Automate Key Network Compliance Tasks



Similar documents
Best Practices for PCI DSS V3.0 Network Security Compliance

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

NetBrain Consultant Edition v5.0

Discover Live Network

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

How To Get Your Computer To Comply With Pca

NetBrain Enterprise Suite v5.1

Using Skybox Solutions to Achieve PCI Compliance

What Will You Automate?

Automate PCI Compliance Monitoring, Investigation & Reporting

Improving PCI Compliance with Network Configuration Automation

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

PCI Requirements Coverage Summary Table

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

WHITEPAPER: Streamline Enterprise IT Management Network Map Automation. A Visual Path to Automated Network Documentation

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

March

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

PortWise Access Management Suite

HOW SECURE IS YOUR PAYMENT CARD DATA?

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

PortWise Access Management Suite

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Making Your Network Safe

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

LogRhythm and PCI Compliance

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Payment Card Industry Data Security Standard

PCI Solution for Retail: Addressing Compliance and Security Best Practices

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

How To Manage Security On A Networked Computer System

PCI Compliance for Cloud Applications

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

PCI Requirements Coverage Summary Table

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

White Paper. Ensuring Network Compliance with NetMRI. An Opportunity to Optimize the Network. Netcordia

CA Configuration Automation

Achieving PCI-Compliance through Cyberoam

U-LINC : Workflow and Notifications Anytime and Anywhere for Microsoft Dynamics GP

SonicWALL PCI 1.1 Implementation Guide

Sarbanes-Oxley Compliance for Cloud Applications

IT Security & Compliance. On Time. On Budget. On Demand.

Overview. Edvantage Security

Total Protection for Compliance: Unified IT Policy Auditing

A Rackspace White Paper Spring 2010

The Comprehensive Guide to PCI Security Standards Compliance

How To Manage Log Management

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

CorreLog Alignment to PCI Security Standards Compliance

Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Firewall and Router Policy

NetBrain Enterprise Edition v5.4g1

FIREMON SECURITY MANAGER

DMZ Gateways: Secret Weapons for Data Security

74% 96 Action Items. Compliance

Making Database Security an IT Security Priority

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools

Meeting PCI Data Security Standards with

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Introduction to Junos Space Network Director

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Digital Advisory Services Professional Service Description Network Assessment

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

NetBrain Workstation Professional Edition 2.3 Release notes

WhatsUp Gold vs. Orion

Boosting enterprise security with integrated log management

Product Comparison List

IBM Tivoli Netcool Configuration Manager

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Payment Card Industry Self-Assessment Questionnaire

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Payment Card Industry (PCI) Data Security Standard

PCI Self-Assessment: PCI DSS 3.0

SANS Top 20 Critical Controls for Effective Cyber Defense

PCI DATA SECURITY STANDARD OVERVIEW

NetBrain Security Guidance

When Data Loss Prevention Is Not Enough:

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Information Technology Solutions

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

Ecom Infotech. Page 1 of 6

Did you know your security solution can help with PCI compliance too?

Transcription:

NETBRAIN SOLUTIONS Network Compliance Network Document Automation Automate Key Network Compliance Tasks CHALLENGE: Generating audit documents to demonstrate compliance is extrememly time consuming. Proactive planning to ensure enterprises stay compliant with internal and external policies proves difficult. SOLUTION: Enterprises can overcome manual processes associated with compliance by leveraging NetBrain software. Automation of recurring data collection, indexing and generation of requred audit reports reduces the amount of man-hours spent by internal or consulant teams and can help ensure continous rather than point-intime compliance. BENEFIT: Enterprises can save the time and resources associated with collecting and maintiaing data in additon to creating documentation required for compliance mandates. NetBrain can also help organizations proactively stay compliant with automated checks. Regulatory compliance standards such as PCI DSS, SOX, and HIPPA require that organizations take proactive measures to ensure vulnerabilities to sensitive information are properly secured. It's not enough just to be compliant; organizations must also be able to prove their compliance during an audit. To demonstrate compliance, regulatory auditors require detailed reports that demonstrate appropriate measures have been taken to prevent data from being compromised. They also require enterprises to maintain a repository of log data for applications and devices to confirm compliance over time. It is critical for enterprises to observe such guidelines, since noncompliance can result in severe penalties. By leveraging NetBrain s automated data collection, analysis, and documentation capabilities, engineers can overcome the challenges associated with verifying and documenting compliance: Maintaining up-to-date diagrams of network topology Generating detailed audit reports of infrastructure Running configuration compliance checks and reporting Automatically Maintain Up-to-Date Network Diagrams A key compliance requirement is to ensure network diagrams are up-to-date and that there is a formal process in place to keep them that way. As internal teams or auditors begin to examine infrastructure, network diagrams are often referenced. As a general rule, it is recommended that these diagram/topology documents include: Firewalls Load Balancers Routers and Switches Demilitarized Zone (DMZ) Wireless Networking or Networks Web Servers Proxy Servers Email Servers DNS Servers With NetBrain, engineering teams can create the diagrams required with unparalleled precision and speed. After an initial network discovery, NetBrain determines both network topology as well as the underlying design. A recurring network discovery, known as a benchmark, is used to ensure NetBrain s network intelligence remains accurate and up-to-date. The benchmark captures the following data:

NETBRAIN SOLUTIONS Network Compliance 02 Configuration files Route tables CDP/ARP/MAC/STP tables Inventory information These recurring benchmarks provide a repository of log data that can be referenced during audits to demonstrate compliance over time. Accessing accurate data, NetBrain can automatically generate network diagrams from simple user inputs. Diagrams are generally in the form of either layer-3 or layer-2 diagrams and can also be organized into site overview diagrams as shown below. EXAMPLE 1: A network overview diagram created with NetBrain. EXAMPLE 2: A topology diagram displaying site connections.

NETBRAIN SOLUTIONS Network Compliance 03 NetBrain is used to create these diagrams on-demand in its native and interactive Qmap format. All device and design data associated with a segment of the network is embedded within a Qmap file, and easily accessed. For compliance documentation, most auditors will require Visio format diagrams. NetBrain s Qmaps can be exported to Visio in seconds. EXAMPLE 3: A static Visio diagram that has been exported from a dynamic NetBrain map. Besides creating maps on-demand, NetBrain supports many ways to create multiple diagrams in batches one for each site, for instance. To proactively prepare for compliance, users can batch export Visio diagrams to a central repository and keep them updated on a pre-defined schedule. EXAMPLE 4: Set a recurring schedule for Visio updates.

NETBRAIN SOLUTIONS Network Compliance 04 Automatically Generate Detailed Audit & Design Reports Although updated diagrams are the most critical form of compliance documentation, regulatory bodies will also need to have detailed audit and design reports. NetBrain can automate the creation of design documents leveraging highly customizable templates. After selecting a template outlining what to include in the final report, NetBrain will create a Word document based on the selected style. EXAMPLE 5: A report generated automatically in Word format. EXAMPLE 6: Network Design Reports are highly customizable through a template-driven approach.

NETBRAIN SOLUTIONS Network Compliance 05 Automate Configuration Compliance Checks and Reporting Compliance verification requires organizations not only to document their network s design, but also to maintain an adequate internal control structure. Leveraging this control structure, NetBrain can automatically detect compliance discrepancies. This is achieved by leveraging unique Automation Procedures which index the network, collect data, and report anomalies. Automation Procedures are executable within NetBrain to perform a series of actions normally completed using the CLI. NetBrain includes hundreds of these procedures out of the box, including a series of compliance checks such as: Is login authentication enabled Is password encryption enabled Is public or private keyword configured in SNMP community strings EXAMPLE 7: Run Automation Procedures to detect and highlight compliance discrepancies automatically. Additionally, organizations can customize their own procedures to meet other in house or regulatory compliance needs through a visual and sample-driven platform.

NETBRAIN SOLUTIONS Network Compliance 06 EXAMPLE 8: Define a series of probes and triggers to create a customized automation procedure without scripting. Summary Compliance doesn t have to be unwieldy for organizations. By removing the burdens associated with manual diagramming, documentation, and organizational processes, organizations can shift focus from proving past compliance to enforcing real-time adherence. Automation is the key to proactively enforcing compliance policies and to a secure, compliant network. NetBrain Technologies Inc. +1 800 605 7964 65 Network Drive 1 st Floor info@netbraintech.com Burlington, MA 01803

NETBRAIN SOLUTIONS Network Compliance 07