VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM



Similar documents
Vulnerability & Compliance Management System

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

IT Security & Compliance. On Time. On Budget. On Demand.

Configuration Audit & Control

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

INFRASTRUCTURE SOLUTIONS OVERVIEW

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

Netzwerkvirtualisierung? Aber mit Sicherheit!

Vulnerability Management

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Dynamic Data Center Compliance with Tripwire and Microsoft

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

How To Manage Your Information Systems At Aerosoft.Com

Guardium Change Auditing System (CAS)

McAfee Database Security. Dan Sarel, VP Database Security Products

CONTENTS. PCI DSS Compliance Guide

IBM Tivoli Endpoint Manager for Lifecycle Management

Real-Time Database Protection and. Overview IBM Corporation

IBM Endpoint Manager for Core Protection

WEB APPLICATION VULNERABILITY STATISTICS (2013)

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

MANAGED SERVICES. Remote Monitoring. Contact US: millenniuminc.com

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

McAfee Server Security

QUESTIONS & RESPONSES #2

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

PCI DSS. Get Compliant, Stay Compliant Seminar

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

A Decision Maker s Guide to Securing an IT Infrastructure

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes

Devising a Server Protection Strategy with Trend Micro

Cloud and Data Center Security

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Virtualization Journey Stages

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective:

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Devising a Server Protection Strategy with Trend Micro

Peter Dulay, CISSP Senior Architect, Security BU

IBM Tivoli Netcool Configuration Manager

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

SENTINEL MANAGEMENT & MONITORING

Securing the Service Desk in the Cloud

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

How To Use Ibm Tivoli Monitoring Software

QRadar SIEM 6.3 Datasheet

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Enforcive / Enterprise Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Controlling Remote Access to IBM i

EMC Data Protection Advisor 6.0

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Enforcive /Cross-Platform Audit

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Sygate Secure Enterprise and Alcatel

IBM Tivoli Endpoint Manager for Security and Compliance

Trend Micro. Advanced Security Built for the Cloud

<cloud> Secure Hosting Services

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Reining in the Effects of Uncontrolled Change

Best Practices for PCI DSS V3.0 Network Security Compliance

Network Test Labs (NTL) Software Testing Services for igaming

Patch Management SoftwareTechnical Specs

Symantec IT Management Suite 7.5 powered by Altiris

Payment Card Industry (PCI) Data Security Standard

mbits Network Operations Centrec

How To Protect Your Cloud From Attack

Client Security Risk Assessment Questionnaire

ProtectID. for Financial Services

AL RAFEE ENTERPRISES Solutions & Expertise.

Virtualization Support - Real Backups of Virtual Environments

RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Payment Card Industry Data Security Standard

Zone Labs Integrity Smarter Enterprise Security

Network Configuration Manager

IBM Tivoli Endpoint Manager for Lifecycle Management

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

IBM Tivoli Compliance Insight Manager

Transcription:

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

2 REDUCE COSTS. IMPROVE EFFICIENCY. MANAGE RISK. MaxPatrol from Positive Technologies provides visibility and control of security compliance across your entire corporate IT infrastructure in a single solution. Securing the integrity of corporate information systems has never been more important. Each successive media report about a new security breach underlines the massive potential for damage to an organisation s finances, operations and reputation when confidential information is compromised. Protecting your company from outside attack can be a costly, complex business, especially when you need to comply with the growing range of legal and regulatory standards brought in to counter these threats. But the penalties for failure are even higher. Many large organisations struggle to meet this challenge with a fragmented approach, selecting different tools for each system, division or country and employing expensive specialists to carry out manual testing and configuration. The cost effective alternative is to centralize and automate the process with MaxPatrol, a fully-integrated, best-in-class vulnerability and technical compliance management solution from Positive Technologies.

3 VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM MAXPATROL: ONE SOLUTION FOR ALL YOUR SYSTEMS, ALL YOUR NEEDS With MaxPatrol, you can unite all your systems under one compliance solution: network and system infrastructure, servers, VOIP and wireless networks, databases and applications, ERP-systems and web applications. Databases Applications ERP-Systems Network and System Infrastructure Web Applications Vulnerability Management Compliance Management Application and Database Audit Penetration Testing Knowledge Base Managenent Team IS and IT cost reduction High-level business reporting / KPIs Corporate Compliance Real-time security overview MaxPatrol is the only enterprise product on the global market that combines auditing, penetration testing and compliancemanagement in a single solution. It is already used by over 1,000 successful companies of all sizes to maintain security across many operating systems, databases, business management systems and web-applications. MaxPatrol can meet the security needs of your entire business, from IT engineers to the CEO. Its automated processes can save your company time and money as well as increasing the accuracy of VOIP an Wireless Network PCI, SOX, ISO etc your regulatory and compliance data and reducing the risk of human error. Corporate Policies Compliance/ Audit Team Vulnerability and Risk Management Team IT Remedy Team Vulnerability management Compliance management Policy compliance Vulnerability elimination control Easy implementation IT resources inventory Recommendations on vulnerability elimination Reporting on updates Comprehensive tool for security assessment Major international standards support Custom reporting system

4 VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM MAXPATROL: BUSINESS BENEFITS Consolidation for Consistency: Combine the security of your entire organization under a single solution and a unified approach. Gain visibility and control of configurations on more than 70 platforms and applications, including wireless and VOIP equipment, infrastructure and business applications and ERP systems. Automation for Efficiency: Cut your staffing costs whilst increasing the frequency of system checks. MaxPatrol s configuration & vulnerability assessment engine is agentless, low-privileged and non-intrusive reducing disruption to your systems and staff. It has the industry s lowest false positive rate. Reporting for Transparency Obtain reporting that is relevant for each management level to support informed management decisions. Pre-Configured for Speedy Compliance Rapidly deploy MaxPatrol s wide range of pre-defined security policies to quickly measure your compliance with industry regulations including: ISO 27001/27002, SOX, PCI DSS, NSA, NIST and CIS. Easily configure bespoke policies to enforce your own, in-house security guidelines. Flexible for Scale and Change Take advantage of MaxPatrol s scalability and flexible deployment models to configure the ideal solution for your specific infrastructure. Maintained by Experts Enjoy peace of mind by putting your security in the hands of acknowledged industry experts. MaxPatrol is updated daily by our team of engineers as they track new threats, policy requirements and vulnerabilities. The Positive Research innovation group works closely with the industry s foremost research teams; technology partners such as Cisco, Oracle, HP, IBM, Microsoft and others; and vendors of anti-virus, firewall and intrusion detection systems. MAXPATROL: KEY FEATURES Vulnerability Assessment agentless, low-privileged, non-intrusive, black-box configuration and vulnerability assessment. PCI DSS ASV-compliant. Supports penetration testing, assesses applications, network inventory and network perimeter Cross-Platform Compatibility works across: Network equipment from Cisco, Juniper, Check Point, Arbor, Huawei, Nortel, Alcatel etc. VOIP, wireless and telecom equipment Operating Systems including Windows, Mac OS X, Linux, IBM AIX, HP-UX and Oracle Solaris Databases including Microsoft SQL, Oracle, IBM DB2, PostgreSQL, MySQL and Sybase Desktop applications: Web Browsers, Office, IM apps Infrastructure applications including Active Directory, Microsoft Exchange, IBM Lotus, Microsoft IIS & Apache Virtualization and Terminal Platforms: WMware vsphere/esx, Microsoft Hyper-V, Citrix XenApp etc. Security Systems: Personal IPS, Firewalls, Antivirus etc. Business critical systems: ERP, Banking & Billing Systems including SAP R/3 and SAP NetWeaver Malware Detection agentless technologies to detect insecure code, Malware and Trojans across all systems Web-Application Security assesses Web 2.0 applications written in technologies including AJAX, JSON, Flash and Java Sensitive Data Detection powerful search engine identifies data such as credit card, PIN and CVV numbers in files/databases ERP System Security Analysis based on vendor/industry guidelines: SAP Security Guides, ISACA (ITAF) etc. Password Policy Audit black-box and white-box mode auditing for systems including: Remote access and VPN (RDP, VNC, Telnet, SSH, RCP, etc.) File and folder Shares Application protocols: SAP, Oracle, SQL, Web, Email etc. Desktop application such as IM & Browsers Agentless Integrity Monitoring built-in database of each system s components helps detect incidents/unwanted changes Flexible Reporting System supports automation of processes including inventory and change management, compliance and IT performance management XML-Based Integration API supports creation of unified IS frameworks across systems including: Asset Management, Help Desk Ticketing, Risk Management, Patch Management, SIM/SIEM, IPS and WAF Penetration Testing, NAC/NAP MAXPATROL IN ACTION More than a thousand companies already rely on MaxPatrol to secure their systems. These customers range from SMEs to government departments, international banks and major telecommunications companies. One of the biggest installations to date monitors security levels across the customer s 8 subsidiaries, which operate in 26 countries. MaxPatrol continues to grow with the customer s business, expanding into new territories in a rolling programme that has so far seen the deployment of 36 MaxPatrol components to control in excess of 100,000 nodes in the customer s infrastructure. MaxPatrol is commonly used to: Manage security control and compliance processes within an integrated Global Security Operational Center Audit IT and IS performance and service quality achieved by internal teams as well as outsourced staff provided by third parties. Provide managed security services for corporate clients as part of outsourcing/out-staffing business models Provide penetration testing and security audits for external and internal auditors and regulators For more information about how MaxPatrol brings value to our customers, please see our case studies at www.ptsecurity.com/success For more detail on MaxPatrol s specifications, please see our technical product description at www.ptsecurity.com/maxpatrol MAXPATROL IN FIGURES 30,000+ 1,000+ 5,000+ 300+ 1,000+ The number of checks for known vulnerabilities MaxPatrol is pre-configured to carry out. This increases daily as new vulnerabilities are identified by our research team and added to the MaxPatrol knowledge base The range of systems MaxPatrol is proven to work across The number of configuration parameters that MaxPatrol can detect across more than 70 different platforms and applications The array of pre-prepared compliance mapping rules with each deployment of MaxPatrol, linked to major IT and IS regulatory standards and frameworks The number of corporate customers already relying on MaxPatrol to enable their IT&IS processes

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM ABOUT POSITIVE TECHNOLOGIES Positive Technologies is at the cutting edge of IT Security. A specialist developer of IT Security products, Positive Technologies has over a decade of experience in detecting and managing vulnerabilities in IT systems. Positive Technologies has more than 200 employees at its offices and research centres in London and Moscow. Its technology partners include IBM, Oracle, Cisco, Microsoft and HP. Positive Technologies innovation division, Positive Research, is one of the largest security research facilities in Europe. Our experts work alongside industry bodies, regulators and universities to advance knowledge in the field of information security and to apply this analysis to improving the company s products and services. The centre carries out research, design and analytical works, threat and vulnerability analysis and error elimination. Since 2004, Positive Research has helped global manufacturers including Microsoft, Cisco, Google, Avaya, Citrix, VmWare and Trend Micro to eliminate hundreds of vulnerabilities and defects that threatened the safety of their systems. POSITIVE TECHNOLOGIES OUR EXPERIENCE, YOUR SECURITY PT@PTSECURITY.COM WWW.PTSECURITY.COM