Integrity control and compliance checks
Implementation of compliance checks. File integrity control in various operating systems (OS), virtualization environments (SV). Control of OS configurations and application software. Monitoring the security of containers and means of orchestration.
INTEGRITY CHECKCOMPLIANCE (ICC)
NETWORK ASFIREWALL ASSURANCE (FA)
CHANGE MANAGER (CM) SURANCE (NA)
Optimization and analysis of firewall access rules.
Network access policy control at the firewall rule level. Optimization of rule lists (ACLs), identification of anomalies and dangerous structures. Creation and assignment of requests for changing access rules.
Network topology analysis
Collecting and maintaining a secure database of network equipment configurations, analyzing compliance with standards and best practices. Visualization on a network map of possible routes for a given type of traffic. Identification of known vulnerabilities in accordance with the FSTEC database, CVE, OVAL, etc.
VULNERABILITY CONTROL (VС)
Vulnerability analysis
Checking the infrastructure for vulnerabilities. Calculation of attack vectors in the context of a network. Assessment of the probability of using a particular vulnerability of systems to eliminate this vector in a timely manner.
Centralized access control for users and administrators to network devices that support TACACS+ and RADIUS protocols. Profiling of user devices, support for guest Wi-fi portals.
More information
NETWORK ACCESS CONTROL (NAC)