BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

The Value of a Management Console

Post by Morey Haber August 18, 2010

My background is in Network Management Systems (NMS). In the late 1990’s, the buzz words for NMS were around a “single pane of glass” management. This referred to a single CRT computer screen showing all of the relevant network management information in one view. The inherent value in this approach was the ability to see all of the relevant network information and status at a quick glance. For enterprise clients, this quick glance included “management by exception” since the single pane of glass should only show aspects that were faulty or out of tolerance versus all elements in the network. If they did show everything, the view generally became cluttered and lost its value as a quick glance tool.

The value and philosophy of those management consoles still holds true today for vulnerability management. Reporting aspects of vulnerability assessment are designed to show you which devices are not within acceptable parameters; and management console dashboards highlight the highest risk assets and vulnerabilities. In essence, they are performing the same functions of management by exception using vulnerabilities and security as filtered disciplines.

Thus, the inherent value of a management console is how much relevant information it can bring together into that single pane of glass and then allow detailed drill down of information when requested. The correlation of relevant information is equally as important in establishing this value. Consider a vulnerability management console that indicates your highest risk assets and which vulnerabilities are present. Every vendor in the vulnerability management industry has the view today. The technology for which is over a decade old.

Now consider that same single pane of glass that also tells you what attacks that asset has experienced, what malware has been detected, and all of the relevant asset information including software installed and even processes running. The value of this management console has just increased because it extends relevance of the data to not only show what is vulnerable, but is also showing how that device is interacting with the environment from a security and asset management perspective. If we now couple that same view with the ability to manage our regulatory compliance initiatives and even offer two way communications to those devices that need remediation, our single pane of glass now provides a value that has never been realized before. A single management console can now provide the entire lifecycle of vulnerability management for assets from discovery, assessment, reporting, and remediation.

So I would like to pose this question to my readers for comments:

Do you use a management console for a lifecycle approach to vulnerability management? If not, why?

Solutions are available today that can realize the visions of a decade ago and simplify your entire approach to vulnerability management. If you’re using a solution that only reports vulnerabilities, eEye can truly provide your business the value it has been striving for in the next generation management consoles.

Tags:

Leave a Reply

Additional articles

BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,

Heartbleed – When OpenSSL Breaks Your Heart

You’ve likely heard about the recent OpenSSL vulnerability, CVE-2014-0160, dubbed Heartbleed. The main takeaway of this vulnerability is that attackers can use this to obtain things like secret keys used for X.509 certificates, user names and passwords, instant messages, emails, and other highly sensitive information. For a technical analysis of the bug, check out this…

Post by BeyondTrust Research Team April 8, 2014
Tags:
, , ,