其它軟體‎ > ‎補丁管理‎ > ‎

Lumension Vulnerability Management - Patch Remediation

張貼者:2010年9月24日 下午9:26未知的使用者   [ eddie liu 已於 2012年8月8日 上午3:01 更新 ]
Lumension漏洞管理解決方案提供自動化的漏洞評估和補丁管理,通過一個集成的解決方案,使企業能夠自動檢測風險,部署補丁和捍衛自己的商業信息在一個複雜的,高度分佈式環境中提高效率和生產力的影響微乎其微。 所有這些活動都無縫集成到一個單一管理控制台的完整可視性網絡。









更新日期:2011/05/26
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
-----------------------------------------------------------------------------



主要功能和優點

解能力效益
資產發現 /庫存
  • 提供對整個網絡的可視性環境,包括虛擬機。
  • 全面和準確的發現網絡資產通過網絡和基於代理的掃描。
  • 發現沉默或隱藏的網絡節點。
提供完整的網絡可視性
  • 獲得完全可視性您的物理和虛擬網絡,進一步了解您的安全態勢,通過不斷發現和脆弱性評估。
  • 獲取洞察使用可移動設備。
  • 奠定基礎的發展的一個全面的安全政策,遵守內部和外部法規或標準。
徹底的脆弱性評價
  • 積極主動地識別已知漏洞的軟件和安全配置,才可以被利用。
  • 標識高風險漏洞未修補有關。
  • 充分利用Lumension的大型預建的漏洞和配置庫以及定制的脆弱性的政策。
確保積極的風險管理
  • 確定接觸潛在的威脅和脆弱性在網絡中。

保持合規

  • 保持恆定的審計和準備情況。
智能修補程序和修復
  • 補丁自動部署到整個網絡。
  • 提供了一個單一,可擴展的解決方案,修補程序和修復各種異構網絡,也就是說在Windows,Linux,UNIX和Mac。
  • 擁有一個龐大的信息庫超過 25,000片,覆蓋了所有主要應用程序和操作系統從許多供應商。
  • 允許強制執行基準和政策。
  • 支持創建定制的補丁和修復。
降低端點風險
  • 減少安全事故和加強你的安全態勢。
  • 編程方式管理您的 修補程序和修復 策略。
  • 連續執行的政策。

降低運營費用和總擁有成本

  • 補丁自動部署到整個網絡。
  • 使用單一解決方案來管理Windows和非Windows補丁與多點產品。
全面的報告
  • 提供一個單一的和統一的管理控制台。
  • 提供綜合匯總報告發現,評估和整治結果,以提供更全面的看法的環境。
  • 提供先進的報告功能,以滿足定制需求的組織。
  • 提供法規和行業最佳實踐證明符合報告模板根據既定的監管標準,既開箱即裝即用,可定制的查詢。
提供整體觀的環境風險
  • 您享有完全的可視性通過分佈式網絡集中式報告。
  • 增益控制安全風險,並立即採取糾正措施。
  • 確保能見度物理和虛擬環境,從一個單一控制台。

交付執行報告

  • 既要準備全面執行和管理報告在一個時刻的通知。

確保審計準備

  • 保持恆定的審計準備通過自動化採集和集中配置和安全漏洞評估的結果。
    自定義報表以符合審計要求。
單一管理控制台
  • 單一和統一的視圖整個網絡。
  • 發現,評估,優先修復,並報告對整個網絡環境的一種解決方案。
  • 管理的靈活性。
  • 集中和分散指揮和行政控制的可操作的情報。
降低TCO
  • 降低您的成本和行政管理費用由使用一種解決方案與多點解決方案/應用程序。
  • 滿足多個用戶的需要和觀眾。

提供整體觀的環境風險

  • 享有完全的分佈式網絡可視性和管理風險全盤。
  • 增益控制安全風險,並立即採取糾正措施。
安全配置管理
  • 提供開箱即裝即用法規,標準為基礎的評估和行業最佳實踐模板,以確保終端和應用是正確配置。
  • 安全管理信息系統自動識別,配置和軟件衝突,在您的網絡環境。
  • 檢測系統,已漂出配置策略。
  • 提供 安全內容自動化協議(最高統帥部) 驗證配置評估。
提高其生產力,並降低支持成本
  • 降低安全性的發生率和由此產生的求助呼叫。
  • 聚焦你的整治力度和資源上最關鍵的問題。
  • 節省時間和精力,通過集中管理和自動化系統的桌面配置任務。

確保遵守

  • 證明符合法規政策要求(FDCC, PCI - DSS的 和 HIPAA法案)。
  • 提供最準確 FDCC檢查與最新的橢圓形的定義。
  • 實施最佳做法。
  • 測量報告提供政策。
  • 降低成本的要求。
網絡訪問控制(NAC)支持
  • 自動評估端點,因為他們試圖進入網絡
  • 發現缺少的補丁,不完整的防病毒或其它安全配置問題
  • 自動 remediates端點到符合國家
改善安全狀況
  • 防止不兼容的端點訪問網絡。















Key Capabilities and Benefits

Solution CapabilityBenefit
Asset Discovery/Inventory
  • Provides visibility to the entire network environment, including virtual machines.
  • Thorough and accurate discovery of network assets via both network and agent-based scans.
  • Discovers silent or hidden network nodes.
Delivers Full Network Visibility
  • Gain full visibility into your physical and virtual network and understand your security posture through continuous discovery and vulnerability assessments.
  • Get insight into the use of removable devices.
  • Lay the foundation for the development of a comprehensive security policy in compliance with internal and external regulations or standards.
Thorough Vulnerability Assessment
  • Proactively identifies known software and security configuration vulnerabilities before they can be exploited.
  • Identifies high-risk vulnerabilities that are not patch-related.
  • Leverages Lumension’s large pre-built vulnerability and configuration repositories as well as customized vulnerability policies.
Ensures Proactive Risk Management
  • Identify exposure to potential threats and vulnerabilities within the network.

Maintains Compliance

  • Maintain constant audit and compliance readiness.
Intelligent Patch and Remediation
  • Automatically deploys patches to an entire network.
  • Offers a single, scalable solution to patch and remediate a heterogeneous network; i.e. Windows, Linux, Unix, and Mac.
  • Boasts a vast repository of over 25,000 patches that covers all major applications and operating systems from many vendors.
  • Allows the enforcement of mandatory baselines and policy.
  • Supports the creation of customized patches and remediation.
Reduces Endpoint Risk
  • Reduce security incidents and strengthen your security posture.
  • Programmatically manage your Patch and Remediation strategy.
  • Continuously enforce policy.

Reduces Operational Expenses and TCO

  • Automatically deploy patches to an entire network.
  • Use a single solution to manage Windows and non-Windows patches versus multiple point products.
Comprehensive Reporting
  • Delivers a single and consolidated management console.
  • Provides composite reports aggregating discovery, assessment and remediation results to provide a more complete view of the environment.
  • Delivers advanced reporting capabilities to meet the custom needs of organizations.
  • Provides regulatory and industry-best practices reporting templates to demonstrate compliance against established regulatory standards with both out-of-the-box and customizable queries.
Provides Holistic View of Environmental Risk
  • Enjoy complete visibility into your distributed network via centralized reporting.
  • Gain control over security risks and take immediate corrective actions.
  • Ensure visibility of both physical and virtual environments from a single console.

Delivers Executive Reporting

  • Be ready for comprehensive executive and management reporting at a moment’s notice.

Ensures Audit Readiness

  • Maintain constant audit readiness through the automated collection and centralization of security configuration and vulnerability assessment results.
    Customize reports to fit audit requirements.
Single Management Console
  • Single and consolidated view of entire network.
  • Discover, assess, prioritize, remediate, and report on the entire network environment from one solution.
  • Administrative flexibility.
  • Centralized and decentralized command and administrative control for actionable intelligence.
Lowers TCO
  • Reduce your cost and administrative management overhead by using one solution versus multiple point solutions/ applications.
  • Meet the needs of multiple users and audiences.

Delivers Holistic View of Environmental Risk

  • Enjoy complete visibility into your distributed network and manage risk holistically.
  • Gain control over security risks and take immediate corrective actions.
Security Configuration Management
  • Provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.
  • Automatically identifies security mis-configurations and software conflicts in your network environment.
  • Detects systems that have drifted out of configuration policy.
  • Delivers Security Content Automation Protocol (SCAP) validated configuration assessments.
Enhances IT Productivity and Lowers Support Costs
  • Reduce security incidences and resulting helpdesk calls.
  • Focus your remediation efforts and resources on the most critical issues.
  • Save time and effort by centrally managing and automating system desktop configuration tasks.

Ensures Compliance

  • Demonstrate compliance with regulatory policy requirements (FDCCPCI-DSS and HIPAA).
  • Provide most accurate FDCC checks with the latest OVAL definitions.
  • Implement best practices.
  • Provide policy measurement reports.
  • Reduce the cost of compliance.
Network Access Control (NAC) Support
  • Automatically assesses endpoints as they try to gain access to the network
  • Discovers missing patches, incomplete virus protection or other security configuration issues
  • Automatically remediates endpoints to a compliant state
Improves Security Posture
  • Prevent non-compliant endpoints from accessing your network.