ELEMENTAL SECURITY PLATFORM
Holistic approach to security policy compliance and risk management aligning investment in enterprise IT security with business objectives.
The Elemental solution provides a fully automated platform that unifies the key technologies required to effectively manage security policies and IT risk. This comprehensive approach enables organizations to realize their regulatory compliance and internal security policy goals by combining:
- An extensive security and regulatory policy library
- Tightly integrated controls governing configuration, inventory, and access controls
- Automated implementation, monitoring, and enforcement of policies
- Auto-discovery of unauthorized or unmanaged devices
- Continuous monitoring of the compliance, risk, and value of machines
Comprehensive Single-product Policy and Risk Management Solution
By automating the many actions required for effectively managing policies, the Elemental Security Platform improves effectiveness, reduces costs, and enhances productivity of IT security administration.
The Elemental Approach:
- Reduces time and cost for audits
- Improves the efficiency of security and IT staff
- Unifies visibility across IT security controls
- Provides business aligned metrics to measure the compliance, value, and risk of systems
- Provides metrics to measure the security and compliance posture of systems
- Provides ‘always-on’ network access control
The policies, which are based on accepted industry best practices, address strategic security management initiatives such as: configuration management, inventory control, restricting network communications both within the network as well as across the perimeter, and preventing against the loss or theft of data. The ESP ships with more than 2000 individual rules and an extensive set of user-editable, policy templates for security benchmarks, regulatory requirements, and security best practices.
Business Aligned Security
The ESP server and agent components implement security policies consistently across heterogeneous operating systems and throughout the multiple operational layers of networked computers. The Elemental system continuously monitors the configuration, usage, network activity, and inventory of all managed machines running the Elemental ESP agent. It also provides automatic discovery and classification of unmanaged machines.
The ESP leverages this detailed visibility into the network to automatically and continually assess the value and risk of systems. The resulting risk adjusted view powers an automated policy management infrastructure that is tightly and demonstrably aligned with the requirements and goals of the business including: protecting customer data; securing intellectual property; demonstrating regulatory compliance; and ensuring business continuity.
Elemental ESP Server
The Elemental server is the central control point for group definition, policy management, compliance and risk monitoring, and reporting.
Policy deployments are precisely targeted, automatically deployed, and continuously updated. The ESP enables administrators to import groups from directory services or to specify groups of computers based on their common characteristics, networking behavior, security and risk posture, or user activity.
The Elemental server provides extensive reporting capabilities, including a suite of executive dashboards, detailed views and histories of compliance, risk and value, network traffic activity, and trouble ticket administration. The ESP reporting makes it easy for administrators to document the state of their networked systems and to identify changes that occur on individual systems or in the communications between systems.
High-level business-aligned reporting combined with drill-downs into the detailed technical information serves the needs of Chief Security Officers to report on the status of the organization's overall compliance efforts. At the same time, it enables IT security managers to address specific issues that may affect these metrics.
Unified Policy Infrastructure – A unified framework for cross-platform security and regulatory policies spanning network traffic, operating system, users, hardware devices, applications and data.
Automated Targeting and Deployment – Dynamic grouping of computers based on user defined criteria describing the configuration, activity, and inventory of individual machines enable policies to be precisely targeted and automatically updated.
Extensive Policy Library – The Elemental Security Platform ships with more than 2000 individual rules, plus an extensive array of editable, pre-defined policy templates for:
- OS and application security baselines: NSA, CIS, NIST, DISA, and Microsoft
- Regulatory requirements: SOX, PCI, HIPAA, FISMA, GLBA
- Access controls to regulate network traffic between users, systems, and groups
- HW / SW inventory and activity controls
Auto-Discovery – The Elemental agents passively monitor the network for new computers. Unauthorized machines are quickly discovered and classified to identify their operating system, hardware details, and networking activity.
Network Communications – Detailed traffic information for both managed and unmanaged computers enables administrators to monitor and regulate traffic for systems, applications, users, and network segments.
Configuration – An in-depth profile of the operating system, network properties, application settings, and system configuration parameters.
Users and Accounts – Accounts and user logon activity are tracked by the Elemental ESP agent enabling implementation of policies based on the roles and entitlements of users.
Hardware and Software Inventory – The Elemental agent gathers a detailed summary of devices, installed applications, and running processes and services.
The ESP programmatically determines the value and risk of machines based on a myriad of observed characteristics, roles, behavior, and usage information. The ESP quantifies the value and risk of all machines on the network, both managed and unmanaged, through the analysis of factors including compliance, trust, system properties, the type and volume of networking activity, stored information, and the roles of machines and users. This capability identifies high value and at-risk systems enabling organizations to identify, mitigate, and manage IT risks.
Protect Critical Resources
Identifying and Containing Unauthorized Systems –Integrated host-level access controls ensure access is denied-whether these unauthorized systems are unknown machines discovered on the network, or known machines that have fallen out of compliance with required polices.
Layered Protection – As a value-add compliment to infrastructure level network admission control solutions ESP provides highly targeted, granular, and always-on host level access controls that ensures only secure and authorized machines are granted access to critical systems.
Technical SpecificationsServer Platforms:
- Red Hat Enterprise Linux
- Sun Solaris
- Web-based management Interface:
- Internet Explorer
- Oracle Enterprise Edition
- Windows 2000 Pro
- Windows 2000 Server
- Windows 2003 Server
- Windows XP Pro
- Red Hat Enterprise Linux
- Sun Solaris
- IBM AIX
- Mac OS X
- Email Tickets
- Active Directory
- Supports up to 10,000 Elemental ESP agents per server