Introduction to OESIS® FrameworkApril2013
Applications Manageability – OESIS FrameworkThe Mission
OESIS Framework Enables software engineers and technology vendors to developproducts that can detect, classify, and manag...
OESIS Framework Support nearly any 3rd application in the market for:AntivirusAntispywarePersonal FirewallAntiphishingBac...
AntivirusAPIsDetection APIs Retrieve the name and version of the antivirus product Verify product authenticity: Ensure t...
Web Browser APIsDetection APIs Retrieve the name and version of the web browser Retrieve a list of installed browser ext...
Hard Disk EncryptionAPIsDetection APIs Retrieve the name and version of the hard disk encryption product Verify product ...
Virtual Machine APIsDetection APIs Retrieve the name and version of the virtual machine product Verify product authentic...
Public File SharingAPIsDetection APIs Retrieve the name and version of the public file sharing application Verify produc...
OESIS Developer Testing Harness
OESIS Capability ChartsBy Product, by OS, by Version
Mobile CapabilitiesProduct CategoriesiOS additional category support in 2013!Compliance• Antivirus• Firewall• BackupManage...
Android: Detection Name Vendor Version Is Authentic? Is Running? Remediation Launch ApplicationMobileAPIsiOS: Det...
Mobile Testing Harness
OESIS User StoriesSSL VPN When granting remote network access, system administrators needthe ability to assess an endpoin...
OESIS User Stories Dell SonicWall
OESIS User Stories Citrix
OESIS User storiesNAC (Network Access Control) NAC solutions utilize OESIS to enable the creation and checkingof access p...
OESIS User stories Cisco
OESIS User stories Juniper Networks
User storiesSupport Tools Vendors who provide remote technology services to consumers andbusinesses to fix issues or conf...
User stories F-Secure
User stories Support.com
User storiesMany more: Managed Services Vendors of cloud based IT Management solutions, utilize OESIS to powerfeatures o...
User stories iPass
User stories LogMeIn
OPSWAT Security ScoreFree demo of OESIS Frameworkhttp://www.opswat.com/products/security-score
Upcoming SlideShare
Loading in …5
×

Introduction to OESIS Framework

461
-1

Published on

The OESIS Framework allows software engineers and technology vendors to enable the detection, assessment and remediation of third party applications in their solutions. It is ideal for adding endpoint compliance features to any solution, and is used by leading SSL VPN and NAC vendors such as Cisco, Citrix, Juniper, F5 and many others.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
461
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 1 min
  • Introduction to OESIS Framework

    1. 1. Introduction to OESIS® FrameworkApril2013
    2. 2. Applications Manageability – OESIS FrameworkThe Mission
    3. 3. OESIS Framework Enables software engineers and technology vendors to developproducts that can detect, classify, and manage thousands of third-party software applications Enables implementing a simple and easy compliance check ofendpoints via embedded libraries Supported platforms include: Windows Mac OS X Linux Android iOS
    4. 4. OESIS Framework Support nearly any 3rd application in the market for:AntivirusAntispywarePersonal FirewallAntiphishingBackupPatch ManagementHard Disk EncryptionHealth AgentsURL FilteringData Loss PreventionPublic File SharingWeb BrowsersDesktop SharingVPN ClientsVirtual MachinesDevice AccessControlMobile Applicationso Androido iOS OESIS APIs for above application-types: here
    5. 5. AntivirusAPIsDetection APIs Retrieve the name and version of the antivirus product Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofing that can occur whenusing only WMIAssessment APIs Retrieve the count of malware signatures Retrieve the time of the last definition update Retrieve the real time protection status Retrieve the last full system scan time Retrieve the history of threat detections and actions performed to assessthe risk level of an endpoint (includes information such as threat name andseverity)Remediation APIs Launch a full system scan Enable real time protection Activate an update of the virus definitionsView Supported Apps: click here
    6. 6. Web Browser APIsDetection APIs Retrieve the name and version of the web browser Retrieve a list of installed browser extensions Check whether the browser is the default browser Determine which browsers are currently open on the machine Determine which sites are currently open in the browserAssessment APIs Retrieve the browsing history Determine whether the browsers popup blocker is enabledRemediation APIs Open a specific URL in the browser Close the browser Securely delete browsing historyView Supported Apps: click here
    7. 7. Hard Disk EncryptionAPIsDetection APIs Retrieve the name and version of the hard disk encryption product Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofingAssessment APIs Check the encryption state Get a list of supported encryption algorithms Retrieve encrypted locationsRemediation APIs Enable EncryptionView Supported Apps: click here
    8. 8. Virtual Machine APIsDetection APIs Retrieve the name and version of the virtual machine product Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofingAssessment APIs Determine if the virtual machine is running Retrieve a list of all VMs Retrieve details for each VM on the system including OS and versionRemediation APIs Stop a virtual machine Pause a virtual machineView Supported Apps: click here
    9. 9. Public File SharingAPIsDetection APIs Retrieve the name and version of the public file sharing application Verify product authenticity: Ensure that the installed product has beensigned by the vendor to protect against spoofingAssessment APIs Determine if the application is runningRemediation APIs Terminate the running applicationView Supported Apps: click here
    10. 10. OESIS Developer Testing Harness
    11. 11. OESIS Capability ChartsBy Product, by OS, by Version
    12. 12. Mobile CapabilitiesProduct CategoriesiOS additional category support in 2013!Compliance• Antivirus• Firewall• BackupManagement• MDM• MAMCompromising• MonitoringTools• LocationServices• GeoLocation
    13. 13. Android: Detection Name Vendor Version Is Authentic? Is Running? Remediation Launch ApplicationMobileAPIsiOS: Detection Name Vendor Is Running?Android and iOS
    14. 14. Mobile Testing Harness
    15. 15. OESIS User StoriesSSL VPN When granting remote network access, system administrators needthe ability to assess an endpoint to ensure that it will notcompromise the security of the network. Many SSL VPN solutionsprovide this ability to administrators by utilizing OESIS Frameworkto help power endpoint compliance checking.
    16. 16. OESIS User Stories Dell SonicWall
    17. 17. OESIS User Stories Citrix
    18. 18. OESIS User storiesNAC (Network Access Control) NAC solutions utilize OESIS to enable the creation and checkingof access policies. The solutions use OESIS to pull data fromendpoints that can be used to determine whether users mayconnect. For example, the policy might require that a deviceconnecting to the corporate network has all the latest antivirusdefinitions installed.
    19. 19. OESIS User stories Cisco
    20. 20. OESIS User stories Juniper Networks
    21. 21. User storiesSupport Tools Vendors who provide remote technology services to consumers andbusinesses to fix issues or configure endpoints utilize OESIS to build insome of their standard checks.
    22. 22. User stories F-Secure
    23. 23. User stories Support.com
    24. 24. User storiesMany more: Managed Services Vendors of cloud based IT Management solutions, utilize OESIS to powerfeatures of their cloud based applications. Compliance solutions and vulnerability assessment OESIS Framework provides extensive management capabilities that enableapplications in this market segment to meet compliance requirements or tomake sure that endpoints respond to security compliance mandates.
    25. 25. User stories iPass
    26. 26. User stories LogMeIn
    27. 27. OPSWAT Security ScoreFree demo of OESIS Frameworkhttp://www.opswat.com/products/security-score

    ×