BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Going Beyond SCAP for Benchmark Compliance

Posted February 24, 2014    Morey Haber

SCAP configuration compliance assessments, commonly referred to as “Benchmark” assessments, are traditionally cumbersome tasks when multiple benchmarks have to be tested against multiple targets at the same time. For the vast majority of SCAP-certified tools, this means executing one benchmark at a time against a valid host(s) and reviewing the results. The same targets often require multiple benchmarks, necessitating multiple scans and jobs that can eat up a lot of time. We’ve solved this problem with the Configuration Compliance Module, part of the Retina CS Enterprise Vulnerability Management capabilities under the BeyondInsight IT Risk Management Platform.

The Configuration Compliance Module includes the capability to select multiple SCAP Benchmarks against multiple targets (i.e., “Smart Groups”) to assess each and every target for compliance. The results comply with SCAP standards for XCCDF, ARF, Micro AFR, and NIST ARF export per benchmark, even though all benchmark assessments occur simultaneously. For example, a user can select multiple benchmarks for a group of assets …

SCAPblog-img1

… and then schedule the benchmark assessments to execute in succession – completely  hands free! Finally, when the job is done, the data can be exported into several report formats or viewed online:

SCAPblog-img2

Benchmark assessments for configuration compliance just became a whole lot easier with BeyondInsight. Target groups can easily be defined, multiple benchmarks executed simultaneously, and the results exported after the scan to any format required for DIACAP, FISMA or NIST compliance.

BeyondTrust is simplifying configuration compliance, making it easier to meet standards and simpler to manage the security requirements you face on a daily basis. We would be happy to demonstrate how this can save you time and resources while helping to fulfill your compliance mandates.

> Learn more about the Configuration Compliance Module

Tags:
, , , , , ,

Leave a Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,