RedSeal Systems Network Advisor v4.1 & Vulnerability Advisor v4.1
May 18, 2010
Red Seal Systems Inc.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Rapid implementation; integration to most industry security and network equipment.
- Weaknesses: No alerting or notification tools for a near real-time tool.
- Verdict: A very nice operational risk solution that has everything needed to take control of security posture management.
RedSeal Systems Network Advisor v4.1 and Vulnerability Advisor v4.1 are near real-time risk management solutions that use network and vulnerability data to determine risk and provide prioritized remediation recommendations. RedSeal Systems security posture management software enables organizations to assess and strengthen their cyberdefenses. Unlike systems that detect attacks once they occur, RedSeal identifies holes in the security infrastructure that create risk - before they are discovered by hackers.
RedSeal software analyzes and simplifies the complex interaction of firewalls, routers, load balancers and hosts, delivering an in-depth understanding of the enterprises' overall security posture, with continuous compliance with regulations, such as PCI, FISMA and SOX, and prescriptions for actionable steps to remediate risk.
Using its understanding of network controls, RedSeal transforms the output of vulnerability scanners into risk-prioritized action plans. RedSeal automatically prioritizes vulnerabilities based on their exposure to untrusted networks, as well as their ability to enable "pivot" attacks deeper into the network. The RedSeal tools also automatically identify potential mitigating network controls. The offerings can be integrated with GRC frameworks to feed IT risk into enterprise risk management systems.
We loved the reporting capabilities, especially the "what if" analysis capabilities. The product allows you to make a change in the management console and model that change using your network map and configuration data to graphically see how it change may or may not enhance your overall security posture. This product gives admins a great top-down view of the network and security posture at a true enterprise level and, more importantly, the dependencies and interdependencies of each control on others. Users will quickly be able to see graphically how risks may be able to move across assets or systems using the risk and threat vector overlays on the network topology maps.
The product is available as client-side software or as an integrated appliance. The software installs easily and runs on a Windows server and contains everything you need to run it. The ability to learn and map out your enterprise makes deploying this product very easy and gets you running very quickly. Eight-hours-a-day/five-days-a-week phone and email support is available for a fee.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Logjam attack exposes data passed over TLS connections
- Google releases Chrome 43, addresses 37 bugs
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes