Application
Updated: Dec-12-2023
Cimtrak Cyber Security Solution
CimTrak provides a bi-directional ticket/incident synchronization capability that communicates directly with BMC Helix ITSM, underscoring and enforcing that only planned and expected changes are allowed. By reconciling authorized changes against observed/detected changes, circumvented and malicious changes are immediately highlighted for corrective action. This process guarantees that only expected and authorized changes occur, ensuring a trusted and resilient infrastructure. The combined results drive higher operational availability while mitigating the risk of security threats and breaches.
Cimtrak Cyber Security Solution
CimTrak provides a bi-directional ticket/incident synchronization capability that communicates directly with BMC Helix ITSM, underscoring and enforcing that only planned and expected changes are allowed. By reconciling authorized changes against observed/detected changes, circumvented and malicious changes are immediately highlighted for corrective action. This process guarantees that only expected and authorized changes occur, ensuring a trusted and resilient infrastructure. The combined results drive higher operational availability while mitigating the risk of security threats and breaches.
Key Features
- System Hardening – CimTrak can validate and verify that your infrastructure is hardened and secure with either CIS Benchmarks or DISA STIGs as your root of trust.
- Configuration Management – CimTrak can provide management and control of configurations and baselines for an information system to enable security and facilitate the management of risk.
- Change Control – CimTrak can help facilitate the process of regulating and approving changes throughout the entire operational life cycle of an information system.
- Change Reconciliation – CimTrak can compare observed changes against expected/authorized changes to highlight unwanted change(s) that are then malicious or circumvented.
- Change Prevention – CimTrak can prevent changes entirely for those files and directories that should never change, avoiding the start of a security breach or problem.
- Roll-back and Remediation – CimTrak can restore to a trusted baseline, NOT to be confused with reprovisioning...these two are very different!
- File White-Listing – CimTrak provides a database of known and trusted files with a unique hash (fingerprint or signature) and metadata to validate and verify the integrity and authenticity of any OS file(s).
- File Reputation Services – CimTrak leverages various databases of malware and signatures that can be used as ancillary data to identify and block malicious and dangerous files from execution.
- Digesting STIX/TAXII Feeds – CimTrak can digest threat intelligence feeds to analyze and evaluate real-time security decisions and vulnerability risks.
- Workflow and Ticketing System – CimTrak integrates with workflow and ticketing systems to enable a process of reconciling authorized changes against observed changes.
Works with
Industry
Topic
Publisher
Partner