The BelSecure Module automatically does a vulnerability assessment of your IT systems, checks security policies, configuration settings, and discovers other information about the host such as anti-virus status, application versions, security patches, user accounts and more. The policy settings are automatically compared with consensus benchmarks from NIST (USGCB and FDCC), which allow IT managers to automatically determine the security status of their IT assets in advance of an attack.
All of this vulnerability and configuration data is automatically collected, on a daily basis, in BelSecure’s central repository, or CMDB.
Why are configurations important for IT security?
Many current threats, including Advanced Persistent Threats, are not stopped by perimeter security systems such as firewall and anti-virus systems. Setting and monitoring configurations based on consensus benchmarks is a critical step because this is a pro-active way to avoid many successful attacks.
Click here to request our white paper, “ Securing the Enterprise – Enterprise-wide, standards-based, continuous monitoring of automated security controls“, which describes this in more detail.