ELEMENTAL CYBER SECURITY PLATFORM

GENERAL FEATURES


Holistic approach to cyber security, compliance and risk management aligning enterprise security investments with business objectives.

The Elemental solution provides a fully automated platform that unifies the key technologies required to drastically reduce security breach TTD – time to detection, effectively manage cyber security compliance lifecycle and mitigate IT risk. This comprehensive approach enables organizations to realize their internal cyber security and compliance goals by combining:

  • An extensive security controls and regulatory policy library
  • Tightly integrated controls governing configuration, inventory, and access to digital assets
  • Automated implementation, monitoring, and enforcement of security controls / policies
  • Auto-discovery of unauthorized or unmanaged devices
  • Continuous monitoring of system integrity
  • Measuring and reporting of system security posture, compliance, risk, and value of digital assets

Elemental Enterprise Features



Comprehensive Cyber Security, Policy and Risk Management Solution

By automating the many actions required for effectively managing security controls and policies, the Elemental Cloud Security Platform improves effectiveness, reduces costs, and enhances productivity of cyber security operations professionals.


The Elemental Approach:

  • Reduces time and cost for audits and reporting
  • Improves the efficiency of security and IT staff
  • Unifies visibility across cyber security controls
  • Provides business aligned metrics to measure the compliance, value, and risk of systems
  • Provides metrics to measure the security and compliance posture of systems
  • Provides ‘always-on’ network access control

The Elemental security policies, which are based on accepted industry best practices, address strategic security management initiatives such as: configuration management, inventory control, restricting network communications both within the network as well as across the perimeter, and preventing against the loss or theft of data. The Elemental solution comes with several thousands of individual rules (security controls) and an extensive set of user-editable policy templates for security benchmarks, regulatory requirements, and security best practices.


Business Aligned Security

The Elemental server and agent components implement security policies consistently across heterogeneous operating systems and throughout the multiple operational layers of networked computers. The Elemental system continuously monitors the configuration, usage, network activity, and inventory of all managed machines running the Elemental agent. It also provides automatic discovery and classification of unmanaged machines.

The ESP leverages this detailed visibility into the network to automatically and continually assess the value and risk of systems. The resulting risk adjusted view powers an automated policy management infrastructure that is tightly and demonstrably aligned with the requirements and goals of the business including: protecting customer data, securing intellectual property, demonstrating regulatory compliance and ensuring business continuity.


Elemental Security Operations Center

The Elemental server is the central control point for group definition, policy management, compliance and risk monitoring, and reporting.

Security policy deployments are precisely targeted, automatically deployed, and continuously updated. The ESP enables administrators to import groups from directory services or to specify groups of computers based on their common characteristics, networking behavior, security and risk posture, or user activity.

Report

The Elemental system provides extensive reporting capabilities, including a suite of executive dashboards, detailed views and histories of compliance, risk and value, network traffic activity, and trouble ticket administration. The ECSP reporting makes it easy for administrators to document the state of their networked systems and to identify changes that occur on individual systems or in the communications between systems.

High-level business-aligned reporting combined with drill-downs into the detailed technical information serves the needs of Chief Security Officers to report on the status of the organization's overall security and compliance efforts. At the same time, it enables IT security managers to address specific issues that may affect these metrics.



Key Features


Unparalleled Visibility

Auto-Discovery – The Elemental agents passively monitor the network for new computers. Unauthorized machines are quickly discovered and classified to identify their operating system, hardware details, and networking activity.

Network Communications – Detailed traffic information for both managed and unmanaged computers enables administrators to monitor and regulate traffic for systems, applications, users, and network segments.

Configuration – An in-depth profile of the operating system, network properties, application settings, and system configuration parameters.

Users and Accounts – Accounts and user logon activity are tracked by the Elemental ESP agent enabling implementation of policies based on the roles and entitlements of users.

Hardware and Software Inventory – The Elemental agent gathers a detailed summary of devices, installed applications, and running processes and services.


Security Policy Management

Unified Policy Infrastructure – A unified framework for cross-platform security and regulatory policies spanning network traffic, operating system, users, hardware devices, applications and data.

Automated Targeting and Deployment – Dynamic grouping of computers based on user defined criteria describing the configuration, activity, and inventory of individual machines enable policies to be precisely targeted and automatically updated.

Extensive Policy Library – The Elemental Security Platform ships with more than 2000 individual rules, plus an extensive array of editable, pre-defined policy templates for:

  • OS and application security baselines: NSA, CIS, NIST, DISA, and Microsoft
  • Regulatory requirements: SOX, PCI, HIPAA, FISMA, GLBA
  • Access controls to regulate network traffic between users, systems, and groups
  • HW / SW inventory and activity controls

Protect Critical Resources

Identifying and Containing Unauthorized Systems –Integrated host-level access controls ensure access is denied-whether these unauthorized systems are unknown machines discovered on the network, or known machines that have fallen out of compliance with required polices.

Layered Protection – As a value-add compliment to infrastructure level network admission control solutions ESP provides highly targeted, granular, and always-on host level access controls that ensures only secure and authorized machines are granted access to critical systems.


Risk Management

The ESP programmatically determines the value and risk of machines based on a myriad of observed characteristics, roles, behavior, and usage information. The ESP quantifies the value and risk of all machines on the network, both managed and unmanaged, through the analysis of factors including compliance, trust, system properties, the type and volume of networking activity, stored information, and the roles of machines and users. This capability identifies high value and at-risk systems enabling organizations to identify, mitigate, and manage IT risks.