With increasingly sophisticated attacks on the rise, the ability to quickly manage network vulnerabilities is imperative. Vulnerabilities if left undetected pose a serious security threat to enterprise systems and can leave vital corporate data exposed to attacks by hackers. For business organizations, it means extended system downtimes and huge loss of revenue and productivity.
Our vulnerability management (VM) lifecycle is delivered step by step to ensure that vulnerabiltiy is being managed properly. These 5 steps are:
- Step 1 – Assets Discovery
- Step 2 – Vulnerability Assesment
- Step 3 – Report
- Step 4 – Remediation
- Step 5 – Verification
Our VM complete features are as follows:
Hardware & Software Inventory Auditing
Our VM solutions intelligently scans for Hardware and Software inventory details for all assets and reports them as a part of the scanned asset details. This automates the pain-staking task of manually auditing your inventory, at the same time ensuring that inventory resources in the network assets are in line with the company’s security policies.
Vulnerability Assessment is a process of identifying the effectiveness of an enterprise network’s security posture. The process qualifies the type of assets in the network, the probable areas for compromise and how to remediate vulnerabilities and protect assets. The core function of our VM is vulnerability scanning & detection of industry-known vulnerabilities on network assets and to offer remediation solutions. Our VM solutions enables you to scan assets and asset groups, view vulnerable assets and their complete security information, e-mail scan reports and take appropriate action to safeguard your assets based on the remediation solutions provided.
Port Scanning – Open Ports Detection
Our VM solutions includes a port scanning which plays an important role in detecting and displaying all open ports on every discovered asset throughout the network. It uses TCP & UDP port scanning techniques to accurately detect them and the service running on these ports. A periodic scan and analysis of open ports will allow you take control so that loss or exposure of sensitive information in your network can be prevented.
Windows User Groups & Auditing
Knowing windows user accounts, their access privileges and other account details present in an asset namely number of logins, last logon time etc., provides sensitive security information that can be tracked to prevent unauthorized access. Similarly, the various User groups present in discovered assets and the members of each group too add value to the risk identification process. Our VM solution provides an easy to use dashboard with Windows Users and Groups information
Windows Change Management
In Windows systems, there are constant changes happening to files, folders and registry entries. Though many of these changes are due to normal processes like patch updates or system modifications, some of the changes could be the result of viruses or malicious hacker attacks that can introduce critical vulnerabilities to these Windows systems, which cause system downtime. In our VM solution, change management of Windows machines are governed by profiles. Profiles are nothing but custom templates that are defined by users to capture a list of important files, folders and registry entries that need to be periodically tracked for changes during every scan. Change tracking can be done on Assets or Asset Groups. Multiple profiles can be associated to the same asset or asset group.
With the number of security threats and vulnerabilities on the rise, the hot fixes and updates released by software vendors to address these vulnerabilities is also increasing manifold. It becomes an extremely arduous task for security administrators to cope with the volume and frequency of such patches as the amount of time and effort involved in identifying, testing and installing problem-free patches on vulnerable systems is enormous. Our VM solution includes a patch management feature as well that support windows and linux platforms. It identifies missing patches/packages and service packs on vulnerable assets and facilitates downloading patches from vendor site and deploying them on systems that require them – all from a central location. Using our VM solution patch management feature we will be able to deploy missing patches, view patch details, deploy service pack, and view patch dashboard.
Reports are essential to provide insights on historical data, trends and to facilitate statistical analysis of network behavior. They are useful when security administrators have to submit periodic information on the security posture of the network to IT managers and auditors to make well-informed security decisions. Reports also ensure that the company’s IT and regulatory policies are complied with.
Our VM solution comes with a set of comprehensive reports to aid security administrators. There are also provisions to define custom reports based on select criteria. Reports can also be generated on vulnerability scan completion and sent to desired e-mail IDs. They can be exported to PDF or CSV format and can be imported by other reporting tools like Crystal Reports, etc.
Our VM solution is able to provide following reports:[bulletlist]
- Executive Report
- Remediation Report
- Differential Report
- Service Packs and Pathes Report
- File and Registry change report
PCI DSS Compliance
The PCI DSS stands for Payment Card Industry Data Security Standard. It is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. It represents a set of rules that need to be adhered to by businesses that process credit cardholder information, to ensure data is protected.
Our VM solutions can help you weigh the effectiveness of your organization’s PCI DSS compliance efforts. It can automate the process of PCI DSS Compliance by scanning your network for vulnerabilities, determining if your network security is compromised and reporting whether the systems are compliant or not-compliant to the Payment Card Industry – Data Security Standards (PCI DSS).