50 likes | 64 Views
Assess, allocate resources, automate deployments, manage configurations, comply with regulations, and enhance security policies to maximize ROI. Analyze assets, identify risks, and achieve a high level of security.
E N D
What resources do we have to allocate? • How do we assign remediation tasks? • How do we automate patch deployments? • What assets do we have? • What is running on those assets? • What is our risk level? • What are the high-risk areas? • How does risk compare to our security policy? • Have we achieved an acceptable level of security? • Are we compliant with our internal security policies? • What are the areas of non-compliance? Security Snapshot Assessment MaximizingReturn on Security Investment MaximizingReturn on Security Investment
Configuration Management • The rising number of vulnerabilities demands a review of the processes and resources needed to effectively deal with increased exposure -- Source: CERT Data. • This rapid acceleration from vulnerability disclosure to widespread attacks represents today’s most critical network security risk
Business Continuity • The integration of enterprise applications (ERP, SFA, Financials, Call Center, Help Desk, etc.) are creating complex business processes that require 24x7 availability • These business processes rely on network devices within an infrastructure • Servers, routers, switches, etc. • An attack on one network device can have ripple affects on a business process, shutting down services across a network, and crippling business continuity
Regulatory Compliance • Many companies now face board-level inquiries into their security practices • Scope of compliance is now a business and technology issue • Security programs must be developed, implemented and maintained • Identify and assess the risks threatening customer data • Generate timely, accurate and actionable information about their exposures • Internal policies must be created, implemented and enforced • Identify which technologies, methods and people are most vulnerable • Have a consistent baseline of questions around standards, practices, configurations and vulnerabilities GLB
Security Puzzle • Eliminate losses associated with events that can be identified and corrected • Accurately identify and fix network-wide vulnerabilities expeditiously • Ongoing, proactive network threat reduction • Reduce manhours required to correct issues • Executive level reporting / Verification of threat reduction process Security Policy Enforcement Security Snapshot Assessment Asset Inventory RemediationManagement Security Management ConfigurationManagement Post-Attack Forensics Business Continuity Host-level Threat Mitigation