TECHNOLOGY PARTNER WEBINAR. eeye & Core Security: Integrated Vulnerability Scanning & Penetration Testing



Similar documents
Integrated Threat & Security Management.

Avoiding the Top 5 Vulnerability Management Mistakes

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

CORE Security and GLBA

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Attack Intelligence: Why It Matters

eeye Digital Security Product Training

Simplifying the Challenges of Mobile Device Security

Vulnerability Management

VULNERABILITY MANAGEMENT

McAfee Database Security. Dan Sarel, VP Database Security Products

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

NERC CIP VERSION 5 COMPLIANCE

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

PCI DSS Overview and Solutions. Anwar McEntee

Three Ways to Secure Virtual Applications

IBM Security QRadar Vulnerability Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

White Paper The Dynamic Nature of Virtualization Security

Network Security and Vulnerability Assessment Solutions

Extreme Networks Security Analytics G2 Vulnerability Manager

The webinar will begin shortly

How To Handle A Threat From A Corporate Computer System

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Developing Secure Software in the Age of Advanced Persistent Threats

Patch and Vulnerability Management Program

PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

IT Security & Compliance. On Time. On Budget. On Demand.

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Continuous Network Monitoring

Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007

Metrics Suite for Enterprise-Level Attack Graph Analysis

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

WHITEPAPER. Nessus Exploit Integration

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.

Keeping your data yours

Enterprise Computing Solutions

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Intrusive vs. Non-Intrusive Vulnerability Scanning Technology

Cisco RSA Announcement Update

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Vulnerability Intelligence & 3 rd party patch management

Analysis of the Global Vulnerability Management Market Platform Convergence Intensifies Competition but Creates Opportunity in Growth Technology

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

HP Application Security Center

IT Risk Management: Guide to Software Risk Assessments and Audits

The Value of Vulnerability Management*

Pentests more than just using the proper tools

Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015

Pentests more than just using the proper tools

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

How To Manage A Network Security Risk

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Application Security 101. A primer on Application Security best practices

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

2011 Forrester Research, Inc. Reproduction Prohibited

Effective Software Security Management

The New PCI Requirement: Application Firewall vs. Code Review

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Content Security: Protect Your Network with Five Must-Haves

Endpoint Security Management

STATEMENT OF WORK (SOW) for CYBER VULNERABILITY ASSESSMENT

Breaking down silos of protection: An integrated approach to managing application security

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

locuz.com Professional Services Security Audit Services

Transcription:

TECHNOLOGY PARTNER WEBINAR eeye & Core Security: Integrated Vulnerability Scanning & Penetration Testing July 28, 2011 eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Agenda Intros: Morey Haber, VP Product Management, eeye Alex Horan, Director Product Management, Core Security Threat landscape overview by eeye How seamlessly integrated vulnerability scanning and penetration testing helps to protect your organization from the most pressing threats Live product integration demo of eeye s Retina Network Security Scanner and Core Security s CORE IMPACT Announcement of Black Hat US 2011 Contest Questions and Answers eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 2

About eeye Industry Pioneers Leaders in IT security since 1998 Security Experts Seasoned security professionals Developed one of the first vulnerability scanners Growing and profitable Thought Leaders World-renowned security research team Trusted advisors to organizations across industries and sizes Thousands of customers Some of the largest VM installations in the world Award-Winning Solutions Recognized product leadership Securing companies of all sizes Unparalleled services and support eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 3

About Core Security Leader in real-world security test and measurement solutions 200+ employees on three continents and hiring Rapidly growing: 48% 5-year CAGR 1,300+ customers: Industry leaders and government Top 3 Telecomm Companies Top 3 Network & Communications Equipment Companies 2 of 3 Top Computer Software Companies 2 of 3 Top Pharmaceutical Companies 6 of 7 Top Aerospace and Defense Companies Explosive product growth and technology innovation From 1 offering to 5 in < 24 months www.corecloudinspect: June 2011 eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 4

INDUSTRY CHALLENGES Threat Landscape The organization and sophistication of criminals and their attacks are increasing. Theft of intellectual property from U.S. companies is occurring at a rate of $200B a year. Well Funded. Organized. Financially Motivated. Information and data are the new currency. New vulnerabilities and zero-days are being found daily. Protecting the perimeter is not enough client-side exploits are the biggest entry point. Organized groups causing chaos. eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 5

INDUSTRY CHALLENGES The Real Problem 2011 Trends Managing compliance initiatives takes IT Security Pros up to 50% of their work week. Multiple regulatory standards Increasing client-side exploits Centralized visibility is key to vulnerability management with 73% of organizations having as many as 100 applications deployed. 31% of IT pros do not have enough personnel to patch vulnerabilities - a challenge intensified by lack of integration between scan and patch solutions. Hundreds of applications Decentralized visibility and reporting The need to verify results Unmanaged exception systems A mitigation steps actually working Struggling to meet compliance requirements Constantly changing networks and configurations Source: eeye 2011 VM Survey of 2,000 IT Security Professionals eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 6

Daily Security How do you minimize risk with the lowest investment of time and money? Have I identified all assets managed and unmanaged? Are there known vulnerabilities? Are my systems configured correctly? Are assets protected from unknown or zero-day vulnerabilities? Am I protecting key assets that impact compliance? Have I deployed critical patches? Can I exploit any of these risks? Have I minimized risk? Are processes working? Are my mitigation and remediation steps valid? eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 7

Risk Prioritization High Risk Assessed Vulnerabilities Exploitable Vulnerabilities Verified Exploitable Remediation Patch Mitigation Configuration Low Risk Documented Process Control Managed Risk eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 8

Integrated Security Assessments Vulnerability Findings Unified Vulnerability Management Penetration Testing Integrated Security Assessments eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 9

Assessment Retina eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Value Proposition Best of Breed for Vulnerability Assessment and Penetration Testing Multi Vector Approach to Provide Penetration Testing Verification Integration Into Other Toolsets from SEIMs to Network Management eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com 11

Integration Procedure Installation Install Core Impact First Install Retina Network Security Scanner Create a MS SQL DSN for Retina Operation Perform a Vulnerability Assessment Scan Using a DSN for Output Connect to the DSN and Audits.XML into Core Impact for Importing Perform a Penetration Test Based on Retina Findings eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Retina Network Security Scanner Demonstration eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Integrated Solution Demo Solution Walk-Through eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Video Demo Available To see a video demo of this integration, please visit the eeye Blog or YouTube: eeye Blog: http://blog.eeye.com/general/retina-network-coreimpact-integration YouTube: http://www.youtube.com/watch?v=2jqfie9w7qa eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Come See Us at Black Hat US 2011 Visit eeye & Core at Black Hat! Black Hat US 2011 to be held August 3-4, in Las Vegas eeye & Core Security will both exhibit and look forward to meeting you. Come see us! eeye & Core CONTEST: Both companies will award one Amazon Kindle and corresponding $25 gift card to the first webinar attendees to stop by our booths. Two Kindles to be awarded. One from eeye, one from Core. Hurry to eeye (booth 511) or Core (booth 406) to claim your prize. One prize per person. (Sorry, but one speedy person cannot claim both prizes ). eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Questions and Comments? Please type your questions or comments into the Chat area of the webinar interface. If we don t have time to answer your question(s) during the live presentation, we ll follow up with you after the session. Thanks for your participation! eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com

Contact for More Info Contact eeye www.eeye.com 866.339.3732 sales@eeye.com Contact Core Security www.coresecurity.com 617.399.6980 sales@coresecurity.com eeye Digital Security www.eeye.com Core Security Technologies www.coresecurity.com