Call Us +31 (0)20-4822603|info@itamsoft.com
Belsecure2018-04-19T17:17:53+00:00

BelSecure – Configuration based Security

belarc-belsecure-button

The BelSecure Module automatically does a vulnerability assessment of your IT systems, checks security policies, configuration settings, and discovers other information about the host such as anti-virus status, application versions, security patches, user accounts and more. The policy settings are automatically compared with consensus benchmarks from NIST (USGCB and FDCC) and Center for Internet Security (CIS), which allow IT managers to automatically determine the security status of their IT assets in advance of an attack.

All of this vulnerability and configuration data is automatically collected, on a daily basis, in BelSecure’s central repository, or CMDB. This is the best approach for configuration based security.

Why are configurations important for IT security?

Many current threats, including Advanced Persistent Threats, are not stopped by perimeter security systems such as firewall and anti-virus systems. Setting and monitoring configurations based on consensus benchmarks is a critical step because this is a pro-active way to avoid many successful attacks.

Belarc cloud architecture for Discovery

belarc-cloud-architecture
CIS & NIST STANDARDS
SOFTWARE & HARDWARE ASSETS
VULNERABILITIES
USER PRIVILEGES
ENCRYPTION STATUS
ANTI-VIRUS STATUS
USB STORAGE USAGE

The First 5 CIS Controls

  • CSC 1: Inventory of Authorized and Unauthorized Devices.

  • CSC 2: Inventory of Authorized and Unauthorized Software.

  • CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.

  • CSC 4: Continuous Vulnerability Assessment and Remediation.

  • CSC 5: Controlled Use of Administrative Privileges.

Jump-start your Cybersecurity Strategy and download The First 5 Controls guide>>

BelSecure model features

  • Automated, daily vulnerability assessment, including all Microsoft OS and application vulnerabilities, Adobe vulnerabilities, anti-virus status, and more.

  • Web portal architecture. WAN based operation. Single Intranet server and database.

  • Automatic comparison with NIST’s FDCC and USGCB checklists.

  • Automatically collects all of the configuration and vulnerability data into a central repository, or CMDB.

  • Helps automate security processes such as FISMA, HIPAA and FFIEC.

White Paper

Securing the Enterprise – Cyber Security Myth & Reallity white paper

Enterprise-wide, standards-based, continuous monitoring of automated security controls.

White Paper

Mapping the NIST SP 800-53 security controls to Belarc’s products white paper

Belarc's products monitor many of the technical controls in the NIST document referenced

Product Requirements

  • Monitored Clients: Windows 10, 8, 7, Vista, and XP. BelManage offers both installable or agent-less solutions.

  • Server OS: Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 (64-bit or 32-bit), Windows Server 2003 (32-bit), or Windows 2000 Server.

  • Server Disk Space: 300 MB plus 1 MB per monitored client.

  • Server Database: MS SQL Server Express Edition (included); MS SQL Server 2014, 2012, 2008 R2, 2008, or 2005 (customer supplied option, no additional cost for interface module) or Oracle 11g or 10g (customer supplied option, additional € 5,000 cost for interface module).

BelSecure: Continuous Monitoring for Cyber Hygiene.

Try BelManage plus the BelSecure module for free on your own hosted demo server.

Try BelSecure Now>>