• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Introduction to OESIS Framework
 

Introduction to OESIS Framework

on

  • 463 views

The OESIS Framework allows software engineers and technology vendors to enable the detection, assessment and remediation of third party applications in their solutions. It is ideal for adding endpoint ...

The OESIS Framework allows software engineers and technology vendors to enable the detection, assessment and remediation of third party applications in their solutions. It is ideal for adding endpoint compliance features to any solution, and is used by leading SSL VPN and NAC vendors such as Cisco, Citrix, Juniper, F5 and many others.

Statistics

Views

Total Views
463
Views on SlideShare
463
Embed Views
0

Actions

Likes
0
Downloads
3
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • 1 min

Introduction to OESIS Framework Introduction to OESIS Framework Presentation Transcript

  • Introduction to OESIS® FrameworkApril2013
  • Applications Manageability – OESIS FrameworkThe Mission
  • OESIS Framework Enables software engineers and technology vendors to developproducts that can detect, classify, and manage thousands of third-party software applications Enables implementing a simple and easy compliance check ofendpoints via embedded libraries Supported platforms include: Windows Mac OS X Linux Android iOS
  • OESIS Framework Support nearly any 3rd application in the market for:AntivirusAntispywarePersonal FirewallAntiphishingBackupPatch ManagementHard Disk EncryptionHealth AgentsURL FilteringData Loss PreventionPublic File SharingWeb BrowsersDesktop SharingVPN ClientsVirtual MachinesDevice AccessControlMobile Applicationso Androido iOS OESIS APIs for above application-types: here
  • AntivirusAPIsDetection APIs Retrieve the name and version of the antivirus product Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofing that can occur whenusing only WMIAssessment APIs Retrieve the count of malware signatures Retrieve the time of the last definition update Retrieve the real time protection status Retrieve the last full system scan time Retrieve the history of threat detections and actions performed to assessthe risk level of an endpoint (includes information such as threat name andseverity)Remediation APIs Launch a full system scan Enable real time protection Activate an update of the virus definitionsView Supported Apps: click here
  • Web Browser APIsDetection APIs Retrieve the name and version of the web browser Retrieve a list of installed browser extensions Check whether the browser is the default browser Determine which browsers are currently open on the machine Determine which sites are currently open in the browserAssessment APIs Retrieve the browsing history Determine whether the browsers popup blocker is enabledRemediation APIs Open a specific URL in the browser Close the browser Securely delete browsing historyView Supported Apps: click here
  • Hard Disk EncryptionAPIsDetection APIs Retrieve the name and version of the hard disk encryption product Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofingAssessment APIs Check the encryption state Get a list of supported encryption algorithms Retrieve encrypted locationsRemediation APIs Enable EncryptionView Supported Apps: click here
  • Virtual Machine APIsDetection APIs Retrieve the name and version of the virtual machine product Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofingAssessment APIs Determine if the virtual machine is running Retrieve a list of all VMs Retrieve details for each VM on the system including OS and versionRemediation APIs Stop a virtual machine Pause a virtual machineView Supported Apps: click here
  • Public File SharingAPIsDetection APIs Retrieve the name and version of the public file sharing application Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofingAssessment APIs Determine if the application is runningRemediation APIs Terminate the running applicationView Supported Apps: click here
  • OESIS Developer Testing Harness
  • OESIS Capability ChartsBy Product, by OS, by Version
  • Mobile CapabilitiesProduct CategoriesiOS additional category support in 2013!Compliance• Antivirus• Firewall• BackupManagement• MDM• MAMCompromising• MonitoringTools• LocationServices• GeoLocation
  • Android: Detection Name Vendor Version Is Authentic? Is Running? Remediation Launch ApplicationMobileAPIsiOS: Detection Name Vendor Is Running?Android and iOS
  • Mobile Testing Harness
  • OESIS User StoriesSSL VPN When granting remote network access, system administrators needthe ability to assess an endpoint to ensure that it will notcompromise the security of the network. Many SSL VPN solutionsprovide this ability to administrators by utilizing OESIS Frameworkto help power endpoint compliance checking.
  • OESIS User Stories Dell SonicWall
  • OESIS User Stories Citrix
  • OESIS User storiesNAC (Network Access Control) NAC solutions utilize OESIS to enable the creation and checkingof access policies. The solutions use OESIS to pull data fromendpoints that can be used to determine whether users mayconnect. For example, the policy might require that a deviceconnecting to the corporate network has all the latest antivirusdefinitions installed.
  • OESIS User stories Cisco
  • OESIS User stories Juniper Networks
  • User storiesSupport Tools Vendors who provide remote technology services to consumers andbusinesses to fix issues or configure endpoints utilize OESIS to build insome of their standard checks.
  • User stories F-Secure
  • User stories Support.com
  • User storiesMany more: Managed Services Vendors of cloud based IT Management solutions, utilize OESIS to powerfeatures of their cloud based applications. Compliance solutions and vulnerability assessment OESIS Framework provides extensive management capabilities that enableapplications in this market segment to meet compliance requirements or tomake sure that endpoints respond to security compliance mandates.
  • User stories iPass
  • User stories LogMeIn
  • OPSWAT Security ScoreFree demo of OESIS Frameworkhttp://www.opswat.com/products/security-score