Information security management system of a corporate network

.Be approved by management;security policy or policies specifies particular information security control objectives or requirements in one or more documents.

Information security management system of a corporate network

Дипломная работа

Компьютеры, программирование

Другие дипломы по предмету

Компьютеры, программирование

Сдать работу со 100% гаранией
its own data collection service, it supports a third-party application programming interfaces for customers to execute their own scripts, and supports multiple formats for import from third-party data collection products. Rsam also supports remediation and exception management with good workflow, and the risk management function has the capability to create scoring and correlation among objects, survey responses and control states. Organisations seeking to automate operational risk assessment, audit automation and IT control management should consider Rsam.products main strengths are the following.

1.Strong, flexible survey functions with a large amount of predefined content, and 30 or more predefined surveys;

2.Good workflow to manage the identification and remediation of threats;

.An application programming interface that customers have used to integrate with other third-party data collection products;

.Formal integration with 17 commercial scanners;

.Flexible drag-and-drop customization for interface and reporting., the product has the following problems.

.Rsam lacks a native general computer control collection capability;

.No predefined security configuration policies.'s Control Compliance Suite (CCS) is specifically focused on IT GRCM and comprises three modules: Policy Manager, Standards Manager and Response Assessment Manager. Automated general computer control is provided by the CCS Standard Manager, which is widely deployed by customers for configuration policy compliance in the security operations role. Symantec has the largest installed base of security configuration policy compliance customers, which is spread across its CCS Standards Manager and Enterprise Security Manager products. Symantec is selling Control Compliance Suite into this installed base, and is beginning to sell it to buying centres that are oriented toward risk and policy management; however, automated computer control measurement often isn't the initial focus of these other buying centres. The solution is not optimal for organisations that want integration with third-party assessment technologies, because Control Compliance Suite does not provide out-of-the-box integration with non-Symantec sources. Control Compliance Suite is most appropriate for Symantec-centric organisations, but not recommended for organisations with top-down EGRC requirements.products main strengths are the following.

1.Automated general computer control definition and measurement, especially for Symantec products;

2.Largest installed base of general computer control and measurement users;

.Potential to capitalize on a large service organisation;

.Symantec has strong native security configuration assessment capabilities, and also has native network vulnerability assessment functions., the product has the following problems.

1.Use cases that aren't focused on Symantec technologies for configuration assessment;

2.Third-party general computer control support is limited to generic interface - no formal support of specific third-party sources;

.Symantec integrates with third-party ticketing systems, but has only basic support for remediation workflow within CCS;

.Mostly compliance reporting with only a light treatment of risk.provides services and software products primarily to the U.S. federal government, and is still in the early stages of its expansion into commercial segments. Telos Xacta IA Manager is primarily oriented to compliance with government regulations, such as the U.S. Federal Information Security Management Act (FISMA), automated general computer control measurement, risk assessment (of technical controls) and tracking mitigation activities. Telos has expanded Xacta content for common commercial regulations and control frameworks, but the company still lacks significant experience in servicing commercial organisations. U.S. federal agencies with FISMA requirements should put Telos on their shortlists for IT GRCM products.products main strengths are the following.

1.Appropriate for organisations that need to comply with government regulations;

2.Strong support for automated general computer control measurement and mitigation workflow;

.Comprehensive asset-oriented technical assessment, survey evaluation, and reporting. general computer control - strong native capability in combination with formal integration, with a few major scanners., the product has the following problems.

1.Development of policy and control framework content for commercial regulations;

2.Little support for some aspects of commercial use cases, such as audit support;

.No policy distribution and attestation function.IT GRCM capability complements Trustwave's other business units, which specialize in consulting and PCI compliance. Trustwave GRC has great flexibility through customization, but little out-of-the-box content. While the product does provide some out-of-the-box mappings into common regulations and frameworks, there are gaps for major regulations and control standards. The product lacks a native automated general computer control collection capability, and it does not support out-of-the-box integrations with common third-party products to import configuration and vulnerability data - although there is a general data integration interface. Trustwave is developing a new technology base for its IT GRCM offering that will support unified compliance framework. Trustwave will need to carry both products and define a migration path to the new technology.products main strengths are the following.

1.Product is a good fit for organisations that are looking for a flexibility, and that wish to have consultants customize and configure their IT GRCM functions;

2.Surveys, workflow and policy attestation support control self-assessment., the product has the following problems.

1.Although Trustwave GRC supports drag-and-drop associations between controls and control objectives, it doesn't provide out-of-the-box mappings into common regulations and frameworks;

2.The product doesn't provide native general computer control collection, nor does it support out-of-the-box integrations with common third-party products to import configuration and vulnerability data (although it can be customized to do so);

.Trustwave will be moving to a new technology base - and it will need to carry both products and define a migration path to the new technology.

 

1.4.2 The most integrated existent IS management solution

Information security management products presently offered on the Ukrainian market include mostly the narrow solutions: risk managers, compliance scanners and penetration tests (network perimeter tests).most integrated IS management solution present in the Ukrainian market today is Lumension Endpoint Management and Security Suite (L.E.M.S.S.) produced by Lumension Security, Inc., a worldwide leader in operational security. The company became famous due to its developments, integrations and marketing of endpoint security software solutions that help businesses protect their critical information and manage the most important risks in the computer network assets.product itself is a composition of five special-purpose sections: vulnerability management, endpoint protection, data protection, compliance and it risk management, endpoint operations. The fig. 1.5 below is a generalised scheme of the products structure from the official datasheet [13].

. 1.5. The official illustration of the Lumension Endpoint Management and Security Suite structure

of the sections are subdivided into product modules. Endpoint Operations Product Modules are Patch and Remediation, Security Configuration Management, Enterprise Reporting. Endpoint Security and IT Risk Management Product Modules are Application Control, AntiVirus, Device Control, Risk Manager. The structure is described more in detail below.

1.Endpoint operations product modules

1.1.Patch and Remediation: Reduces corporate risk and optimizes IT operations through the timely, proactive elimination of operating system and application vulnerabilities across all endpoints and servers.

1.2.Security Configuration Management: Ensures that endpoints are securely configured and in compliance with industry best practices and regulatory mandates.

.3.Enterprise Reporting: Provides centralized visibility of IT assets and consolidates vulnerability and configuration data across the enterprise.

2.Endpoint security and it risk management product modules

2.1.Application Control: Enables the enforcement of application usage policies to ensure that only software that is explicitly authorized or trusted is allowed to execute.

2.2.AntiVirus: Provides comprehensive protection against all malware including viruses, spyware, Trojans and adware.

.3.Device Control: Identifies all removable devices that are now or have ever been connected to your endpoints and enforces device / port access and data encryption policies to prevent data loss and/or theft.

.4.Risk Manager: Automates compliance and IT risk management workflows and provides necessary visibility of people, processes and technology across the entire organisation. Imports scan data from multiple Lumension products and 3rd party scanning devices to its standalone interface..E.M.S.S. is positioned as a solution that will provide an extended control over the corporate workstations, at the same time reducing the control complexity by centralising the management functions and automating the network data mining.s rapidly changing IT network is more distributed and virtual than ever sensitive data is often stored on remote endpoints, such as laptops and mobile PDAs, and accessed through public Wi-Fi networks con

Похожие работы

<< < 3 4 5 6 7 8 9 10 11 > >>