Download Better manage and secure your infrastructure

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Zigbee wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Wireless security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Distributed firewall wikipedia , lookup

Service-oriented architecture implementation framework wikipedia , lookup

Computer security wikipedia , lookup

Transcript
DATA SHEET
Better manage and secure your
infrastructure
Focus area:
Network and
Security operations
Delivered as:
Software
Organisation size:
500 users+
Key Benefits
Single system, multiple uses
A simple, single environment
for Security, change and
troubleshooting means
reduced costs and automation
between management
processes
What is Auditor Core?
Rebasoft’s Auditor Core is a software solution designed to improve network and security
operations. Auditor Core is a foundation technology component of Security Auditor that
provides the discovery, classification and correlation components. This means that Core
fundamentally sees what is connected to the network, who is using it and where they are
located.
Auditor Core contains the policy subsystem components that provide the automated policy
facilities that organisations around the world are cross-referencing of users, devices and
location means that organisations can gain benefits in improved security, better change
control and faster troubleshooting.
All of this means:
• You can be in better control of your infrastructure
• You can target resources more effectively
Flexible reports
Targeted reports save time
and effort in getting the
information needed - whether
forensic analysis or long-term
management reporting
Automation and alerting
Build rules to automate alerts
when traffic patterns breach
usage or security policies
Link to users and enddevices
Together with Auditor Core,
Application Auditor enable
cross checking of policies
with users and specified types
and location of end devices
for faster troubleshooting and
improved security
Realise benefits quickly
Probe-less and agent-less,
Application Auditor can be
installed and commissioned
in minutes. Simply point the
exports of syslog at the system
and start reporting
Efficient
Installed as web application,
Application Auditor is easy
to use and maintain, and
makes efficient use of server
resources
What can I use Auditor Core to do?
Rebasoft’s Auditor Core can run as a stand-alone system or integrated with Application
Auditor. Its easy to use capabilities mean that you can:
Improve security:
• Better support risk management processes by discovering, classifying and authorising
devices on your infrastructure
• Improve security by identifying and managing rogue devices
• Identify “invisible” network devices which may represent a security gap
• Ensure compliance with acceptable use policies
• Combat Malware by identifying potential zero-day threats
• Provide policy compliance for BYOD
Speed troubleshooting:
• Faster troubleshooting by helping isolate users and devices quickly and relate to
application usage*
• Integrate to external systems - leveraging and protecting existing investments
Improve capacity/change management:
• Provide improved asset management through physical port planning
• Support change control through improved adds, moves and changes planning
• Provide a complete inventory and history of every device and user connection to the
network
* Requires Application Auditor
DATA SHEET
System Environment
System requirements vary
depending on the number
of sources monitored. The
following requirements are a
guideline:
• Dual core Intel Xeon or
AMD similar processor
• 2GB RAM, although
performance will benefit
from increased RAM
• 160 GB SATA
7200rpm+ disk (or
greater depending on
network size and period
of storage)
• Windows 2003/2008
server or Linux (VMware
supported)
• Internet Explorer V8
or later, Mozilla V3 or
later (JavaScript must
enabled in the browser)
About Rebasoft
Rebasoft delivers nextgeneration software solutions
that enable network and
security operations to become
more effective, reducing risk
whilst increasing operational
efficiencies.
Rebasoft has been built
by network and security
professionals who not only
know how to run and secure
networks, but also see the
limitations in today’s systems
that many of our clients use.
Our aim is to continuously
evolve our solutions, based
on best practice, customer
feedback and business needs.
We deliver out-of-the-box
functionality that delivers real
benefits. Fast.
The result, will change the way
organisations work, delivering
significant cost benefits.
Head Office
21 London Road, Twyford
Berkshire RG10 9EH
t: +44 (0)800 799 7322
e: [email protected]
www.rebasoft.net
How does it work?
Auditor Core starts by collecting data, in real-time, from your infrastructure. Using this
accurate, up-to-date source of information, Auditor Core can then relate this to users, what
kind of device they are using and which location they are in. It also has a powerful policy
sub-system which allows organisations to build automated workflows.
Once the foundation collection of data is underway, Auditor Core starts to categorise and
correlate information. End devices can be passively profiled or, if Application Auditor is
available, profiled using a traffic pattern match. Application ports can also be tested for
responsiveness using “Active Test”
Auditor Core tracks resource usage automatically. This provides benefits when operating a
multi-vendor network infrastructure where respective element managers can only optimise
specific hardware.
Released in V2.7, Auditor Core provides a policy subsystem. This allows organisations to
automate regular tasks triggered by events on the network in real time.
Auditor Core has be designed to be open and easy to connect to external systems. This
means investments can be protected/enhanced. For example an anti-virus system could
be queried to ensure all domain devices have a valid copy and pattern version as each
device connects.
Technology Features
Get control of your infrastructure:
• Powerful policy sub-system for automated actions
• Passive end-device profiling
• Searches users, IP, device, location and more
• Detailed forensic audit trails
• Watchlist to track roaming devices
• Whitelist alerts for unknown devices accessing your
network
• Categorized “Tagging” with external data from HR,
Asset management systems and more
• Capacity planning reports
• Build and track change plans
• Easy to navigate web interface
• Extensive integration and full URL controls
• LDAP user authentication
• Fast deployment, probe-less/agent-less