Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Piggybacking (Internet access) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wireless security wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Service-oriented architecture implementation framework wikipedia , lookup
DATA SHEET Better manage and secure your infrastructure Focus area: Network and Security operations Delivered as: Software Organisation size: 500 users+ Key Benefits Single system, multiple uses A simple, single environment for Security, change and troubleshooting means reduced costs and automation between management processes What is Auditor Core? Rebasoft’s Auditor Core is a software solution designed to improve network and security operations. Auditor Core is a foundation technology component of Security Auditor that provides the discovery, classification and correlation components. This means that Core fundamentally sees what is connected to the network, who is using it and where they are located. Auditor Core contains the policy subsystem components that provide the automated policy facilities that organisations around the world are cross-referencing of users, devices and location means that organisations can gain benefits in improved security, better change control and faster troubleshooting. All of this means: • You can be in better control of your infrastructure • You can target resources more effectively Flexible reports Targeted reports save time and effort in getting the information needed - whether forensic analysis or long-term management reporting Automation and alerting Build rules to automate alerts when traffic patterns breach usage or security policies Link to users and enddevices Together with Auditor Core, Application Auditor enable cross checking of policies with users and specified types and location of end devices for faster troubleshooting and improved security Realise benefits quickly Probe-less and agent-less, Application Auditor can be installed and commissioned in minutes. Simply point the exports of syslog at the system and start reporting Efficient Installed as web application, Application Auditor is easy to use and maintain, and makes efficient use of server resources What can I use Auditor Core to do? Rebasoft’s Auditor Core can run as a stand-alone system or integrated with Application Auditor. Its easy to use capabilities mean that you can: Improve security: • Better support risk management processes by discovering, classifying and authorising devices on your infrastructure • Improve security by identifying and managing rogue devices • Identify “invisible” network devices which may represent a security gap • Ensure compliance with acceptable use policies • Combat Malware by identifying potential zero-day threats • Provide policy compliance for BYOD Speed troubleshooting: • Faster troubleshooting by helping isolate users and devices quickly and relate to application usage* • Integrate to external systems - leveraging and protecting existing investments Improve capacity/change management: • Provide improved asset management through physical port planning • Support change control through improved adds, moves and changes planning • Provide a complete inventory and history of every device and user connection to the network * Requires Application Auditor DATA SHEET System Environment System requirements vary depending on the number of sources monitored. The following requirements are a guideline: • Dual core Intel Xeon or AMD similar processor • 2GB RAM, although performance will benefit from increased RAM • 160 GB SATA 7200rpm+ disk (or greater depending on network size and period of storage) • Windows 2003/2008 server or Linux (VMware supported) • Internet Explorer V8 or later, Mozilla V3 or later (JavaScript must enabled in the browser) About Rebasoft Rebasoft delivers nextgeneration software solutions that enable network and security operations to become more effective, reducing risk whilst increasing operational efficiencies. Rebasoft has been built by network and security professionals who not only know how to run and secure networks, but also see the limitations in today’s systems that many of our clients use. Our aim is to continuously evolve our solutions, based on best practice, customer feedback and business needs. We deliver out-of-the-box functionality that delivers real benefits. Fast. The result, will change the way organisations work, delivering significant cost benefits. Head Office 21 London Road, Twyford Berkshire RG10 9EH t: +44 (0)800 799 7322 e: [email protected] www.rebasoft.net How does it work? Auditor Core starts by collecting data, in real-time, from your infrastructure. Using this accurate, up-to-date source of information, Auditor Core can then relate this to users, what kind of device they are using and which location they are in. It also has a powerful policy sub-system which allows organisations to build automated workflows. Once the foundation collection of data is underway, Auditor Core starts to categorise and correlate information. End devices can be passively profiled or, if Application Auditor is available, profiled using a traffic pattern match. Application ports can also be tested for responsiveness using “Active Test” Auditor Core tracks resource usage automatically. This provides benefits when operating a multi-vendor network infrastructure where respective element managers can only optimise specific hardware. Released in V2.7, Auditor Core provides a policy subsystem. This allows organisations to automate regular tasks triggered by events on the network in real time. Auditor Core has be designed to be open and easy to connect to external systems. This means investments can be protected/enhanced. For example an anti-virus system could be queried to ensure all domain devices have a valid copy and pattern version as each device connects. Technology Features Get control of your infrastructure: • Powerful policy sub-system for automated actions • Passive end-device profiling • Searches users, IP, device, location and more • Detailed forensic audit trails • Watchlist to track roaming devices • Whitelist alerts for unknown devices accessing your network • Categorized “Tagging” with external data from HR, Asset management systems and more • Capacity planning reports • Build and track change plans • Easy to navigate web interface • Extensive integration and full URL controls • LDAP user authentication • Fast deployment, probe-less/agent-less