduction... 3 1.1 Features... 3 1.2 Package Contents... 4 1.3 Technical Specifications... 4 Chapter
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
McAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Remote Network Monitoring Software for Managed Services Providers
http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Symantec Protection Center Enterprise 3.0. Release Notes
Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Asset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
Asset. Unicenter Management r11
Data Sheet Asset Unicenter Management r11 Unicenter Asset Management r11 is a comprehensive solution for proactively managing IT assets in your business environment and provides instant knowledge of what
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
SmartFiler Backup Appliance User Guide 2.0
SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Build Your Managed Services Business with ScienceLogic
White Paper Build Your Managed Services Business with ScienceLogic Sharpen Your Competitive Edge with Revenue-Driving Services 1 As a managed service provider (MSP), you realize that both the opportunities
SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Complete Patch Management
Complete Management Targeted, Reliable and Cost-efficient In- Depth CSI Corporate Software Inspector Empower your IT-Operations and Security Teams with the most reliable Vulnerability & Management solution
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
