28.06.2014 Views

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Benefits of Active Security<br />

<strong>CyberCop</strong> <strong>Scanner</strong> in Active Security<br />

The Internet and the increasingly complex security needs of today’s geographically<br />

distributed “virtual” corporations are pushing the limits of what a corporate IT<br />

department can be reasonably expected to handle. Network administrators are being<br />

asked to protect more and more with limited resources.<br />

Most system failures are due to user error, not product flaw or hacker attack. Security<br />

vulnerabilities are most often introduced accidentally by the very people the system<br />

administrator is trying to protect: the sometimes naive internal user. Detecting and<br />

correcting these multiplying vulnerabilities as they arise takes constant work because<br />

existing security analysis tools make it too hard to be thorough and fast enough — they<br />

generate huge amounts of data, force you to parse it all, and then it still takes a further<br />

human decision and a manual action, like running a program to shut down a network<br />

port, to address each problem. An administrator simply can’t be everywhere at once.<br />

There are lots of tools for finding network security vulnerabilities, and you may think<br />

that simply using the tools is enough. This is a dangerous misconception. What<br />

matters is what you configure them to look for, and what actually happens when they<br />

find vulnerabilities. Without a network security policy tailored to your particular<br />

requirements, no network security tool can effectively protect you.<br />

In other words, you need to have a network security policy that reflects your<br />

organization’s security goals, and you need to be certain that your policy is being<br />

reliably carried out. This means that the security system needs to actually implement<br />

the policy, actively responding to vulnerabilities as they’re detected, working<br />

automatically rather than waiting for a human’s attention. Only automated security<br />

policy enforcement tools will do the job these days.<br />

Of course, having the world’s best security policy and an elegant automatic security<br />

system won’t protect you if a hacker could simply crack the security system itself.<br />

Your policy enforcer has to protect itself from tampering, too.<br />

Active Security is all of that: a secure system that you can train to automatically take<br />

any action your policy calls for whenever it finds any network security vulnerability<br />

that concerns you. It’s a technology that enables you to be far more diligent about<br />

cleaning up security holes as they arise because it’s more thorough than a person and<br />

faster than a person — once you’ve set it up for your network security policies, your<br />

administrator just runs a scan and Active Security does the rest. You can configure the<br />

system to automatically take care of some of the problems it may find — and if Active<br />

Security detects a problem it can’t handle on its own, it can alert the administrator via<br />

pager or email.<br />

Active Security is your network administrator’s most valuable weapon in the constant<br />

uphill battle of maintaining your network security.<br />

<strong>CyberCop</strong> <strong>Scanner</strong> <strong>Getting</strong> <strong>Started</strong> <strong>Guide</strong> 1-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!