Developers: | Innovative Protection Laboratory (Lens) |
Date of the premiere of the system: | 2024/11/14 |
Technology: | ITSM - IT Service Management Systems |
Main article: IT Service Management, ITSM
Configuration Control software is a proprietary design of LENS designed to automatically identify and eliminate errors vulnerabilities in the configurations used. software
2024: Presentation of "Configuration Control
On November 14, 2024, the LENS Innovative Protection Laboratory presented the Configuration Control solution.
Configuration Control software automatically checks the configurations of IT assets for compliance with security standards based on regulatory requirements and corporate policies. The use of the solution can reduce the risks of cyber attacks, reduce the burden on personnel and ensure effective interaction between IT and information security departments of the enterprise.
In recent years, we have gained extensive experience in projects to analyze and create security standards for system and application software. These projects require not only detailed technical analysis, but also a deep understanding of the business processes of our customers. Often this aspect of security is not enough time or resources. With our integration flexibility and accumulated knowledge base, our product will help customers implement and scale this process across their IT infrastructure. said Sergey Terekhov, CEO of LENS.
|
Experts estimate that about a third of vulnerabilities in the corporate infrastructure are caused by unsafe software settings. "Configuration Control" is designed to solve this problem. The product is quickly deployed and easy to operate. Users have access to a set of secure configuration templates regularly updated by the developer. The content of all checks in the supplied templates is available for review and evaluation by the customer's administrators, which ensures the transparency of product use.
The solution is designed for a large range of corporate customers, regardless of industry affiliation and the size of the IT infrastructure. The regular use of Configuration Control allows you to build a continuous configuration security management process, ensuring that cyberattack risks are reduced, personnel are reduced, and IT and information security departments interact effectively.
The product will be of maximum benefit to companies that:
- need protection from targeted cyber attacks;
- use an IT infrastructure consisting of many typical segments (for example, in a branch network);
- import substitution is actively carried out in IT and APCS projects;
- are engaged in software development and monitor its safety;
- aim to scale and optimize the initially built configuration security management process.
Configuration Control is delivered in perpetual and term-limited licenses. The cost of the product depends on the amount of resources for which you need to manage the security of your software configurations.
In the immediate plans of the LENS company, the inclusion of Configuration Control in the Unified Register of Russian Programs for Electronic Computers and Databases.