CyberCop Scanner Getting Started Guide
CyberCop Scanner Getting Started Guide
CyberCop Scanner Getting Started Guide
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Benefits of Active Security<br />
<strong>CyberCop</strong> <strong>Scanner</strong> in Active Security<br />
The Internet and the increasingly complex security needs of today’s geographically<br />
distributed “virtual” corporations are pushing the limits of what a corporate IT<br />
department can be reasonably expected to handle. Network administrators are being<br />
asked to protect more and more with limited resources.<br />
Most system failures are due to user error, not product flaw or hacker attack. Security<br />
vulnerabilities are most often introduced accidentally by the very people the system<br />
administrator is trying to protect: the sometimes naive internal user. Detecting and<br />
correcting these multiplying vulnerabilities as they arise takes constant work because<br />
existing security analysis tools make it too hard to be thorough and fast enough — they<br />
generate huge amounts of data, force you to parse it all, and then it still takes a further<br />
human decision and a manual action, like running a program to shut down a network<br />
port, to address each problem. An administrator simply can’t be everywhere at once.<br />
There are lots of tools for finding network security vulnerabilities, and you may think<br />
that simply using the tools is enough. This is a dangerous misconception. What<br />
matters is what you configure them to look for, and what actually happens when they<br />
find vulnerabilities. Without a network security policy tailored to your particular<br />
requirements, no network security tool can effectively protect you.<br />
In other words, you need to have a network security policy that reflects your<br />
organization’s security goals, and you need to be certain that your policy is being<br />
reliably carried out. This means that the security system needs to actually implement<br />
the policy, actively responding to vulnerabilities as they’re detected, working<br />
automatically rather than waiting for a human’s attention. Only automated security<br />
policy enforcement tools will do the job these days.<br />
Of course, having the world’s best security policy and an elegant automatic security<br />
system won’t protect you if a hacker could simply crack the security system itself.<br />
Your policy enforcer has to protect itself from tampering, too.<br />
Active Security is all of that: a secure system that you can train to automatically take<br />
any action your policy calls for whenever it finds any network security vulnerability<br />
that concerns you. It’s a technology that enables you to be far more diligent about<br />
cleaning up security holes as they arise because it’s more thorough than a person and<br />
faster than a person — once you’ve set it up for your network security policies, your<br />
administrator just runs a scan and Active Security does the rest. You can configure the<br />
system to automatically take care of some of the problems it may find — and if Active<br />
Security detects a problem it can’t handle on its own, it can alert the administrator via<br />
pager or email.<br />
Active Security is your network administrator’s most valuable weapon in the constant<br />
uphill battle of maintaining your network security.<br />
<strong>CyberCop</strong> <strong>Scanner</strong> <strong>Getting</strong> <strong>Started</strong> <strong>Guide</strong> 1-3