The RedSeal 6 Platform continuously models end-to-end access permitted by complex enterprise security controls to identify the most critical points of weakness—providing unprecedented security business intelligence and a compelling ROI.
Security Risk Management with RedSeal Networks
Network Topology Map
The network topology map created by the RedSeal 6 Platform is an interactive model of the layer
3 / 4 network security architecture. It visualizes all possible access paths from any source to any destination on any port or protocol.
- Map the specific topology of all firewalls, routers, mobile device controllers and other security devices deployed across the entire network to understand precisely where and how defenses are aligned.
- Analyze access across all of those devices to model precisely how they are implemented to permit or deny entrance to the network and sensitive assets.
Demarcate specific groups of devices and create zones based on assets’ business functionality to assess how access is allowed or prevented related to organizational demands.
Visualization of Mobile Networks
for BYOD Initiatives
As consumer technology products permeate into the corporate IT ecosystem, unauthorized BYOD access to the internal network is a critical concern, potentially leading to compromise of critical assets or the propagation of cross-platform malware. The ability to recognize wireless device controllers and monitor BYOD devices for policy violations between the wired and mobile network is critical for many organizations.
Deploying Mobile Device Management (MDM) and/or Mobile Application Management (MAM) solutions go a long way to securing the enterprise against BYOD threats. However, these solutions have limitations – especially
when the access between the WLAN and the corporate
network is not audited or monitored to ensure compliance
against defined access policies.
Validation of Mobile Access Policy
RedSeal solves this issue by modeling mobile device controllers and validating that mobility access is compliant with regulatory and internal policies.
Best Practice Checks Determine
Minimum Baselines of Security
Based on the ubiquitous nature of change in enterprise networks, along with ever-more-sophisticated threats, most organizations struggle to understand whether the security policies they have implemented are functioning properly. Lost in an unmanageable mountain of configuration information, devices are often left vulnerable to the most basic type of exploit due to oversight or misconfiguration. RedSeal gives management the ability to measure the baseline of device security configurations deployed throughout the organization with the help of automation. This allows organizations to:
- Automatically analyze the current deployment of all network security devices in relation to over 120 best practice checks including those published by NIST, ISO, DISA and individual device vendors.
- Comprehensively assess network-wide access within the context of organizational policies to ensure adherence and identify problems proactively.
- Identify direct access enabled to any critical systems from the Internet or other external or untrusted networks.
Quantifying and Qualifying Risk
Using reports and interactive analysis such as the patented RedSeal Risk Map organizations can quickly identify the sources that induce the most risk across the entire network. The data could span tens of thousands of network devices and hundreds of thousands of hosts, but all this of this complexity is visually quantified in a single screen. The key is to analyze the data in context to the network access paths and whether or not the vulnerabilities are directly or indirectly exposed to narrow the focus on the most critical and immediate systems posing risk.
Reporting and Metrics
Large enterprise networks are typically overseen by a diverse set of management and operational staff, making it extremely difficult to effectively communicate all the information needed by different constituencies to enact change and understand how trends impact their domains. RedSeal empowers security management to distribute key security information and metrics across the entire organization to:
- Communicate key security performance metrics to business management and operational staff to illustrate trends and highlight the efficacy of ongoing programs.
- Create heat maps and other visualizations that can be used to demonstrate risk across varied constituencies and illustrate problematic issues clearly to stakeholders.
- Use the REST API framework to integrate RedSeal data into enterprise reporting systems, SIEM and other applications to enable unified security management.
- Providing auditors with detailed proof demonstrating that compliance is being maintained continuously and validated via automation on a regular basis.