BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Appliance, Software, or SaaS: Choosing the Best Deployment Option

Posted September 1, 2011    Morey Haber

Businesses tend to prefer appliances or software for new solution deployments. There are many reasons why from ease of deployment, to complete ownership of the host and the application.  Unfortunately, sometimes departmental whims are not always the best solution for the company. There are several factors from deployment to security policies that may warrant a different choice. 

As a part of the decision and justification process, this simple matrix enables you to prioritize your requirements and answer questions commonly overlooked during product selection. In addition, answering the questions first can help an eEye Security professional properly architect your solution and provide a more accurate quote for deployment costs. It is important to note that if you are only looking for external scanning, then a SaaS solution is your best choice for regulatory compliance initiatives like PCI. There is no reason to complete the matrix unless business requirements dictate external and internal scanning. Then, choosing the best internal deployment model makes sense.

Please score each business criteria below and grade each of them on a scale of 1 to 5 (1 = low, 5 = high). Then total each column. The highest score will provide your business the guidance necessary for the correct solution.

Grade Appliance Grade Software
Rapid Deployment Lower Cost for Licensing Only
Easier Maintenance and Lower TCO Flexible Deployment with Software Scanners including Virtual Machines
Easier Procurement Process Limited Raised Floor Rack Space
Hardened Appliance with Minimal Risk Surface Existing Server Reallocation and Resource Sharing
Geographical Deployment Unlimited Scalability
Different Budgets, Hardware Only Different Budgets, Software Only
Optimized Policy and Server for Operations, No Tweaking Policy Limiting New Hardware on a Network
Hardened and Embedded Operating System Licensing of Operating System and Database (if needed)
Policy Limiting New Software on a Network Non-Standard Architectural Requirements and Ports
Physical Infrastructure Preferred Private Cloud Initiatives (Virtualized Software Deployment)
TOTALS TOTALS

For more information on how eEye solutions can meet your Unified Vulnerability Management needs, please click here. Our solutions are flexible to meet your deployment requirements andeEye can provide software, appliances, SaaS, or even assistance for your virtual machines to stream line your implementation.

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,