SlideShare a Scribd company logo
1 of 4
Download to read offline
S T A T E M E N T F R O M B M C & P A R K P L A C E T E C H N O L O G E S
Information & Resources regarding SolarWinds Orion Incident
As many are aware, SolarWinds Orion products experienced a security incident that has
comprised private and public companies alike. BMC and Park Place Technologies are
sympathetic towards any organization that may have been impacted. Given our valued
relationship with you and your business, our security team has compiled and recommended
the following actions and resources to work through this incident, should you be comprised.
1. Review the most current information to determine if your version of software was
vulnerable. SolarWinds has published a security advisory. With an incident of this
magnitude, information is subject to change, so continue to review communications, and
check their website frequently. Depending on your risk tolerance, you may want to
immediately disconnect or power down related software.
2. If your software version has been impacted, start your incident response processes, and
engage your teams to start gathering information.
3. Ask your security team to review and check for indicators of compromise. This will help
you scope the incident and understand how to apply your resources for remediation.
Some good resources include:
a. FireEye Threat Research
b. FireEye Mandiant SunBurst Countermeasures (GitHub)
c. CISA Active Exploitation of SolarWinds Software Activity Report
d. Internet Storm Center Solarigate Report
e. DHS Emergency Directive 21-01
4. Monitor the progress of your security vendors. Signatures and detection capabilities will
be released, so make sure that your security tools are updated with the latest capabilities.
As a valued customer, if you’re temporarily shutting down your SolarWinds Orion Network
Management products and looking for alternative solutions to monitor and ensure uptime in
your infrastructure; we’d like to extend a 90-day free offer on Entuity Network Analytics to
assist you in monitoring your infrastructure while you work to isolate any potential
compromised hosts. Please reach out to us if you would like a demo of Entuity Network
Analytics software.
Additionally, BMC offers solutions that fully automate the remediation of network security
vulnerabilities, from detection of the exposure to closure, and deliver results 10X faster than
manual methods. Please reach out to us if you would like a demo or to learn more about
how Entuity minimizes the risk profile of vulnerabilities on your network, and how BMC can
improve your overall vulnerability management process.
GLOBAL HEADQUARTERS
5910 Landerbrook Drive | Cleveland, Ohio 44124 | United States
Offices and service locations world-wide.
CONTACT US
P: +1 877.778.8707
Toll-free access from 46 countries
ParkPlaceTechnologies.com
• AUTO DISCOVERY AND INVENTORY
• SUREPATH APPLICATION PATH MONITORING
• LIVE TOPOLOGY AND GEOGRAPHIC MAPS
• EVENTS MANAGEMENT
• ROOT CAUSE ANALYSIS
• CONFIGURATION MANAGEMENT AND MONITORING
• MULTI-CLOUD SUPPORT — AWS, AZURE
• SEAMLESS AND INFINITE SCALABILITY
• ELEMENTAL PERFORMANCE
• INTEGRATED TRAFFIC FLOW, NBAR SUPPORT
• CUSTOMIZABLE REPORTING / DYNAMIC DASHBOARDS
• INTEGRATED VIRTUAL / PHYSICAL MANAGEMENT
• 100% MOBILE RESPONSIVE
• THIRD PARTY VENDOR INTEGRATIONS AVAILABLE
Entuity Network Analytics Includes Everything You Need to Manage Your Digital Environment
Including:
Uncommon Versatility —
Integration with BMC Solutions
The powerful association between ENA and BMC
solutions allow users to better monitor application
health by detecting potential network problems
that may be affecting application service delivery.
ENA integration modules are also available for the
following BMC products:
• BMC TrueSight Network Automation
• BMC TrueSight Capacity Optimization
ENA Built-In Modules Supply
Specialized Functionality
Entuity Network Analytics contains modules for
specific management capabilities: SurePath
Application Monitoring, IBM BladeCenters, QoS,
MPLS, Firewalls, Cisco Unified Communications
Manager, Cisco IPSLA, Wireless, Cisco ACI, High
Availability, Routing Protocols and VPN Gateways.
Network Management for Today and Tomorrow
Representing a solid alternative to multiple disparate network tools and expensive platform solutions, Entuity Network Analytics is known for
its short training time and ease of management and administration. It adapts to how you wish to manage your environment and is up and
running within hours.
For more information visit: Entuity.com
The ENA NetFlow Dashboard provides at-a-glance traffic details for ease of monitoring.
© 2020 All rights reserved. Entuity is a trademark of Park Place Technologies.
All other company and product names are trademarks or registered
trademarks of their respective companies.
Entuity.com | DS-04-2020
E N T U I T Y N E T W O R K A N A LY T I C S D ATA S H E E T
PRODUCT DESCRIPTION
TrueSight Automation for Networks is a scalable, industry-leading solution that
automates the management of security vulnerabilities, configurations, compliance, and
provisioning. Network administrators can quickly take corrective action to reduce the
risk of breaches and reduce network outages. It also increases staff productivity and
allows labor to be shifted to more strategic tasks.
BUSINESS CHALLENGE
Today, IT organizations depend on high performing networks to keep their businesses
running at peak efficiency. They also need to make frequent network changes to
support new applications or business services. Additionally, new security threats emerge
every day, making it difficult to maintain a secure environment and achieve SLAs.
Often, these changes are executed manually, through device-by-device interactions via
CLIs or scripting. Detecting security vulnerabilities can require interfacing with
multiple hardware and software tools—and if a device is found to be vulnerable, IT
must take corrective action manually, risking errors that may cause expensive
downtime or failures.
BMC SOLUTION
TrueSight Automation for Networks helps close the window of vulnerability with
native, scan-less detection of security risks in real-time and one-touch rule generation
remediation actions. With this single solution, IT staff can manage physical and virtual
network devices, as well as SDN infrastructures, across most major platforms—
improving network agility and ensuring compliance.
Drive agility, security, and compliance across
your physical, virtual, and SDN infrastructure
TrueSight Automation
for Networks
KEY FEATURES
TrueSight Automation for Networks helps
admins automate and accelerate vulnerability
management, provisioning, configuration,
auditing, and maintenance of network
devices including routers, switches, load
balancers, firewalls, and IDS solutions.
•	Vulnerability management – Fast,
automated, scanless detection of
vulnerabilities and automated remediation
based on Cisco®
security advisories and the
National Vulnerability Database (NVD).
•	Compliance – Built-in templates for
regulatory compliance, plus closed-loop
change tracking.
•	SmartMerge – Auto-generate scripts to
execute changes or rollback entire
configurations without rebooting.
•	Real-time status – Get configuration,
compliance or security data from across
the entire network in minutes.
•	Scalability – Includes a multi-server
administration portal for greater scalability
and ease-of-use
KEY BENEFITS
•	Accelerate consistent, high-volume
network changes for greater uptime
•	Reduce mean time to resolution (MTTR)
with visibility into change details and
business services impacted
Intuitive, interactive UI facilitates
triage and remediation.
Datasheet
BMC, BMC Software, the BMC logo, and the BMC Software logo, and all other BMC Software product and service names are owned by BMC Software, Inc. and
are registered or pending registration in the US Patent and Trademark Office or in the trademark offices of other countries. All other trademarks belong to
their respective companies. © Copyright 2019 BMC Software, Inc.
About BMC
BMC delivers software, services, and expertise to help more than 10,000 customers, including 92% of the Forbes Global 100, meet escalating digital demands and
maximize IT innovation. From mainframe to mobile to multi-cloud and beyond, our solutions empower enterprises of every size and industry to run and reinvent
their businesses with efficiency, security, and momentum for the future.
BMC – Run and Reinvent	 www.bmc.com
PRODUCT DETAILS
Automated Security Vulnerability Management: Intuitive,
easy-to-use dashboards provide visibility to vulnerabilities,
analyze them, set priorities, link vulnerabilities to identified fixes
or configuration changes, and take automated corrective action.
Leverage out-of-the-box content for Cisco®
security advisories,
or NIST National Vulnerability DB for vulnerability remediation.
Use vulnerability management APIs to automate management of
vendor security vulnerability notifications.
Compliance: Use the compliance engine to apply standards for
regulatory and security regulations such as CIS and DISA.
Customized rule sets for other regulations or internal policies
can also be created. Automate audit preparation activities and
use built-in, customizable reports to demonstrate compliance.
Use integrated change management to close the loop on
automated compliance actions.
Virtualization and Cloud Computing: Rapidly provision and
configure large physical, virtual, and cloud environments.
Provisioning: With support for many vendors and virtualization
platforms, including SDN Controllers and wireless devices,
admins can expedite new multi-tiered networks, including
services for VLANs such as firewalling, load balancing, and WAN
acceleration. Deploy access control list (ACL) changes and
syntax scanning without disrupting the network.
Configuration: Implement a policy-based approach to configure
or change network devices with templates based on best
practices to simplify administration and ongoing maintenance.
*469696*
Administration: Leverage single-sign-on (SSO) for ease of use.
Auto import LDAP or AD users. Improve security and workload
sharing by controlling who can view and change configurations
through fine-grained role-based access control (RBAC). Use
multi-server administration to manage multiple TrueSight
Automation for Networks servers from a single console.
Broad Solution Support: Integrate with BMC Helix CMDB to
understand business service context before impacting device
configurations. Manage and document changes in ITSM with
TrueSight Orchestration to close the loop on continuous ITIL®
compliance.
OS Image Management: Manage OS images with built-in OS
image library and deploy actions. Includes support for remote
file servers for flexible implementation.
APIs and External Links/URLs: Develop custom workflow
automation to control TrueSight Automation for Networks
functions through in-bound APIs. Launch in context from other
applications to speed problem resolution.
Device Import: Import and start managing devices from discovery
tools such as BMC Discovery, CiscoWorks, Entuity Network
Analytics, HelpSystems™
Intermapper®
, Ipswitch®
WhatsUp Gold®
,
user-defined database query, or CSV formatted file.
Data Export: Feed event information from TrueSight
Automation for Networks into log analysis and management
solutions such as TrueSight Operations Management and Splunk
via syslog.
FOR MORE INFORMATION
To learn more about TrueSight Automation
for Networks, visit
bmc.com/it-solutions/truesight-network-
automation.html
Easily triage violations by device and severity.

More Related Content

What's hot

kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516Tony Evans
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityAdlan Hussain
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
Evaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesEvaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesSymantec
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA Adlan Hussain
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psAccenture
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation Adlan Hussain
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 

What's hot (20)

kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
Evaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesEvaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based Services
 
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA CNL Software White Paper - Driving Enterprise PSIM Through True SOA
CNL Software White Paper - Driving Enterprise PSIM Through True SOA
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Security sdn
Security sdnSecurity sdn
Security sdn
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 

Similar to BMC - Response to the SolarWinds Breach/Malware

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperTawnia Beckwith
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTawnia Beckwith
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...Perydot
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitiveCisco Canada
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Similar to BMC - Response to the SolarWinds Breach/Malware (20)

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management Provider
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Recently uploaded

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

BMC - Response to the SolarWinds Breach/Malware

  • 1. S T A T E M E N T F R O M B M C & P A R K P L A C E T E C H N O L O G E S Information & Resources regarding SolarWinds Orion Incident As many are aware, SolarWinds Orion products experienced a security incident that has comprised private and public companies alike. BMC and Park Place Technologies are sympathetic towards any organization that may have been impacted. Given our valued relationship with you and your business, our security team has compiled and recommended the following actions and resources to work through this incident, should you be comprised. 1. Review the most current information to determine if your version of software was vulnerable. SolarWinds has published a security advisory. With an incident of this magnitude, information is subject to change, so continue to review communications, and check their website frequently. Depending on your risk tolerance, you may want to immediately disconnect or power down related software. 2. If your software version has been impacted, start your incident response processes, and engage your teams to start gathering information. 3. Ask your security team to review and check for indicators of compromise. This will help you scope the incident and understand how to apply your resources for remediation. Some good resources include: a. FireEye Threat Research b. FireEye Mandiant SunBurst Countermeasures (GitHub) c. CISA Active Exploitation of SolarWinds Software Activity Report d. Internet Storm Center Solarigate Report e. DHS Emergency Directive 21-01 4. Monitor the progress of your security vendors. Signatures and detection capabilities will be released, so make sure that your security tools are updated with the latest capabilities. As a valued customer, if you’re temporarily shutting down your SolarWinds Orion Network Management products and looking for alternative solutions to monitor and ensure uptime in your infrastructure; we’d like to extend a 90-day free offer on Entuity Network Analytics to assist you in monitoring your infrastructure while you work to isolate any potential compromised hosts. Please reach out to us if you would like a demo of Entuity Network Analytics software. Additionally, BMC offers solutions that fully automate the remediation of network security vulnerabilities, from detection of the exposure to closure, and deliver results 10X faster than manual methods. Please reach out to us if you would like a demo or to learn more about how Entuity minimizes the risk profile of vulnerabilities on your network, and how BMC can improve your overall vulnerability management process.
  • 2. GLOBAL HEADQUARTERS 5910 Landerbrook Drive | Cleveland, Ohio 44124 | United States Offices and service locations world-wide. CONTACT US P: +1 877.778.8707 Toll-free access from 46 countries ParkPlaceTechnologies.com • AUTO DISCOVERY AND INVENTORY • SUREPATH APPLICATION PATH MONITORING • LIVE TOPOLOGY AND GEOGRAPHIC MAPS • EVENTS MANAGEMENT • ROOT CAUSE ANALYSIS • CONFIGURATION MANAGEMENT AND MONITORING • MULTI-CLOUD SUPPORT — AWS, AZURE • SEAMLESS AND INFINITE SCALABILITY • ELEMENTAL PERFORMANCE • INTEGRATED TRAFFIC FLOW, NBAR SUPPORT • CUSTOMIZABLE REPORTING / DYNAMIC DASHBOARDS • INTEGRATED VIRTUAL / PHYSICAL MANAGEMENT • 100% MOBILE RESPONSIVE • THIRD PARTY VENDOR INTEGRATIONS AVAILABLE Entuity Network Analytics Includes Everything You Need to Manage Your Digital Environment Including: Uncommon Versatility — Integration with BMC Solutions The powerful association between ENA and BMC solutions allow users to better monitor application health by detecting potential network problems that may be affecting application service delivery. ENA integration modules are also available for the following BMC products: • BMC TrueSight Network Automation • BMC TrueSight Capacity Optimization ENA Built-In Modules Supply Specialized Functionality Entuity Network Analytics contains modules for specific management capabilities: SurePath Application Monitoring, IBM BladeCenters, QoS, MPLS, Firewalls, Cisco Unified Communications Manager, Cisco IPSLA, Wireless, Cisco ACI, High Availability, Routing Protocols and VPN Gateways. Network Management for Today and Tomorrow Representing a solid alternative to multiple disparate network tools and expensive platform solutions, Entuity Network Analytics is known for its short training time and ease of management and administration. It adapts to how you wish to manage your environment and is up and running within hours. For more information visit: Entuity.com The ENA NetFlow Dashboard provides at-a-glance traffic details for ease of monitoring. © 2020 All rights reserved. Entuity is a trademark of Park Place Technologies. All other company and product names are trademarks or registered trademarks of their respective companies. Entuity.com | DS-04-2020 E N T U I T Y N E T W O R K A N A LY T I C S D ATA S H E E T
  • 3. PRODUCT DESCRIPTION TrueSight Automation for Networks is a scalable, industry-leading solution that automates the management of security vulnerabilities, configurations, compliance, and provisioning. Network administrators can quickly take corrective action to reduce the risk of breaches and reduce network outages. It also increases staff productivity and allows labor to be shifted to more strategic tasks. BUSINESS CHALLENGE Today, IT organizations depend on high performing networks to keep their businesses running at peak efficiency. They also need to make frequent network changes to support new applications or business services. Additionally, new security threats emerge every day, making it difficult to maintain a secure environment and achieve SLAs. Often, these changes are executed manually, through device-by-device interactions via CLIs or scripting. Detecting security vulnerabilities can require interfacing with multiple hardware and software tools—and if a device is found to be vulnerable, IT must take corrective action manually, risking errors that may cause expensive downtime or failures. BMC SOLUTION TrueSight Automation for Networks helps close the window of vulnerability with native, scan-less detection of security risks in real-time and one-touch rule generation remediation actions. With this single solution, IT staff can manage physical and virtual network devices, as well as SDN infrastructures, across most major platforms— improving network agility and ensuring compliance. Drive agility, security, and compliance across your physical, virtual, and SDN infrastructure TrueSight Automation for Networks KEY FEATURES TrueSight Automation for Networks helps admins automate and accelerate vulnerability management, provisioning, configuration, auditing, and maintenance of network devices including routers, switches, load balancers, firewalls, and IDS solutions. • Vulnerability management – Fast, automated, scanless detection of vulnerabilities and automated remediation based on Cisco® security advisories and the National Vulnerability Database (NVD). • Compliance – Built-in templates for regulatory compliance, plus closed-loop change tracking. • SmartMerge – Auto-generate scripts to execute changes or rollback entire configurations without rebooting. • Real-time status – Get configuration, compliance or security data from across the entire network in minutes. • Scalability – Includes a multi-server administration portal for greater scalability and ease-of-use KEY BENEFITS • Accelerate consistent, high-volume network changes for greater uptime • Reduce mean time to resolution (MTTR) with visibility into change details and business services impacted Intuitive, interactive UI facilitates triage and remediation. Datasheet
  • 4. BMC, BMC Software, the BMC logo, and the BMC Software logo, and all other BMC Software product and service names are owned by BMC Software, Inc. and are registered or pending registration in the US Patent and Trademark Office or in the trademark offices of other countries. All other trademarks belong to their respective companies. © Copyright 2019 BMC Software, Inc. About BMC BMC delivers software, services, and expertise to help more than 10,000 customers, including 92% of the Forbes Global 100, meet escalating digital demands and maximize IT innovation. From mainframe to mobile to multi-cloud and beyond, our solutions empower enterprises of every size and industry to run and reinvent their businesses with efficiency, security, and momentum for the future. BMC – Run and Reinvent www.bmc.com PRODUCT DETAILS Automated Security Vulnerability Management: Intuitive, easy-to-use dashboards provide visibility to vulnerabilities, analyze them, set priorities, link vulnerabilities to identified fixes or configuration changes, and take automated corrective action. Leverage out-of-the-box content for Cisco® security advisories, or NIST National Vulnerability DB for vulnerability remediation. Use vulnerability management APIs to automate management of vendor security vulnerability notifications. Compliance: Use the compliance engine to apply standards for regulatory and security regulations such as CIS and DISA. Customized rule sets for other regulations or internal policies can also be created. Automate audit preparation activities and use built-in, customizable reports to demonstrate compliance. Use integrated change management to close the loop on automated compliance actions. Virtualization and Cloud Computing: Rapidly provision and configure large physical, virtual, and cloud environments. Provisioning: With support for many vendors and virtualization platforms, including SDN Controllers and wireless devices, admins can expedite new multi-tiered networks, including services for VLANs such as firewalling, load balancing, and WAN acceleration. Deploy access control list (ACL) changes and syntax scanning without disrupting the network. Configuration: Implement a policy-based approach to configure or change network devices with templates based on best practices to simplify administration and ongoing maintenance. *469696* Administration: Leverage single-sign-on (SSO) for ease of use. Auto import LDAP or AD users. Improve security and workload sharing by controlling who can view and change configurations through fine-grained role-based access control (RBAC). Use multi-server administration to manage multiple TrueSight Automation for Networks servers from a single console. Broad Solution Support: Integrate with BMC Helix CMDB to understand business service context before impacting device configurations. Manage and document changes in ITSM with TrueSight Orchestration to close the loop on continuous ITIL® compliance. OS Image Management: Manage OS images with built-in OS image library and deploy actions. Includes support for remote file servers for flexible implementation. APIs and External Links/URLs: Develop custom workflow automation to control TrueSight Automation for Networks functions through in-bound APIs. Launch in context from other applications to speed problem resolution. Device Import: Import and start managing devices from discovery tools such as BMC Discovery, CiscoWorks, Entuity Network Analytics, HelpSystems™ Intermapper® , Ipswitch® WhatsUp Gold® , user-defined database query, or CSV formatted file. Data Export: Feed event information from TrueSight Automation for Networks into log analysis and management solutions such as TrueSight Operations Management and Splunk via syslog. FOR MORE INFORMATION To learn more about TrueSight Automation for Networks, visit bmc.com/it-solutions/truesight-network- automation.html Easily triage violations by device and severity.