The Center for Internet Security
|
|
- Kerry Weaver
- 6 years ago
- Views:
Transcription
1 The Center for Internet Security Measurably reducing risk through collaboration, consensus, & practical security management
2 Content of this Presentation: I. Background II. Univ. of CA Schools Rights and Benefits as a Member III. Consensus Benchmarks - their value for system and network security IV. Assessment Tools Primarily CIS CAT - use cases & features - specs & system requirements V. Consensus Security Metrics VI. Security Software Certification VII. Member Support & Contact Information VIII. Q & A
3 Background
4 The Center for Internet Security (CIS) Formed in October 2000 A not-for-profit consortium of users, security consultants, and vendors of security software (Members) Convenes and facilitates teams developing consensus Benchmarks for system & network security configuration Developed and distributes the Configuration Assessment Tool (CIS-CAT) to its members Convenes and facilitates teams developing consensus definitions for information security metrics
5 Univ. of CA Schools' Rights & Benefits of Membership
6 Benefits of Membership: Unlimited Number of Univ. of CA Schools Users The right to distribute and use all of the resources throughout Univ. of CA Schools Access to Members-Only CIS-CAT Tool (Configuration Assessment Tool) Member Updates - timely notification of new releases & updates
7 Benefits of Membership: Additional Benefits Members Only Site Unlimited number of Univ. of CA Schools users have access to the Members website for: Configuration Assessment Tool (CIS-CAT) (including technical specifications and User s Guide); XML Benchmark versions (including XML Editing Guide); Participation on the Member discussion forums; and Register at Support As Members, Univ. of CA Schools users receive free Benchmark/CIS-CAT implementation support: support@cisecurity.org
8 Consensus Benchmarks
9 The Consensus Benchmarks Are: Recommended technical control rules/values for hardening OSs, applications, and network devices. Downloaded hundreds of thousands of times per year. Distributed in.pdf to the general public (to propagate their use/adoption worldwide) Distributed in XML (XCCDF) format to Members. Used by thousands of organizations worldwide as the basis for their security configuration policies and the standard against which to compare them.
10 The Security Value of Consensus Benchmarks The Problem: The vast majority of cyber attacks exploit known software flaws for which a patch or security configuration control is known. The Solution: Research and Case studies show that 80-95% of known vulnerabilities are blocked by the technical security controls and actions recommended in the consensus benchmarks. (research reports & case studies are on the web site)
11 The Compliance Value of Consensus Benchmarks The Problem: FISMA, PCI, and other regulations require adoption of configuration best practices. The Solution: The benchmarks distributed by are consensus best practice standards for security configuration developed and accepted by business/industry and government internationally.
12 How the Consensus Process works: Each Benchmark development project is part of the community projects. To view or join community projects please go here: Each project includes volunteer subject matter experts who discuss configuration recommendations for the Benchmark(s). The technical discussions on these projects define the content of the Benchmark(s). Univ. of CA Schools users and subject matter experts are invited to participate in the Consensus Process. To learn more about how to get involved or to volunteer, go here: or contact us at
13 Univ. of CA Schools users and subject matter experts can be involved in any of the following roles: Benchmark Leader creates draft content for a new or significantly updated Benchmark and presents the draft to the consensus team for discussion and review. (This is the only formally assigned role) Contributor takes an active role in defining and extending Benchmark content in the consensus process. Tester has the resources available to technically implement and test the recommendations in the Benchmark to ensure validity, and provides feedback to participants on the list. Reviewer reviews the Benchmark draft for syntactical, grammatical, aesthetic, and readability issues.
14 U.S. Federal Government Agencies and Commercial Vendors are Fully Engaged in the Consensus Process Government Agencies NSA DISA NIST Commercial Vendors Microsoft IBM HP Juniper Cisco Novell Oracle Checkpoint Apple Red Hat
15 54 Benchmarks are Now Available In.pdf Format on the Public Web Site: Twenty-two are for operating systems Twenty-five are for middleware and applications Six are for network devices One Mobile Device
16 Operating System Benchmarks WinXP Pro (SP1/SP2) Windows Server 2003 Windows Server 2008 Windows 2000 Pro Windows 2000 Server Windows 2000 Windows 7 Windows NT Mac OS X 10.5 (Leopard) Mac OS X 10.4 (Tiger) FreeBSD 4.1 Solaris 10 11/06 and 8/07 Solaris Sun Solaris 10 Benchmark v5.0.0 HP-UX 11i v2/v3 update 4 AIX Red Hat Linux 5 (RHEL 5) Red Hat Linux 4 (for RHEL 2.1, 3.0, 4.0 and Fedora Core 1,2,3,4, & 5) SUSE Linux 9/10 Slackware Linux 10.2 Debian Linux Novell OES: Netware
17 Application Benchmarks Apache Web Server 1.3/2.2 OpenLDAP 2.4 Apache Tomcat Opera Benchmark v1.0.0 Apache HTTP Server Oracle Database 8i Benchmark v3.0.0 Oracle Database 9i/10g BIND Oracle Database 11g Exchange Server 2003 Safari Benchmark v1.0.0 Exchange Server 2007 SQL Server 2005 FreeRADIUS SQL Server 2000 IIS 5/6IBM DB Sybase ASE 15.0 Microsoft Office 2007 Virtual Machine Mozilla Firefox 3.5 VMWare ESX Server 3.0 MySQL 4.1/5.0/5.1 VMWare ESX Server 3.5 Novell edirectory 6.5 Xen Server 3.2
18 Network Device Benchmarks Cisco IOS Router Cisco ASA, FWSM, and PIX Check Point Firewall Juniper OS Benchmark v1.0.0 Multi-Function Devices Wireless Networks Mobile Device Benchmarks Apple iphone OS
19 Benchmark Roadmap Apple OS Benchmark Blackberry Enterprise Server Benchmark Cisco Firewalls Benchmark Cisco IOS Benchmark IIS 7 Benchmark v1.0.0 IBM AIX Benchmark v1.0.0 Internet Explorer 8 Benchmark v1.0.0 Microsoft SQL Server 2005 v2.0.0 Microsoft Windows 2003 Benchmark v3.0.0 Microsoft Windows XP Benchmark v3.0.0 MySQL Benchmark v2.0.0 Red Hat Enterprise Linux Benchmark v3.0.0 SuSE Enterprise Linux Benchmark v3.0.0 VMWare ESX Server 4.1 Benchmark v1.0.0 Microsoft SQL Server 2008 Benchmark v1.0.0 Microsoft Office SharePoint Server Benchmark v1.0.0
20 21 of the 54 Benchmarks are Available To Members Only In Machine-Readable XML (XCCDF) Format For Use With CIS-CAT And Tools that Members Develop The XML Benchmarks are Available On the Members Web Site at:
21 Assessment Tools Primarily CIS-CAT (CIS-Configuration Assessment Tool)
22 CIS-CAT Tools Use Cases Improve security awareness by comparing security of out-ofthe-box vs. hardened systems. Create standard configuration images for hardening systems prior to deployment Periodically audit and/or routinely monitor the configuration of individual production systems compared to the Benchmark and/or enterprise policies. Audit/monitor multiple systems simultaneously using system management utilities (CIS provides supplemental scripts that support CIS-CAT in assessing multiple systems simultaneously.)
23 CIS-CAT (CIS-Configuration Assessment Tool) Host based, configuration assessment/audit software tool Available ONLY to Members distributed via the Members web site Distributed with GUI & CLI The ONLY tool CIS is currently developing & supporting Requires JRE v1.5 or later CIS-CAT and JRE can reside on target system, removable drive, or network drive, provided it is accessible from the target of evaluation.
24 CIS-CAT A Java tool that reads the Benchmark XML files (XML files specify the Benchmark rules and values, and the checks that the tool executes to assess & report configuration status) Also reads customized XML files - compare the configuration of systems with both the Benchmarks and customized configuration policies NIST validated FDCC Scanner ( cis.cfm)
25 CIS-CAT Supports These Benchmarks: Apache Tomcat Benchmark v1.0.0 Apple OSX 10.5 Benchmark v Debian Linux Benchmark v1.0.0 HP-UX 11i Benchmark v1.4.2 IBM AIX Benchmark v1.0.1 Microsoft Windows 2003 MS DC Benchmark v2.0.0 Microsoft Windows 2008 Server Benchmark v1.0.0 Microsoft Windows 7 Benchmark v1.0.0 Microsoft Windows XP Benchmark v2.0.1 Oracle Database 11g Benchmark v1.0.1 Oracle Database 9i-10g Benchmark v2.0.1 RedHat Enterprise Linux 4 Benchmark v1.0.5 RedHat Enterprise Linux Benchmark v1.1.2 Slackware Linux 10.2 Benchmark v1.1.0 Solaris Benchmark v4.0.0 Solaris 10 Benchmark v2.1.3 Solaris Benchmark v1.3.0 SUSE Linux Enterprise Server 10 Benchmark v2.0.0 SUSE Linux Enterprise Server 9 Benchmark v2.0.0 VMware ESX 3.5 Benchmark v1.2.0 Mozilla Firefox Benchmark v1.0.0
26 CIS-CAT Documentation README file in the download package Specification document distributed via the members site. CIS-CAT Users Manual distributed via the members site. A guide to assist users in modifying the Benchmark XML files for use with CIS-CAT Additional guidance is provided via the member discussion forum
27 CIS-CAT Roadmap XCCDF Target Completion Date VMware ESX 4.1 Benchmark v1.0.0 December 2010 Microsoft SQL Server 2008 Benchmark v1.0.0 December 2010 IBM AIX Benchmark v1.0.0 December 2010 Windows Server 2003 Benchmark v3.0.0 December 2010 Apple OS Benchmark v2.0.0 December 2010 Red Hat Enterprise Linux 5.4 Benchmark v3.0.0 December 2010 Sun Solaris 10 Benchmark v5.0.0 October 2010
28 Other Assessment Tools Currently Available Router Audit Tool (RAT Tool) Currently being updated. Help us test it. Apache Benchmark Tool Will be updated once Apache Benchmark is complete Use CIS-CAT instead of the following tools as they are unsupported and no longer maintained. Perl tools for Unix operating systems Oracle Database 8i tool
29 Security Software Certification
30 Certification Overview CIS Certified Security Software Tested to accurately measure and report system status against recommendation in CIS Benchmarks Why use Certified Security Software? Independently validated to accurately audit systems CIS Benchmark content integrated into software Enterprise scale security auditing
31 Consensus Security Metrics
32 Security Metrics Initiative Organizations struggle to make cost-effective security investment decisions; Information Security Professionals lack widely accepted and unambiguous metrics for decision support. To address this need, established a consensus team of over 100 industry experts from leading commercial, government and academic organizations of varying sizes. The result was a set of unambiguous, user originated, consensus-based standard metrics and data definitions that can be used across organizations to define, collect and analyze data on security process benefits and outcomes.
33 Example Data Set
34 Example Metric Definition
35 Security Metrics Definitions There are 20 Security Consensus Metrics Definitions covering 6 important business functions: Incident Management; Vulnerability Management; Patch Management; Application Security; Configuration Management; and Financial Metrics Download the Document here:
36 Four simple goals: Phase II Consensus Effort Enhance existing Consensus Security Metrics v1.0.0; Develop additional community metrics and taxonomies; Develop a prescriptive, quick-start implementation guide; Develop electronic schemes for sharing metric definitions, data sets and results. Accelerate vendor adoption and integration of standard metrics on behalf of end-organizations. For more information about the Security Metrics or to be involved in the metrics consensus process, contact Steven Piliero, Chief Security Officer, at spiliero@cisecurity.org
37 Member Support & Contact Information
38 Member Support for Univ. of CA Schools As a benefit of membership, Univ. of CA Schools users are eligible to receive support service, at no charge, from staff: support@cisecurity.org Telephone, after initial contact Discussion forums on Members web site Primary Membership Contact Michelle Vogeler, Representative, mvogeler@cisecurity.org
39 Q & A
The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security
The CIS Security Metrics & Benchmarking Service Clint Kreitner The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a not-for-profit public-private partnership
More informationSecurity Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security
Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a
More informationOracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.1) E12692-06 July 2009 This document outlines the certified hardware and software configurations for Oracle Business
More informationCompatibility matrix: ServiceCenter 6.2
Compatibility matrix: ServiceCenter 6.2 Click one of the following links to see more detailed information. Architecture diagram Servers Windows Client Web Client Compatibility between ServiceCenter clients
More informationHyperion System 9 BI+ Analytic Services
Hyperion System 9 BI+ Analytic The Hyperion System 9 BI+ Analytic release 9.3 Support Matrix includes support information for the following areas: Operating Systems o Server o Client Web / Application
More informationCompatibility matrix: HP Service Manager Software version 7.00
Compatibility matrix: HP Service Manager Software version 7.00 Click one of the following links to see more detailed information. Servers Windows Client Web Client Compatibility between Service Manager
More informationThe following table shows supported platforms for servers running CA Clarity PPM server software (application and background servers).
CA Clarity PPM Servers The following table shows supported platforms for servers running CA Clarity PPM server software (application and background servers). Oracle Solaris Microsoft Windows Hewlett Packard
More informationWhat's new in IBM Rational Build Forge Version 7.1
What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan
More informationIBM United States Software Announcement , dated October 4, 2011
IBM United States Software Announcement 211-428, dated October 4, 2011 IBM WebSphere Operational Decision Management V7.5 provides a combined business rules and events management platform to automate a
More informationCoreMax Consulting s Cyber Security Roadmap
CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows
More informationHyperion System 9 Financial Management release
Hyperion System 9 Financial Management release 9.2.0.3 The Hyperion System 9 Financial Management release 9.2.0.3 Matrix includes support information for the following areas: Operating Systems o Server
More informationOct 02, 2017 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy October 2017
Oct 02, 2017 Page 1 Tripwire, Inc. Tripwire Enterprise Platform Policy October 2017 SUPPORT DEFINITIONS Active No Officially supported by Tripwire as outlined in our support agreements, has no plans to
More informationCimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationArcExplorer -- Java Edition 9.0 System Requirements
ArcExplorer -- Java Edition 9.0 System Requirements This PDF contains system requirements information, including hardware requirements, best performance configurations, and limitations, for ArcExplorer
More informationClient Automation v8.10 Enterprise, Standard, Starter*
Core Installation Satellite Installation Application Management Application Self Service Management Application Management Profiles Patch Management Security And Compliance Management OS Management Out-of-Band
More informationvrealize Business System Requirements Guide
vrealize Business System Requirements Guide vrealize Business Advanced and Enterprise 8.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationSonic Supported Platforms
Sonic 8.0.1 Supported Platforms Below are the supported platforms for the Aurea ESB and SonicMQ Product Family (reflects Sonic 8.0 release). New Platforms Added for SonicMQ/Sonic ESB Runtime in V8.0.1
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution Date 2014-09-09
More informationSecurity Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:
Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security
More informationHRSD Position Description: UNIX Systems Administrator
HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position
More informationThe Global Information Security Compliance Packet (GISCP): The World's most In-Depth set of professionally researched and developed information
The Global Information Security Compliance Packet (GISCP): The World's most In-Depth set of professionally researched and developed information security policies, procedures, forms, checklists, templates,
More informationvrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4
vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4 vrealize Hyperic Supported Configurations and System Requirements You can find the most up-to-date technical documentation
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
More informationPerceptive DataTransfer
Perceptive DataTransfer System Overview Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: May 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,
More informationvrealize Hyperic Supported Configurations and System Requirements
vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4 This document supports the version of each product listed and supports all subsequent versions until the document
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration Manager Snow Distribution
More informationMcAfee Database Security
McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability
More informationeroom 7.x: Supported Configuration Matrix last updated: 9 August 2005
eroom 7.x: Supported Configuration Matrix last updated: 9 August 2005 Software / Hardware Version(s) eroom Version(s) Level of Support Comments Browsers: Microsoft Internet Explorer - Windows 5.01, 5.5,
More informationHyperion System 9 Strategic Finance release
Hyperion System 9 Strategic Finance release 9.2.0.3 The Hyperion System 9 Strategic Finance release 9.2.0.3.0 Matrix includes support information for the following areas: Operating Systems o Server o Client
More informationIPLocks Vulnerability Assessment: A Database Assessment Solution
IPLOCKS WHITE PAPER September 2005 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF
More informationPerceptive Nolij Web. Technical Specifications. Version: 6.8.x
Perceptive Nolij Web Technical Specifications Version: 6.8.x Written by: Product Knowledge, R&D Date: October 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates. Table of Contents Introduction...
More informationBusinessObjects Enterprise XI Linux Multiple Language Build
Revision Date: December 22, 2006 BusinessObjects Enterprise XI Linux Multiple Language Build Overview Contents This document lists specific platforms and configurations for the. INTRODUCTION... 3 LANGUAGES...
More informationASG-Software Compatibility Guide
ASG-Software Compatibility Guide for ASG-Time Navigator 4.5.0 Enterprise Edition Updated September 22, 2016 New in Compatibility Guide: IBM iseries 7.3 SGI ISSP 3.6 Citrix XenServer 7 GF FNDMP Visit www.asg.com
More informationCisco Prime Service Catalog Compatibility Matrix
Cisco Prime Service Catalog Compatibility Matrix Revised: September 2015 This document describes the version of the third-party software products that have been certified with Cisco Prime Service Catalog.
More informationIntroduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview
Introduction to Operating Systems Note Packet # 1 CSN 115 Operating Systems Genesee Community College CSN Lab Overview Dual booted Windows/Linux Workstations Linux workstations currently run CentOS and
More informationCrystal Reports XI Release 2 for Windows
Revision Date: March 14, 2007 Crystal Reports XI Release 2 for Windows Overview Contents This document lists specific platforms and configurations for the Crystal Reports XI Release 2. INTRODUCTION...
More informationPlatforms Supported. Windows Version Supported. Windows 2008 AIX HPUX. Linux Solaris Windows Server Name
Name Active Directory Apache Web Platforms Linux Solaris Microsoft 1.x, 2.x Apache APC UPS 1500 APC ASP.NET Bay Stack Hub BEA Tuxedo BEA Sys Big-IP/F5 Load Balancer Biz Talk BlackBerry Borland Enterprise
More informationBelarc Product Description
Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery
More informationSupported Platforms for Alfresco Workdesk 4.x
Supported Platforms for Alfresco Workdesk 4.x Here is a list of the individual components that have been through the complete Alfresco Quality Assurance and Certification activities. Choose a combination
More informationQuickSpecs HP Network Automation 7.60
What's New This QuickSpec outlines the key new features and stability enhancements in HP Network Automation 7.60, the latest release of our award-winning network configuration management and automation
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published:
Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134
More informationCA Identity Governance Platform Support Matrix
CA Identity Governance 12.6.04 Platform Support Matrix Last Updated Date Revision Oct 30, 2015 1.0 1 The following matrix lists the CA Identity Governance 12.6.04 supported platforms as follows: Environments
More informationProduct Information for etrust Audit Components
Product Information for etrust Audit Components 1.0 Introduction 1.1 etrust Audit Components 2.0 Policy Manager (Windows) 2.1 Components 2.2 System Requirements 3.0 Policy Manager (Solaris) 3.1 Components
More informationPerceptive Nolij Web. Technical Specifications. Version:
Perceptive Nolij Web Technical Specifications Version: 6.8.24 Written by: Product Knowledge Date: October 2017 2014-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,
More informationPulse Policy Secure. Supported Platforms Guide. PPS 9.0R3 Build For more information, go to
Supported Platforms Guide Pulse Policy Secure Supported Platforms Guide PPS 9.0R3 Build- 51661 For more information, go to www.pulsesecure.net/products Product Release Published Revision Pulse Secure,
More informationPerceptive DataTransfer
Perceptive DataTransfer System Overview Version: 6.2.x Written by: Product Documentation, R&D Date: January 2013 2013 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact, and WebNow
More informationThe Business Case for Security in the SDLC
The Business Case for Security in the SDLC Make Security Part of your Application Quality Program Otherwise, Development Teams Don t View it is Part of their Job The notion of application quality, which
More informationInstallAnywhere: Requirements
InstallAnywhere: Requirements Create Multiplatform Installations from a Single Project File Physical, Cloud, and Virtual Environments, Plus Docker Containers Requirements This document shows the technical
More informationEMC CUSTOMER UPDATE. 12 juni 2012 Fort Voordorp. WHAT S NEW IN EMC AVAMAR 6.1 Arjo de Bruin. Copyright 2012 EMC Corporation. All rights reserved.
EMC CUSTOMER UPDATE 12 juni 2012 Fort Voordorp WHAT S NEW IN EMC AVAMAR 6.1 Arjo de Bruin 1 Agenda Business Critical Applications Virtualization Performance & Scalability Extended Retention Management
More informationIBM BigFix Compliance
IBM BigFix Compliance A single solution for managing endpoint security across the organization Highlights Ensure configuration compliance using thousands of out-of-the-box bestpractice policies with automated
More informationDevPartner Java Edition System Requirements Release
DevPartner Java Edition System Requirements Release 3.3.01 Hardware Requirements Windows for Windows systems: Intel Architecture 32-bit Pentium III 500 MHz or equivalent 256 MB total system memory 100
More informationCA Service Desk Manager Release 12.9 Certification Matrix
CA Service Desk Manager Release 12.9 Certification Matrix Last Updated: January 22, 2016 This document includes certification information for CA Service Desk Manager FULL License, and CA Service Desk Manager
More informationSecurity Content Update Release Notes for CCS 12.x
Security Content Update 2018-2 Release Notes for CCS 12.x SCU 2018-2 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,
More informationThe Center for Internet Security
The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely
More informationBigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018
BigFix 2018 Roadmap Aram Eblighatian Product Manager IBM BigFix 14 May, 2018 What's New in BigFix? BigFix Platform BigFix Platform v9.5.7 Released Oct. 2017 Gathering Performance improvements (WebUI and
More information1.1 Oracle Identity Analytics Certification
1.1 Identity Analytics Certification General certification information for Identity Analytics : Identity Analytics was previously known as Sun Role Manager. Application servers should be J2EE 5 compliant.
More informationTIME NAVIGATOR. Compatibility Guide for Time Navigator Version November 2017
TIME NAVIGATOR Compatibility Guide for Time Navigator Version 4.6.0 November 2017 T A B L E O F C O N T E N T S General information about the ATN 4.6.0 Compatibility guide... 2 Co-residence with other
More informationWebsphere Force Uninstall Application Server 7 Linux Installation
Websphere Force Uninstall Application Server 7 Linux Installation You also use Installation Manager to easily uninstall the packages that it installed. Linux Intel, os=linux,arch=x86, Linux Intel 32 bit
More informationLANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers
Lenovo United States Announcement 106-815, dated November 7, 2006 LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers Additional information...
More informationVeritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List
Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List Created on July 21, 2010 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup
More information<Insert Picture Here> Oracle Policy Automation 10.0 System Requirements
Oracle Policy Automation 10.0 December 2009 Version 1.01 Oracle Policy Automation Products Version 10.0 Overview Product Oracle Policy Modeling Oracle Policy Automation (runtime)
More informationIBM Tivoli Application Dependency Discovery Manager Version Sensors and supported target systems
IBM Tivoli Application Dependency Discovery Manager Version 7.2.1 Sensors and supported target systems IBM Tivoli Application Dependency Discovery Manager Version 7.2.1 Sensors and supported target systems
More informationFouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA.
Fouad Riaz Bajwa Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. www.ifossf.org Worst Security Threats Sharing Knowledge What makes FOSS secure?
More informationJunos Pulse Secure Access Service Supported Platforms Guide
Junos Pulse Secure Access Service Supported Platforms Guide 8.0R1 (Build 27973) December 2, 2013 Revision 01 Contents Introduction........................................................ 2 Administrator
More informationIBM Tivoli Monitoring for Databases. Release Notes. Version SC
IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 Note Before using this information and the product
More informationHPE Operations Bridge Reporter
HPE Operations Bridge Reporter Software Version: 10.00 Windows and Linux operating systems Support Matrix Document Release Date: June 2017 Software Release Date: December 2015 Legal Notices Warranty The
More information<Insert Picture Here> Oracle Policy Automation System Requirements
Oracle Policy Automation 10.2.0 System Requirements March 2011 Version 1.01 Oracle Policy Automation Products Version 10.2 Overview Product Oracle Policy Modeling Oracle Policy Automation
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationLANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings
Lenovo United States Announcement 107-556, dated September 18, 2007 LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Description...2 Prices...7 At a glance New
More informationWebCenter Interaction 10gR3 Overview
WebCenter Interaction 10gR3 Overview Brian C. Harrison Product Management WebCenter Interaction and Related Products Summary of Key Points AquaLogic Interaction portal has been renamed
More informationHP Data Protector 8.00 Platform and Integration Support Matrix
HP Data Protector 8.00 Platform and Integration Support Matrix Version: 1.9 Date: March 2014 For the following Data Protector components, only those combinations of Data Protector components, applications
More informationSupported Platforms for Alfresco Enterprise 4.1.x
Supported Platforms for Alfresco Enterprise 4.1.x Last Modified: April 20 th 2016 Here is a list of the individual components that have been through the complete Alfresco Quality Assurance and Certification
More informationSFTPPlus Client SFTPPlus Server 1.5.1
SFTPPlus Client 1.5.1 SFTPPlus Server 1.5.1 Product Features & Benefits (Comparison Overview) The Old Exchange South Cadbury Yeovil Somerset BA22 7ET UK Copyright: Pro:Atria Limited 2009. Neither the whole
More informationHPE Security ArcSight. ArcSight Data Platform Support Matrix
HPE Security ArcSight ArcSight Data Platform Support Matrix November 28, 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express
More informationHow to manage evolving threats on evolving ICT assets across Enterprise
How to manage evolving threats on evolving ICT assets across Enterprise Marek Skalicky, CISM, CRISC, Qualys MD for CEE November, 2015 Vaš partner za varovanje informacij Agenda Security STARTs with VISIBILITY
More informationIBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management
Software Announcement October 15, 2002 Provides Protection for the Enterprise through Intrusion and Protection Management Overview IBM Tivoli Risk Manager is an enterprise risk management solution that
More informationSupported OS, Application Servers, and Databases Guide
Supported OS, Application Servers, and Databases Guide Release V8 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version
More informationetrust Antivirus Release 7.1
D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,
More informationIPv6 in the Enterprise
IPv6 in the Enterprise Yanick.Pouffary@ipv6forum.com Fellow Technology Director NAv6TF Distinguished Technologist HP Agenda The Perfect Storm/Everything over IP IPv6 Readiness and Advantages IPv6 and Security
More informationOracle Retail WebTrack Release Notes Release September 2007
Oracle Retail WebTrack Release Notes Release 12.0.2 September 2007 Oracle Retail WebTrack Release Notes, Release 12.0.2 Copyright 2007, Oracle. All rights reserved. Primary Author: Rich Olson The Programs
More informationTABLE OF CONTENTS 1. INTRODUCTION DEFINITIONS Error! Bookmark not defined REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4.
TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 DEFINITIONS Error! Bookmark not defined. - 2 2. REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4. OVERVIEW 2-3 5. HARDWARE ARCHITECTURE 3 6. SUPPORTED CONFIGURATIONS
More informationJava Plugin Update Windows 7 32 Bit To 64 Bit
Java Plugin Update Windows 7 32 Bit To 64 Bit Cost Java SE 8 Update 20: Everything you need to run Java applications and Operating Systems: Linux, Mac OS X, Windows 7 (32 bit), Windows 7 (64 bit), Software
More informationCisco Integration Platform
Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product
More informationContinuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER
Continuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER Continuous Monitoring & Security Authorization >> TOTAL COST OF OWNERSHIP Xacta IA Manager
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationHost. Computer system #1. Host Hardening
Host Hardening Series of actions to be taken in order to make it hard for an attacker to successfully attack computers in a network environment (March 28, 2016) Abdou Illia Spring 2016 Host In network
More informationPROFESSIONAL SERVICES (Solution Brief)
(Solution Brief) The most effective way for organizations to reduce the cost of maintaining enterprise security and improve security postures is to automate and optimize information security. Vanguard
More informationFoglight for DB2 LUW Hardware Sizing Guide
Foglight for DB2 LUW 5.7.5.50 Hardware Sizing Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationRevised: February 14, 2012
CA Role & Compliance Manager r12.5 SP6 - Platform Support Matrix Revised: February 14, 2012 The following matrix lists the CA Role & Compliance Manager r12.5 SP6 supported platforms as follows: Server
More informationNetwork Configuration Manager
DATASHEET Network Configuration Manager Automated Network Configuration & Change Management SolarWinds Network Configuration Manager (NCM) saves time and improves network reliability and security by managing
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationCA Records Manager 12.6
CA Records Manager 12.6 System Requirements The following sections describe the hardware and software requirements for CA Records Manager including the Discovery and Retention Manager component. Application
More informationSymantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.
Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Global Services Confidence in a connected world. The demands on your IT environment continue to reach new levels.
More informationCRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations
Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Integration with Numerous Type of Devices Flexible Architectural Configuration
More informationJanuary 8, 2018 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy January 2018
January 8, 2018 Page 1 Tripwire, Inc. Tripwire Enterprise Platform Policy January 2018 SUPPORT DEFINITIONS Active No Officially supported by Tripwire as outlined in our support agreements, has no plans
More informationIBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit
Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates
More informationOracle Fusion Middleware Oracle WebCenter Collaboration
Oracle Fusion Middleware Oracle WebCenter Collaboration Release Notes 10g Release 4 (10.3.3.0.0) E22881-03 May 2013 This document describes the supported software and known issues for Oracle WebCenter
More informationJboss Enterprise Platform & Red Hat Partnering
Israel JB oss U ser G roup Session 07 / 6.12.2007 Jboss Enterprise Platform & Red Hat Partnering By : Alexia Ollagnon, SEMEA ISV sales manager Red Hat / Jboss. w w w. t i k a l k. c o m Cost-Benefit Open
More informationTotal Content Integrator Support Matrix Updated: January 8, 2016
Total Content Integrator.0 Support Matrix Updated: January 8, 2016 Supported Total Content Integrator (TCI) Client Browser Versions The table below lists supported browsers and operating systems: Browser
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More information