Increase and improve security

Configuration automation fills the vulnerability gap


 

Facilitate risk management through an enforced ideal state for all devices, servers:


  • Any attempt to change registry, files, or application setting prevented in real-time
  • Automatically prevents or resolves issues rising from corruption, user carelessness, disabling BITS and external breaches
  • Removes botnets, spyware and other unauthorized outside influences on boot up
  • Enforces policies and standards with regard to application and application settings
  • Supports multiple SANS critical controls (the basis for several compliance bodies) including: CC#3:"Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers"
  • Reduces risk of tampering at server level through immediate dis-allowance of unauthorized changes


Configuration(Repair/Recovery/Reimage) may not be a traditional security solution, but as an automated component in a larger initiative, enables key security features that are not only compliance requirements, but keep the operating environment running smooth over the course of the lifecycle. And, for that reason alone, should be included as part of any organization’s next generation security arsenal.


The SANS Institute says: "Configuration management is a growing discipline and can provide a solid backbone in order to maintain secure operations.;it means how your network devices are configured, or what version of an application you are running; it means what was the last patch installed on an device in the network, or the baselines hardware and applications that run on your devices...all of which have direct bearing on security initiatives.


In the absence, or more likely in support of anti-virus protection, initiating some sort of automated repair/recovery program seems to be a progressive alternative growing in acceptance and popularity. If you can't keep up with every threat potentially violating your network, the next step is to neutralize it by automatically purging it from your system This is achieved through the continuous maintenance and reapplication of an ideal state. Any time an unauthorized outside influence tries to change a registry, attach itself to a file, or embed itself in a supported application, the system rejects these modifications in favor of the ideal state. After every PXE reboot of a workstation, or device, the automated system reapplies the latest approved image.


Hackers don’t sleep, so why should your security? Unless an IT department is staffed around the clock, there is a certain amount of time that users are on their own. And the most blatant issues (the ones that gain headlines) don’t start as brute force attacks—they are sneaky and insidious that can lay dormant for days or months (like Heartbleed); so that middle of the night emergency call may never come until it’s too late. By automating the configuration-break/fix process, organizations remove a significant burden and reinforce security measures across the enterprise.



LET US SHARE HOW
Download Center