BSA Security Configuration Management provides a powerful, automated, simple, and cost-effective way to audit the security configuration of your devices, measuring their level of compliance with internal and external policies.
Complete visibility into the security state of the entire network is needed in order to properly assess the risk to the organization and demonstrate compliance with industry regulations and best practices.
As part of the Insightix BSA solution suite, BSA Security Configuration Management uses Insightix Visibility to build and maintain a complete and accurate inventory of ALL devices operating on the enterprise network. Utilizing unique profiling technology, BSA Visibility provides meaningful network, device, and user intelligence in real-time. This information allows BSA Security Configuration Management to automatically classify the devices connected to the enterprise network. The classification determines how security configuration information is to be audited because variations exist in the way different device types are to be audited.
Utilizing the information provided by BSA Visibility, BSA Security Configuration Management assures its completeness of operation against ALL devices connected to the enterprise network, thereby allowing an organization to know the actual status of its security, risks, and compliance. No more guessing, no more “black holes”.
The auditing performed by BSA Security Configuration Management is performed automatically, eliminating the need for manual auditing and resulting in significant savings in both time and cost. The security configurations of the devices connected to the network are generically audited. In addition, all parameters and values applicable for the security configuration of a device type are audited, thereby allowing re-use of the information gathered across multiple regulations, policies, and best practices. Auditing is performed once a day against each of the audited device types. Newly attached devices are audited as they are attached to the network to maintain the coherence of the data collected.
BSA Security Configuration Management provides a compliance library pre-loaded with security best practices from authoritative sources such as the Center for Internet Security (CIS), the National Institute for Standards and Technology (NIST), and Microsoft. The compliance library supports creating, editing, and managing user-defined policies, thus enabling the customization of policies according to the needs of the enterprise.
Using the compliance library, the audited security configuration information is mapped to selected predefined security best practices and/or to user-defined policies making it possible to measure the organization’s status of compliance.
At any given moment, BSA Security Configuration Management presents the accurate state of the compliance status of the organization alongside its risk exposure.
BSA Security Configuration Management enables organizations to meet the demands of auditors while reducing risk and enabling business continuity. BSA Security Configuration Management allows the organization to demonstrate to auditors:
BSA Security Configuration Management enables you to meet your compliance objectives, lower your costs, and reduce your risk of exposure.
BSA Security Configuration Management is an agentless solution; operates in heterogeneous networks, and is vendor agnostic.