|
Assuria Auditor
Assuria
Auditor RA
Assuria Information Manager
Regulatory compliance
CVSS and
Assuria Auditor
Browser Web Interface
Assuria Auditor
WorkBench
OVAL Compatibility
Assuria and HP
Release
history
Supported
platforms
System
requirements
AssuriaOnline download centre |
Assuria
Auditor
|
In use by hundreds of major financial, telecoms,
pharmaceutical, federal, defence and other commercial enterprises
around the world, Assuria Auditor has been providing vital protection
for critical business servers since the late 1990’s. As a critical
element of the security infrastructure for these organisations,
Assuria Auditor is a market leader in countering the ‘insider threat’
to business integrity.
Assuria Auditor measures, manages and enforces security policies
across a wide range of operating systems using a host-to-network view
of critical systems and servers. Assuria Auditor assesses host
security, detecting and reporting system security weaknesses. Assuria
Auditor’s methodology simplifies the creation of system security
baselines for users, groups, shares, services and critical system
files, and easily fits in with existing business processes. Fully
scalable for enterprise installations, Assuria Auditor manages large
agent populations, with an optional web interface for distributed
security management.

|
|
|
Assuria Auditor Advantage
|
Policy Compliance
–
Assuria Auditor can be tailored to your requirements,
allowing you to adjust checks and policies to match the specific
requirements of your security configuration policy, thus ensuring
systems are compliant.
|
|
|
|
|
Change Detection
– Assuria
Auditor allows you to create a systems baseline and monitor the whole system
for any changes to that baseline. Change detection includes file
integrity monitoring.
|
|
|
|
|
Distributed Management
–
Enables distributed operational access to the Assuria
Auditor Console from anywhere on an enterprise network.
|
|
|
|
|
Fully Scalable
–
Assuria Auditor gives you the option to manage large
populations of agents from a single Assuria Auditor Console.
|
|
|
|
|
Powerful, Flexible Reporting
–
Standard reports, designed for both technical and
managerial audiences, identify areas of concern, the consequences of a
security breach and the remedy for each out-of-policy mis-configuration
or vulnerability.
|
|
|
|
|
Comprehensive database
- Assuria Auditor console database contain information of scans and
vulnerabilities found, this information is available to a number of
SIM products.
|
|
|
|
|
Auto Update
–
Regular security content updates ensure that hosts are
protected from even the most recent vulnerabilities and exploits.
|
|
|
|
|
Customizable Checks
–
Although Assuria supplies a large number of
vulnerability, mis-configuration and other conditions; additional
custom checks can be easily added via the Tcl scripting language.
|
|
|
|
|
Assuria
Auditor VITA the web browser option for users who require
distributed operational management access to the Assuria Auditor
Console(s).
|
|
|
|
Comply with your policy
|
Ensure your security configuration policy is consistently implemented
across your organization with Assuria Auditor. To get started contact
your local Assuria representative; visit the Assuria web site at
www.assuria.com or email to
info@assuria.co.uk
|
|
|
|
System Requirements
|
Supported
operating systems and Assuria Auditor system requirements are
available on the Assuria Web site at
www.assuria.com/documentation.htm.
|
|