Developers: | Innovative Protection Laboratory (Lens) |
Date of the premiere of the system: | 2024/11/14 |
Technology: | ITSM - IT Service Management Systems |
Main article: IT Service Management, ITSM
Configuration Control software is a proprietary design of LENS designed to automatically identify and eliminate errors vulnerabilities in the configurations used. software
2025: Inclusion in the register of domestic software
"Configuration control" is included in the Register of domestic software. The developer announced this on February 26, 2025. This was recorded on the basis of an order of the Ministry of Digital Development, Communications and Mass Media of the Russian Federation dated 12.02.2025 according to the minutes of the meeting of the expert council dated 31.01.2025 No. 58pr.
The solution developed in the Lens Innovation Protection Laboratory is designed to automatically identify and eliminate vulnerabilities caused by errors in the configurations of the software used.
Companies focused on an integrated approach in information security are paying close attention to the security of software configurations. On the one hand, the increased activity of cybercriminals forces us to look for effective ways to control erroneous and unsafe software settings, which can become a gateway for attackers to the corporate infrastructure. On the other hand, the focus on import substitution and the increased attention of regulators dictate the need for modern information security tools focused on domestic ecosystems of infrastructure and application software. In response to requests from our customers, we have integrated a large set of standards into the product for automated audit of software configurations, as well as provided tools for their deep customization. With our product, customers can perform in-depth infrastructure hardening, conduct regular express configuration audits for security against common attack tactics, and monitor the implementation of information security measures prescribed by regulators. The "Configuration Control" solution will help customers create reliable infrastructure solutions and services based on Russian software, said Leonid Klychev, product manager, "Linza."
|
Configuration Control software automatically checks IT asset configurations for compliance with safety standards based on regulatory requirements and corporate policies. The use of the solution allows you to reduce risks, cyber attacks reduce the burden on personnel and ensure effective interaction IT and information security departments of the enterprise. Configuration Control developers are actively developing the product and expanding its capabilities. As of February 2025, it works with configurations and, OS Linux with Windows web servers, DBMS and network equipment.
2024: Presentation of "Configuration Control
On November 14, 2024, the LENS Innovative Protection Laboratory presented the Configuration Control solution.
Configuration Control software automatically checks the configurations of IT assets for compliance with security standards based on regulatory requirements and corporate policies. The use of the solution can reduce the risks of cyber attacks, reduce the burden on personnel and ensure effective interaction between IT and information security departments of the enterprise.
In recent years, we have gained extensive experience in projects to analyze and create security standards for system and application software. These projects require not only detailed technical analysis, but also a deep understanding of the business processes of our customers. Often this aspect of security is not enough time or resources. With our integration flexibility and accumulated knowledge base, our product will help customers implement and scale this process across their IT infrastructure. said Sergey Terekhov, CEO of LENS.
|
Experts estimate that about a third of vulnerabilities in the corporate infrastructure are caused by unsafe software settings. "Configuration Control" is designed to solve this problem. The product is quickly deployed and easy to operate. Users have access to a set of secure configuration templates regularly updated by the developer. The content of all checks in the supplied templates is available for review and evaluation by the customer's administrators, which ensures the transparency of product use.
The solution is designed for a large range of corporate customers, regardless of industry affiliation and the size of the IT infrastructure. The regular use of Configuration Control allows you to build a continuous configuration security management process, ensuring that cyberattack risks are reduced, personnel are reduced, and IT and information security departments interact effectively.
The product will be of maximum benefit to companies that:
- need protection from targeted cyber attacks;
- use an IT infrastructure consisting of many typical segments (for example, in a branch network);
- import substitution is actively carried out in IT and APCS projects;
- are engaged in software development and monitor its safety;
- aim to scale and optimize the initially built configuration security management process.
Configuration Control is delivered in perpetual and term-limited licenses. The cost of the product depends on the amount of resources for which you need to manage the security of your software configurations.
In the immediate plans of the LENS company, the inclusion of Configuration Control in the Unified Register of Russian Programs for Electronic Computers and Databases.