The Center for Internet Security

Size: px
Start display at page:

Download "The Center for Internet Security"

Transcription

1 The Center for Internet Security Measurably reducing risk through collaboration, consensus, & practical security management

2 Content of this Presentation: I. Background II. Univ. of CA Schools Rights and Benefits as a Member III. Consensus Benchmarks - their value for system and network security IV. Assessment Tools Primarily CIS CAT - use cases & features - specs & system requirements V. Consensus Security Metrics VI. Security Software Certification VII. Member Support & Contact Information VIII. Q & A

3 Background

4 The Center for Internet Security (CIS) Formed in October 2000 A not-for-profit consortium of users, security consultants, and vendors of security software (Members) Convenes and facilitates teams developing consensus Benchmarks for system & network security configuration Developed and distributes the Configuration Assessment Tool (CIS-CAT) to its members Convenes and facilitates teams developing consensus definitions for information security metrics

5 Univ. of CA Schools' Rights & Benefits of Membership

6 Benefits of Membership: Unlimited Number of Univ. of CA Schools Users The right to distribute and use all of the resources throughout Univ. of CA Schools Access to Members-Only CIS-CAT Tool (Configuration Assessment Tool) Member Updates - timely notification of new releases & updates

7 Benefits of Membership: Additional Benefits Members Only Site Unlimited number of Univ. of CA Schools users have access to the Members website for: Configuration Assessment Tool (CIS-CAT) (including technical specifications and User s Guide); XML Benchmark versions (including XML Editing Guide); Participation on the Member discussion forums; and Register at Support As Members, Univ. of CA Schools users receive free Benchmark/CIS-CAT implementation support: support@cisecurity.org

8 Consensus Benchmarks

9 The Consensus Benchmarks Are: Recommended technical control rules/values for hardening OSs, applications, and network devices. Downloaded hundreds of thousands of times per year. Distributed in.pdf to the general public (to propagate their use/adoption worldwide) Distributed in XML (XCCDF) format to Members. Used by thousands of organizations worldwide as the basis for their security configuration policies and the standard against which to compare them.

10 The Security Value of Consensus Benchmarks The Problem: The vast majority of cyber attacks exploit known software flaws for which a patch or security configuration control is known. The Solution: Research and Case studies show that 80-95% of known vulnerabilities are blocked by the technical security controls and actions recommended in the consensus benchmarks. (research reports & case studies are on the web site)

11 The Compliance Value of Consensus Benchmarks The Problem: FISMA, PCI, and other regulations require adoption of configuration best practices. The Solution: The benchmarks distributed by are consensus best practice standards for security configuration developed and accepted by business/industry and government internationally.

12 How the Consensus Process works: Each Benchmark development project is part of the community projects. To view or join community projects please go here: Each project includes volunteer subject matter experts who discuss configuration recommendations for the Benchmark(s). The technical discussions on these projects define the content of the Benchmark(s). Univ. of CA Schools users and subject matter experts are invited to participate in the Consensus Process. To learn more about how to get involved or to volunteer, go here: or contact us at

13 Univ. of CA Schools users and subject matter experts can be involved in any of the following roles: Benchmark Leader creates draft content for a new or significantly updated Benchmark and presents the draft to the consensus team for discussion and review. (This is the only formally assigned role) Contributor takes an active role in defining and extending Benchmark content in the consensus process. Tester has the resources available to technically implement and test the recommendations in the Benchmark to ensure validity, and provides feedback to participants on the list. Reviewer reviews the Benchmark draft for syntactical, grammatical, aesthetic, and readability issues.

14 U.S. Federal Government Agencies and Commercial Vendors are Fully Engaged in the Consensus Process Government Agencies NSA DISA NIST Commercial Vendors Microsoft IBM HP Juniper Cisco Novell Oracle Checkpoint Apple Red Hat

15 54 Benchmarks are Now Available In.pdf Format on the Public Web Site: Twenty-two are for operating systems Twenty-five are for middleware and applications Six are for network devices One Mobile Device

16 Operating System Benchmarks WinXP Pro (SP1/SP2) Windows Server 2003 Windows Server 2008 Windows 2000 Pro Windows 2000 Server Windows 2000 Windows 7 Windows NT Mac OS X 10.5 (Leopard) Mac OS X 10.4 (Tiger) FreeBSD 4.1 Solaris 10 11/06 and 8/07 Solaris Sun Solaris 10 Benchmark v5.0.0 HP-UX 11i v2/v3 update 4 AIX Red Hat Linux 5 (RHEL 5) Red Hat Linux 4 (for RHEL 2.1, 3.0, 4.0 and Fedora Core 1,2,3,4, & 5) SUSE Linux 9/10 Slackware Linux 10.2 Debian Linux Novell OES: Netware

17 Application Benchmarks Apache Web Server 1.3/2.2 OpenLDAP 2.4 Apache Tomcat Opera Benchmark v1.0.0 Apache HTTP Server Oracle Database 8i Benchmark v3.0.0 Oracle Database 9i/10g BIND Oracle Database 11g Exchange Server 2003 Safari Benchmark v1.0.0 Exchange Server 2007 SQL Server 2005 FreeRADIUS SQL Server 2000 IIS 5/6IBM DB Sybase ASE 15.0 Microsoft Office 2007 Virtual Machine Mozilla Firefox 3.5 VMWare ESX Server 3.0 MySQL 4.1/5.0/5.1 VMWare ESX Server 3.5 Novell edirectory 6.5 Xen Server 3.2

18 Network Device Benchmarks Cisco IOS Router Cisco ASA, FWSM, and PIX Check Point Firewall Juniper OS Benchmark v1.0.0 Multi-Function Devices Wireless Networks Mobile Device Benchmarks Apple iphone OS

19 Benchmark Roadmap Apple OS Benchmark Blackberry Enterprise Server Benchmark Cisco Firewalls Benchmark Cisco IOS Benchmark IIS 7 Benchmark v1.0.0 IBM AIX Benchmark v1.0.0 Internet Explorer 8 Benchmark v1.0.0 Microsoft SQL Server 2005 v2.0.0 Microsoft Windows 2003 Benchmark v3.0.0 Microsoft Windows XP Benchmark v3.0.0 MySQL Benchmark v2.0.0 Red Hat Enterprise Linux Benchmark v3.0.0 SuSE Enterprise Linux Benchmark v3.0.0 VMWare ESX Server 4.1 Benchmark v1.0.0 Microsoft SQL Server 2008 Benchmark v1.0.0 Microsoft Office SharePoint Server Benchmark v1.0.0

20 21 of the 54 Benchmarks are Available To Members Only In Machine-Readable XML (XCCDF) Format For Use With CIS-CAT And Tools that Members Develop The XML Benchmarks are Available On the Members Web Site at:

21 Assessment Tools Primarily CIS-CAT (CIS-Configuration Assessment Tool)

22 CIS-CAT Tools Use Cases Improve security awareness by comparing security of out-ofthe-box vs. hardened systems. Create standard configuration images for hardening systems prior to deployment Periodically audit and/or routinely monitor the configuration of individual production systems compared to the Benchmark and/or enterprise policies. Audit/monitor multiple systems simultaneously using system management utilities (CIS provides supplemental scripts that support CIS-CAT in assessing multiple systems simultaneously.)

23 CIS-CAT (CIS-Configuration Assessment Tool) Host based, configuration assessment/audit software tool Available ONLY to Members distributed via the Members web site Distributed with GUI & CLI The ONLY tool CIS is currently developing & supporting Requires JRE v1.5 or later CIS-CAT and JRE can reside on target system, removable drive, or network drive, provided it is accessible from the target of evaluation.

24 CIS-CAT A Java tool that reads the Benchmark XML files (XML files specify the Benchmark rules and values, and the checks that the tool executes to assess & report configuration status) Also reads customized XML files - compare the configuration of systems with both the Benchmarks and customized configuration policies NIST validated FDCC Scanner ( cis.cfm)

25 CIS-CAT Supports These Benchmarks: Apache Tomcat Benchmark v1.0.0 Apple OSX 10.5 Benchmark v Debian Linux Benchmark v1.0.0 HP-UX 11i Benchmark v1.4.2 IBM AIX Benchmark v1.0.1 Microsoft Windows 2003 MS DC Benchmark v2.0.0 Microsoft Windows 2008 Server Benchmark v1.0.0 Microsoft Windows 7 Benchmark v1.0.0 Microsoft Windows XP Benchmark v2.0.1 Oracle Database 11g Benchmark v1.0.1 Oracle Database 9i-10g Benchmark v2.0.1 RedHat Enterprise Linux 4 Benchmark v1.0.5 RedHat Enterprise Linux Benchmark v1.1.2 Slackware Linux 10.2 Benchmark v1.1.0 Solaris Benchmark v4.0.0 Solaris 10 Benchmark v2.1.3 Solaris Benchmark v1.3.0 SUSE Linux Enterprise Server 10 Benchmark v2.0.0 SUSE Linux Enterprise Server 9 Benchmark v2.0.0 VMware ESX 3.5 Benchmark v1.2.0 Mozilla Firefox Benchmark v1.0.0

26 CIS-CAT Documentation README file in the download package Specification document distributed via the members site. CIS-CAT Users Manual distributed via the members site. A guide to assist users in modifying the Benchmark XML files for use with CIS-CAT Additional guidance is provided via the member discussion forum

27 CIS-CAT Roadmap XCCDF Target Completion Date VMware ESX 4.1 Benchmark v1.0.0 December 2010 Microsoft SQL Server 2008 Benchmark v1.0.0 December 2010 IBM AIX Benchmark v1.0.0 December 2010 Windows Server 2003 Benchmark v3.0.0 December 2010 Apple OS Benchmark v2.0.0 December 2010 Red Hat Enterprise Linux 5.4 Benchmark v3.0.0 December 2010 Sun Solaris 10 Benchmark v5.0.0 October 2010

28 Other Assessment Tools Currently Available Router Audit Tool (RAT Tool) Currently being updated. Help us test it. Apache Benchmark Tool Will be updated once Apache Benchmark is complete Use CIS-CAT instead of the following tools as they are unsupported and no longer maintained. Perl tools for Unix operating systems Oracle Database 8i tool

29 Security Software Certification

30 Certification Overview CIS Certified Security Software Tested to accurately measure and report system status against recommendation in CIS Benchmarks Why use Certified Security Software? Independently validated to accurately audit systems CIS Benchmark content integrated into software Enterprise scale security auditing

31 Consensus Security Metrics

32 Security Metrics Initiative Organizations struggle to make cost-effective security investment decisions; Information Security Professionals lack widely accepted and unambiguous metrics for decision support. To address this need, established a consensus team of over 100 industry experts from leading commercial, government and academic organizations of varying sizes. The result was a set of unambiguous, user originated, consensus-based standard metrics and data definitions that can be used across organizations to define, collect and analyze data on security process benefits and outcomes.

33 Example Data Set

34 Example Metric Definition

35 Security Metrics Definitions There are 20 Security Consensus Metrics Definitions covering 6 important business functions: Incident Management; Vulnerability Management; Patch Management; Application Security; Configuration Management; and Financial Metrics Download the Document here:

36 Four simple goals: Phase II Consensus Effort Enhance existing Consensus Security Metrics v1.0.0; Develop additional community metrics and taxonomies; Develop a prescriptive, quick-start implementation guide; Develop electronic schemes for sharing metric definitions, data sets and results. Accelerate vendor adoption and integration of standard metrics on behalf of end-organizations. For more information about the Security Metrics or to be involved in the metrics consensus process, contact Steven Piliero, Chief Security Officer, at spiliero@cisecurity.org

37 Member Support & Contact Information

38 Member Support for Univ. of CA Schools As a benefit of membership, Univ. of CA Schools users are eligible to receive support service, at no charge, from staff: support@cisecurity.org Telephone, after initial contact Discussion forums on Members web site Primary Membership Contact Michelle Vogeler, Representative, mvogeler@cisecurity.org

39 Q & A

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security The CIS Security Metrics & Benchmarking Service Clint Kreitner The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a not-for-profit public-private partnership

More information

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a

More information

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 ( Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.1) E12692-06 July 2009 This document outlines the certified hardware and software configurations for Oracle Business

More information

Compatibility matrix: ServiceCenter 6.2

Compatibility matrix: ServiceCenter 6.2 Compatibility matrix: ServiceCenter 6.2 Click one of the following links to see more detailed information. Architecture diagram Servers Windows Client Web Client Compatibility between ServiceCenter clients

More information

Hyperion System 9 BI+ Analytic Services

Hyperion System 9 BI+ Analytic Services Hyperion System 9 BI+ Analytic The Hyperion System 9 BI+ Analytic release 9.3 Support Matrix includes support information for the following areas: Operating Systems o Server o Client Web / Application

More information

Compatibility matrix: HP Service Manager Software version 7.00

Compatibility matrix: HP Service Manager Software version 7.00 Compatibility matrix: HP Service Manager Software version 7.00 Click one of the following links to see more detailed information. Servers Windows Client Web Client Compatibility between Service Manager

More information

The following table shows supported platforms for servers running CA Clarity PPM server software (application and background servers).

The following table shows supported platforms for servers running CA Clarity PPM server software (application and background servers). CA Clarity PPM Servers The following table shows supported platforms for servers running CA Clarity PPM server software (application and background servers). Oracle Solaris Microsoft Windows Hewlett Packard

More information

What's new in IBM Rational Build Forge Version 7.1

What's new in IBM Rational Build Forge Version 7.1 What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan

More information

IBM United States Software Announcement , dated October 4, 2011

IBM United States Software Announcement , dated October 4, 2011 IBM United States Software Announcement 211-428, dated October 4, 2011 IBM WebSphere Operational Decision Management V7.5 provides a combined business rules and events management platform to automate a

More information

CoreMax Consulting s Cyber Security Roadmap

CoreMax Consulting s Cyber Security Roadmap CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows

More information

Hyperion System 9 Financial Management release

Hyperion System 9 Financial Management release Hyperion System 9 Financial Management release 9.2.0.3 The Hyperion System 9 Financial Management release 9.2.0.3 Matrix includes support information for the following areas: Operating Systems o Server

More information

Oct 02, 2017 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy October 2017

Oct 02, 2017 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy October 2017 Oct 02, 2017 Page 1 Tripwire, Inc. Tripwire Enterprise Platform Policy October 2017 SUPPORT DEFINITIONS Active No Officially supported by Tripwire as outlined in our support agreements, has no plans to

More information

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

ArcExplorer -- Java Edition 9.0 System Requirements

ArcExplorer -- Java Edition 9.0 System Requirements ArcExplorer -- Java Edition 9.0 System Requirements This PDF contains system requirements information, including hardware requirements, best performance configurations, and limitations, for ArcExplorer

More information

Client Automation v8.10 Enterprise, Standard, Starter*

Client Automation v8.10 Enterprise, Standard, Starter* Core Installation Satellite Installation Application Management Application Self Service Management Application Management Profiles Patch Management Security And Compliance Management OS Management Out-of-Band

More information

vrealize Business System Requirements Guide

vrealize Business System Requirements Guide vrealize Business System Requirements Guide vrealize Business Advanced and Enterprise 8.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Sonic Supported Platforms

Sonic Supported Platforms Sonic 8.0.1 Supported Platforms Below are the supported platforms for the Aurea ESB and SonicMQ Product Family (reflects Sonic 8.0 release). New Platforms Added for SonicMQ/Sonic ESB Runtime in V8.0.1

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution Date 2014-09-09

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

HRSD Position Description: UNIX Systems Administrator

HRSD Position Description: UNIX Systems Administrator HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position

More information

The Global Information Security Compliance Packet (GISCP): The World's most In-Depth set of professionally researched and developed information

The Global Information Security Compliance Packet (GISCP): The World's most In-Depth set of professionally researched and developed information The Global Information Security Compliance Packet (GISCP): The World's most In-Depth set of professionally researched and developed information security policies, procedures, forms, checklists, templates,

More information

vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4

vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4 vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4 vrealize Hyperic Supported Configurations and System Requirements You can find the most up-to-date technical documentation

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution

More information

Perceptive DataTransfer

Perceptive DataTransfer Perceptive DataTransfer System Overview Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: May 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,

More information

vrealize Hyperic Supported Configurations and System Requirements

vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4 This document supports the version of each product listed and supports all subsequent versions until the document

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration Manager Snow Distribution

More information

McAfee Database Security

McAfee Database Security McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability

More information

eroom 7.x: Supported Configuration Matrix last updated: 9 August 2005

eroom 7.x: Supported Configuration Matrix last updated: 9 August 2005 eroom 7.x: Supported Configuration Matrix last updated: 9 August 2005 Software / Hardware Version(s) eroom Version(s) Level of Support Comments Browsers: Microsoft Internet Explorer - Windows 5.01, 5.5,

More information

Hyperion System 9 Strategic Finance release

Hyperion System 9 Strategic Finance release Hyperion System 9 Strategic Finance release 9.2.0.3 The Hyperion System 9 Strategic Finance release 9.2.0.3.0 Matrix includes support information for the following areas: Operating Systems o Server o Client

More information

IPLocks Vulnerability Assessment: A Database Assessment Solution

IPLocks Vulnerability Assessment: A Database Assessment Solution IPLOCKS WHITE PAPER September 2005 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF

More information

Perceptive Nolij Web. Technical Specifications. Version: 6.8.x

Perceptive Nolij Web. Technical Specifications. Version: 6.8.x Perceptive Nolij Web Technical Specifications Version: 6.8.x Written by: Product Knowledge, R&D Date: October 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates. Table of Contents Introduction...

More information

BusinessObjects Enterprise XI Linux Multiple Language Build

BusinessObjects Enterprise XI Linux Multiple Language Build Revision Date: December 22, 2006 BusinessObjects Enterprise XI Linux Multiple Language Build Overview Contents This document lists specific platforms and configurations for the. INTRODUCTION... 3 LANGUAGES...

More information

ASG-Software Compatibility Guide

ASG-Software Compatibility Guide ASG-Software Compatibility Guide for ASG-Time Navigator 4.5.0 Enterprise Edition Updated September 22, 2016 New in Compatibility Guide: IBM iseries 7.3 SGI ISSP 3.6 Citrix XenServer 7 GF FNDMP Visit www.asg.com

More information

Cisco Prime Service Catalog Compatibility Matrix

Cisco Prime Service Catalog Compatibility Matrix Cisco Prime Service Catalog Compatibility Matrix Revised: September 2015 This document describes the version of the third-party software products that have been certified with Cisco Prime Service Catalog.

More information

Introduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview

Introduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview Introduction to Operating Systems Note Packet # 1 CSN 115 Operating Systems Genesee Community College CSN Lab Overview Dual booted Windows/Linux Workstations Linux workstations currently run CentOS and

More information

Crystal Reports XI Release 2 for Windows

Crystal Reports XI Release 2 for Windows Revision Date: March 14, 2007 Crystal Reports XI Release 2 for Windows Overview Contents This document lists specific platforms and configurations for the Crystal Reports XI Release 2. INTRODUCTION...

More information

Platforms Supported. Windows Version Supported. Windows 2008 AIX HPUX. Linux Solaris Windows Server Name

Platforms Supported. Windows Version Supported. Windows 2008 AIX HPUX. Linux Solaris Windows Server Name Name Active Directory Apache Web Platforms Linux Solaris Microsoft 1.x, 2.x Apache APC UPS 1500 APC ASP.NET Bay Stack Hub BEA Tuxedo BEA Sys Big-IP/F5 Load Balancer Biz Talk BlackBerry Borland Enterprise

More information

Belarc Product Description

Belarc Product Description Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery

More information

Supported Platforms for Alfresco Workdesk 4.x

Supported Platforms for Alfresco Workdesk 4.x Supported Platforms for Alfresco Workdesk 4.x Here is a list of the individual components that have been through the complete Alfresco Quality Assurance and Certification activities. Choose a combination

More information

QuickSpecs HP Network Automation 7.60

QuickSpecs HP Network Automation 7.60 What's New This QuickSpec outlines the key new features and stability enhancements in HP Network Automation 7.60, the latest release of our award-winning network configuration management and automation

More information

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published:

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134

More information

CA Identity Governance Platform Support Matrix

CA Identity Governance Platform Support Matrix CA Identity Governance 12.6.04 Platform Support Matrix Last Updated Date Revision Oct 30, 2015 1.0 1 The following matrix lists the CA Identity Governance 12.6.04 supported platforms as follows: Environments

More information

Product Information for etrust Audit Components

Product Information for etrust Audit Components Product Information for etrust Audit Components 1.0 Introduction 1.1 etrust Audit Components 2.0 Policy Manager (Windows) 2.1 Components 2.2 System Requirements 3.0 Policy Manager (Solaris) 3.1 Components

More information

Perceptive Nolij Web. Technical Specifications. Version:

Perceptive Nolij Web. Technical Specifications. Version: Perceptive Nolij Web Technical Specifications Version: 6.8.24 Written by: Product Knowledge Date: October 2017 2014-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,

More information

Pulse Policy Secure. Supported Platforms Guide. PPS 9.0R3 Build For more information, go to

Pulse Policy Secure. Supported Platforms Guide. PPS 9.0R3 Build For more information, go to Supported Platforms Guide Pulse Policy Secure Supported Platforms Guide PPS 9.0R3 Build- 51661 For more information, go to www.pulsesecure.net/products Product Release Published Revision Pulse Secure,

More information

Perceptive DataTransfer

Perceptive DataTransfer Perceptive DataTransfer System Overview Version: 6.2.x Written by: Product Documentation, R&D Date: January 2013 2013 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact, and WebNow

More information

The Business Case for Security in the SDLC

The Business Case for Security in the SDLC The Business Case for Security in the SDLC Make Security Part of your Application Quality Program Otherwise, Development Teams Don t View it is Part of their Job The notion of application quality, which

More information

InstallAnywhere: Requirements

InstallAnywhere: Requirements InstallAnywhere: Requirements Create Multiplatform Installations from a Single Project File Physical, Cloud, and Virtual Environments, Plus Docker Containers Requirements This document shows the technical

More information

EMC CUSTOMER UPDATE. 12 juni 2012 Fort Voordorp. WHAT S NEW IN EMC AVAMAR 6.1 Arjo de Bruin. Copyright 2012 EMC Corporation. All rights reserved.

EMC CUSTOMER UPDATE. 12 juni 2012 Fort Voordorp. WHAT S NEW IN EMC AVAMAR 6.1 Arjo de Bruin. Copyright 2012 EMC Corporation. All rights reserved. EMC CUSTOMER UPDATE 12 juni 2012 Fort Voordorp WHAT S NEW IN EMC AVAMAR 6.1 Arjo de Bruin 1 Agenda Business Critical Applications Virtualization Performance & Scalability Extended Retention Management

More information

IBM BigFix Compliance

IBM BigFix Compliance IBM BigFix Compliance A single solution for managing endpoint security across the organization Highlights Ensure configuration compliance using thousands of out-of-the-box bestpractice policies with automated

More information

DevPartner Java Edition System Requirements Release

DevPartner Java Edition System Requirements Release DevPartner Java Edition System Requirements Release 3.3.01 Hardware Requirements Windows for Windows systems: Intel Architecture 32-bit Pentium III 500 MHz or equivalent 256 MB total system memory 100

More information

CA Service Desk Manager Release 12.9 Certification Matrix

CA Service Desk Manager Release 12.9 Certification Matrix CA Service Desk Manager Release 12.9 Certification Matrix Last Updated: January 22, 2016 This document includes certification information for CA Service Desk Manager FULL License, and CA Service Desk Manager

More information

Security Content Update Release Notes for CCS 12.x

Security Content Update Release Notes for CCS 12.x Security Content Update 2018-2 Release Notes for CCS 12.x SCU 2018-2 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,

More information

The Center for Internet Security

The Center for Internet Security The Center for Internet Security The CIS Security Metrics Service July 1 2008 Organizations struggle to make cost-effective security investment decisions; information security professionals lack widely

More information

BigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018

BigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018 BigFix 2018 Roadmap Aram Eblighatian Product Manager IBM BigFix 14 May, 2018 What's New in BigFix? BigFix Platform BigFix Platform v9.5.7 Released Oct. 2017 Gathering Performance improvements (WebUI and

More information

1.1 Oracle Identity Analytics Certification

1.1 Oracle Identity Analytics Certification 1.1 Identity Analytics Certification General certification information for Identity Analytics : Identity Analytics was previously known as Sun Role Manager. Application servers should be J2EE 5 compliant.

More information

TIME NAVIGATOR. Compatibility Guide for Time Navigator Version November 2017

TIME NAVIGATOR. Compatibility Guide for Time Navigator Version November 2017 TIME NAVIGATOR Compatibility Guide for Time Navigator Version 4.6.0 November 2017 T A B L E O F C O N T E N T S General information about the ATN 4.6.0 Compatibility guide... 2 Co-residence with other

More information

Websphere Force Uninstall Application Server 7 Linux Installation

Websphere Force Uninstall Application Server 7 Linux Installation Websphere Force Uninstall Application Server 7 Linux Installation You also use Installation Manager to easily uninstall the packages that it installed. Linux Intel, os=linux,arch=x86, Linux Intel 32 bit

More information

LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers

LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers Lenovo United States Announcement 106-815, dated November 7, 2006 LANDesk and Lenovo ThinkVantage Technologies Bundle available for commercial, government, and education customers Additional information...

More information

Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List

Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List Veritas NetBackup Enterprise Server and Server 6.x OS Software Compatibility List Created on July 21, 2010 Copyright 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup

More information

<Insert Picture Here> Oracle Policy Automation 10.0 System Requirements

<Insert Picture Here> Oracle Policy Automation 10.0 System Requirements Oracle Policy Automation 10.0 December 2009 Version 1.01 Oracle Policy Automation Products Version 10.0 Overview Product Oracle Policy Modeling Oracle Policy Automation (runtime)

More information

IBM Tivoli Application Dependency Discovery Manager Version Sensors and supported target systems

IBM Tivoli Application Dependency Discovery Manager Version Sensors and supported target systems IBM Tivoli Application Dependency Discovery Manager Version 7.2.1 Sensors and supported target systems IBM Tivoli Application Dependency Discovery Manager Version 7.2.1 Sensors and supported target systems

More information

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA.

Fouad Riaz Bajwa. Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. Fouad Riaz Bajwa Co-Founder & FOSS Advocate FOSSFP - ifossf International Free and open Source Software Foundation, MI, USA. www.ifossf.org Worst Security Threats Sharing Knowledge What makes FOSS secure?

More information

Junos Pulse Secure Access Service Supported Platforms Guide

Junos Pulse Secure Access Service Supported Platforms Guide Junos Pulse Secure Access Service Supported Platforms Guide 8.0R1 (Build 27973) December 2, 2013 Revision 01 Contents Introduction........................................................ 2 Administrator

More information

IBM Tivoli Monitoring for Databases. Release Notes. Version SC

IBM Tivoli Monitoring for Databases. Release Notes. Version SC IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 IBM Tivoli Monitoring for Databases Release Notes Version 5.1.1 SC23-4851-00 Note Before using this information and the product

More information

HPE Operations Bridge Reporter

HPE Operations Bridge Reporter HPE Operations Bridge Reporter Software Version: 10.00 Windows and Linux operating systems Support Matrix Document Release Date: June 2017 Software Release Date: December 2015 Legal Notices Warranty The

More information

<Insert Picture Here> Oracle Policy Automation System Requirements

<Insert Picture Here> Oracle Policy Automation System Requirements Oracle Policy Automation 10.2.0 System Requirements March 2011 Version 1.01 Oracle Policy Automation Products Version 10.2 Overview Product Oracle Policy Modeling Oracle Policy Automation

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings

LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Lenovo United States Announcement 107-556, dated September 18, 2007 LANDesk for ThinkVantage Technologies ecosystem now expanded to include enhanced offerings Description...2 Prices...7 At a glance New

More information

WebCenter Interaction 10gR3 Overview

WebCenter Interaction 10gR3 Overview WebCenter Interaction 10gR3 Overview Brian C. Harrison Product Management WebCenter Interaction and Related Products Summary of Key Points AquaLogic Interaction portal has been renamed

More information

HP Data Protector 8.00 Platform and Integration Support Matrix

HP Data Protector 8.00 Platform and Integration Support Matrix HP Data Protector 8.00 Platform and Integration Support Matrix Version: 1.9 Date: March 2014 For the following Data Protector components, only those combinations of Data Protector components, applications

More information

Supported Platforms for Alfresco Enterprise 4.1.x

Supported Platforms for Alfresco Enterprise 4.1.x Supported Platforms for Alfresco Enterprise 4.1.x Last Modified: April 20 th 2016 Here is a list of the individual components that have been through the complete Alfresco Quality Assurance and Certification

More information

SFTPPlus Client SFTPPlus Server 1.5.1

SFTPPlus Client SFTPPlus Server 1.5.1 SFTPPlus Client 1.5.1 SFTPPlus Server 1.5.1 Product Features & Benefits (Comparison Overview) The Old Exchange South Cadbury Yeovil Somerset BA22 7ET UK Copyright: Pro:Atria Limited 2009. Neither the whole

More information

HPE Security ArcSight. ArcSight Data Platform Support Matrix

HPE Security ArcSight. ArcSight Data Platform Support Matrix HPE Security ArcSight ArcSight Data Platform Support Matrix November 28, 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express

More information

How to manage evolving threats on evolving ICT assets across Enterprise

How to manage evolving threats on evolving ICT assets across Enterprise How to manage evolving threats on evolving ICT assets across Enterprise Marek Skalicky, CISM, CRISC, Qualys MD for CEE November, 2015 Vaš partner za varovanje informacij Agenda Security STARTs with VISIBILITY

More information

IBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management

IBM Tivoli Risk Manager Provides Protection for the Enterprise through Intrusion and Protection Management Software Announcement October 15, 2002 Provides Protection for the Enterprise through Intrusion and Protection Management Overview IBM Tivoli Risk Manager is an enterprise risk management solution that

More information

Supported OS, Application Servers, and Databases Guide

Supported OS, Application Servers, and Databases Guide Supported OS, Application Servers, and Databases Guide Release V8 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version

More information

etrust Antivirus Release 7.1

etrust Antivirus Release 7.1 D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,

More information

IPv6 in the Enterprise

IPv6 in the Enterprise IPv6 in the Enterprise Yanick.Pouffary@ipv6forum.com Fellow Technology Director NAv6TF Distinguished Technologist HP Agenda The Perfect Storm/Everything over IP IPv6 Readiness and Advantages IPv6 and Security

More information

Oracle Retail WebTrack Release Notes Release September 2007

Oracle Retail WebTrack Release Notes Release September 2007 Oracle Retail WebTrack Release Notes Release 12.0.2 September 2007 Oracle Retail WebTrack Release Notes, Release 12.0.2 Copyright 2007, Oracle. All rights reserved. Primary Author: Rich Olson The Programs

More information

TABLE OF CONTENTS 1. INTRODUCTION DEFINITIONS Error! Bookmark not defined REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4.

TABLE OF CONTENTS 1. INTRODUCTION DEFINITIONS Error! Bookmark not defined REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4. TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 DEFINITIONS Error! Bookmark not defined. - 2 2. REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4. OVERVIEW 2-3 5. HARDWARE ARCHITECTURE 3 6. SUPPORTED CONFIGURATIONS

More information

Java Plugin Update Windows 7 32 Bit To 64 Bit

Java Plugin Update Windows 7 32 Bit To 64 Bit Java Plugin Update Windows 7 32 Bit To 64 Bit Cost Java SE 8 Update 20: Everything you need to run Java applications and Operating Systems: Linux, Mac OS X, Windows 7 (32 bit), Windows 7 (64 bit), Software

More information

Cisco Integration Platform

Cisco Integration Platform Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product

More information

Continuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER

Continuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER Continuous Monitoring & Security Authorization XACTA IA MANAGER: COST SAVINGS AND RETURN ON INVESTMENT IA MANAGER Continuous Monitoring & Security Authorization >> TOTAL COST OF OWNERSHIP Xacta IA Manager

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Host. Computer system #1. Host Hardening

Host. Computer system #1. Host Hardening Host Hardening Series of actions to be taken in order to make it hard for an attacker to successfully attack computers in a network environment (March 28, 2016) Abdou Illia Spring 2016 Host In network

More information

PROFESSIONAL SERVICES (Solution Brief)

PROFESSIONAL SERVICES (Solution Brief) (Solution Brief) The most effective way for organizations to reduce the cost of maintaining enterprise security and improve security postures is to automate and optimize information security. Vanguard

More information

Foglight for DB2 LUW Hardware Sizing Guide

Foglight for DB2 LUW Hardware Sizing Guide Foglight for DB2 LUW 5.7.5.50 Hardware Sizing Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Revised: February 14, 2012

Revised: February 14, 2012 CA Role & Compliance Manager r12.5 SP6 - Platform Support Matrix Revised: February 14, 2012 The following matrix lists the CA Role & Compliance Manager r12.5 SP6 supported platforms as follows: Server

More information

Network Configuration Manager

Network Configuration Manager DATASHEET Network Configuration Manager Automated Network Configuration & Change Management SolarWinds Network Configuration Manager (NCM) saves time and improves network reliability and security by managing

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

CA Records Manager 12.6

CA Records Manager 12.6 CA Records Manager 12.6 System Requirements The following sections describe the hardware and software requirements for CA Records Manager including the Discovery and Retention Manager component. Application

More information

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance. Symantec Global Services Confidence in a connected world. The demands on your IT environment continue to reach new levels.

More information

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Integration with Numerous Type of Devices Flexible Architectural Configuration

More information

January 8, 2018 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy January 2018

January 8, 2018 Page 1. Tripwire, Inc. Tripwire Enterprise Platform Support Policy January 2018 January 8, 2018 Page 1 Tripwire, Inc. Tripwire Enterprise Platform Policy January 2018 SUPPORT DEFINITIONS Active No Officially supported by Tripwire as outlined in our support agreements, has no plans

More information

IBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit

IBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates

More information

Oracle Fusion Middleware Oracle WebCenter Collaboration

Oracle Fusion Middleware Oracle WebCenter Collaboration Oracle Fusion Middleware Oracle WebCenter Collaboration Release Notes 10g Release 4 (10.3.3.0.0) E22881-03 May 2013 This document describes the supported software and known issues for Oracle WebCenter

More information

Jboss Enterprise Platform & Red Hat Partnering

Jboss Enterprise Platform & Red Hat Partnering Israel JB oss U ser G roup Session 07 / 6.12.2007 Jboss Enterprise Platform & Red Hat Partnering By : Alexia Ollagnon, SEMEA ISV sales manager Red Hat / Jboss. w w w. t i k a l k. c o m Cost-Benefit Open

More information

Total Content Integrator Support Matrix Updated: January 8, 2016

Total Content Integrator Support Matrix Updated: January 8, 2016 Total Content Integrator.0 Support Matrix Updated: January 8, 2016 Supported Total Content Integrator (TCI) Client Browser Versions The table below lists supported browsers and operating systems: Browser

More information

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE

More information