Risk
11/29/2012
05:43 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Agiliance Now Offers More Than 50 Data Connectors To Enable Real-Time Security Risk Intelligence And Remediation

Agiliance also introduced a new connector type called "Big Data"

Sunnyvale, Calif. - November 27, 2012 - Agiliance®, Inc., the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs, today announced that it has expanded its portfolio of data connectors by more than 45 percent from just nine months ago. With more than 50 connectors, Agiliance Agiliance RiskVisionT provides the industry's broadest range of security data collection capabilities. This broad and deep information gathering infrastructure enables organizations to gain insights into their risk and compliance posture by aggregating and correlating data from otherwise silo-based security and IT tools.

The rising tide of insider and advanced persistent threats, mounting regulatory pressure, and the impact of big security data on an organization's operational efficiency have led many progressive organizations to adopt a "risk-based" approach to security. This approach encompasses continuous (security) monitoring and frequent data assessments (e.g., on a weekly basis). It also necessitates automated security data collection, aggregation, and normalization from a variety of sources such as security information and event management (SIEM), asset management, threat feeds, and vulnerability scanners.

The Agiliance RiskVision Connector portfolio protects an organization's investment in existing best-of-breed security and IT tools and provides for a broad coverage of categories:

Configuration and Patch Management BMC® BladeLogic Automation Connector, IBM® Tivoli Endpoint Manager Connector (formerly BigFix), IBM Internet Security Systems Proventia® Management SiteProtector Connector, NetIQ® Secure Configuration Manager Connector (Web Services), NetIQ Secure Configuration Manager Connector (Big Data), Solarwinds® Orion Network Configuration Manager Connector, Symantec® AltirisT Security eXpress Connector, McAfee® ePolicy Orchestrator Connector, Microsoft® System Center Configuration Manager (SCCM) Connector, Tripwire® Enterprise for Security Configuration Management Connector, CiscoWorks® Network Compliance Manager (NCM) Connector, and Symantec® BindViewT Connector

Ticket Management BMC RemedyT Connector, HP® Service Manager Connector (formerly Peregrine), IBM Maximo Connector, and ServiceNow® Connector

Vulnerability Scanners - Assets DISA Gold Disk / Unix SRR Connector, eEye Digital Security® Retina Network Security Scanner Connector, Checklist Connector, McAfee Vulnerability Manager Connector, nCircle IP360T for Vulnerability Connector (Web Services), nCircle IP360 for Vulnerability Connector (Big Data), Qualys® QualysGuard® Vulnerability Connector (Web Services), Qualys QualysGuard Vulnerability Connector (Big Data), Skybox Security® Risk Exposure Analyzer Connector, Tenable Network Security® Nessus Connector (Web Services), Tenable Network Security Nessus Connector (Big Data), Rapid7® Nexpose Enterprise Connector, and RedSeal Networks® Vulnerability Advisor Connector

Vulnerability Scanners - Applications HP WebInspect Connector, IBM Rational AppScan Connector, HP Fortify Connector, and Veracode® Connector

Threat and Vulnerability Data Feeds / Advisory Services National Vulnerability Database (CPE, CVE, CWE) Connector (Web Services), National Vulnerability Database (CPE, CVE, CWE) Connector (Big Data), and VeriSign® iDefense® Security Intelligence Services Connector

Event and Incident Management HP ArcSight ESM Connector (Web Services), HP ArcSight ESM Connector (Big Data), Symantec Endpoint Protection Manager, BMC Remedy to Incident Connector, and Microsoft Exchange Event Management Connector

Data Loss Prevention Symantec DLP Connector (formerly Vontu)

Configuration Management Database BMC Atrium Connector, Microsoft Active Directory Connector, Symantec Altiris Asset Management Suite Connector, and HP Service Manager for Asset Management Connector

Application / Database Scans Application SecurityT AppDetectiveProT Connector and Application Security DbProtectT Connector

Generic Technology Agiliance Generic Database (SQL) Connector, Agiliance Generic Flat File Connector, and Agiliance Generic Web Services Connector

In addition to extending its connector portfolio, Agiliance also introduced a new connector type called "Big Data"; these are built specifically for big data performance scalability.

"With more than 50 data connectors, Agiliance has set a new standard for interconnecting otherwise silo-based security and IT tools," said Torsten George, vice president of worldwide marketing and products at Agiliance. "This breadth of Agiliance Connectors allows organizations to reduce costs by unifying data feeds from point products, streamlining monitoring processes, and creating situational awareness of threats. By gathering historic trend data Agiliance RiskVision also supports predictive security analysis in today's big data environments."

Connectors for Agiliance RiskVision are priced at US $15,000 each. Please visit the Agiliance website for more details.

About Agiliance

Agiliance is the leading independent provider of Integrated Risk Management solutions for Governance, Risk, and Compliance (GRC) programs. Agiliance RiskVision enables Global 2000 companies and government agencies to automate their GRC management processes; and the same platform orchestrates incident, threat, and vulnerability actions in real time. Unlike legacy offerings that take nearly a year to deploy, Agiliance customers demonstrate automation use cases within 30 days on-demand, and within 90 days on-premise, made possible by Agiliance RiskVision's configurable platform and applications, with a broad library of technology integrations, and GRC content. Agiliance RiskVision scales with businesses, effectively managing data, assets, people and processes to achieve 100 percent risk and compliance coverage. Its real-time risk analysis leads to optimized business performance and better investment decisions. For more information, please visit www.agiliance.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.