Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?

Similar presentations


Presentation on theme: "Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?"— Presentation transcript:

1 Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level? What are the high-risk areas? How does risk compare to our security policy? Have we achieved an acceptable level of security? Are we compliant with our internal security policies? What are the areas of non- compliance? What resources do we have to allocate? How do we assign remediation tasks? How do we automate patch deployments? Maximizing Return on Security Investment

2 Configuration Management The rising number of vulnerabilities demands a review of the processes and resources needed to effectively deal with increased exposure -- Source: CERT Data. This rapid acceleration from vulnerability disclosure to widespread attacks represents today’s most critical network security risk

3 Business Continuity The integration of enterprise applications (ERP, SFA, Financials, Call Center, Help Desk, etc.) are creating complex business processes that require 24x7 availability These business processes rely on network devices within an infrastructure –Servers, routers, switches, etc. An attack on one network device can have ripple affects on a business process, shutting down services across a network, and crippling business continuity

4 4 Regulatory Compliance Many companies now face board-level inquiries into their security practices Scope of compliance is now a business and technology issue –Security programs must be developed, implemented and maintained –Identify and assess the risks threatening customer data –Generate timely, accurate and actionable information about their exposures Internal policies must be created, implemented and enforced –Identify which technologies, methods and people are most vulnerable –Have a consistent baseline of questions around standards, practices, configurations and vulnerabilities GLB

5 Host-level Threat Mitigation Configuration Management Remediation Management Asset Inventory Security Management Security Puzzle Security Policy Enforcement Security Snapshot Assessment Business Continuity Post-Attack Forensics Eliminate losses associated with events that can be identified and corrected Accurately identify and fix network-wide vulnerabilities expeditiously Ongoing, proactive network threat reduction Reduce manhours required to correct issues Executive level reporting / Verification of threat reduction process


Download ppt "Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?"

Similar presentations


Ads by Google