nCircle Delivers Agentless Configuration Auditing For Virtualized InfrastructurenCircle Delivers Agentless Configuration Auditing For Virtualized Infrastructure
Solution ensures security and compliance with Center for Internet Security benchmarks for VMware
April 30, 2009
SAN FRANCISCO,April 21 /PRNewswire/ -- nCircle, the leader in automated security and compliance auditing solutions, today announced that its Configuration Compliance Manager(TM) (CCM) configuration auditing solution now audits the full VMware virtual infrastructure, from virtual machines to the hypervisor. nCircle CCM delivers new policies that audit the configurations of the virtual infrastructure and compare the configurations to Center for Internet Security (CIS) benchmarks, or hardening guides, to ensure the security of virtual machines and their hypervisor. The CIS benchmarks are accepted best practices for secure operation of VMware virtual machines and hypervisors.
Over the past few years, the use of virtualization in the enterprise has grown dramatically and so have the security concerns. The new IT platform of virtualization has given rise to new security issues that can occur through the mis-configuration of the hypervisor. "VM escape", can occur when a program running on a virtual machine gains access to the host system or another virtual machine, and is a clear example of the necessity of continuous audits of the entire virtual infrastructure.
"Enterprises are increasingly turning to virtual infrastructure in their datacenter," said Tim Keanini, Chief Technology Officer at nCircle. "nCircle CCM enables our customers to discover and audit the configurations of their virtual infrastructure along with the rest of their network, ensuring compliance with the CIS benchmark for VMware and improving security."
One of the advantages of virtualized systems is the speed by which they can be implemented. However, this also makes keeping track of virtual machines as they are deployed and re-deployed much more difficult than physical systems. nCircle Configuration Compliance Manager discovers virtual machines and hypervisors through agentless discovery technology and is then able to continuously audit the configurations of the virtual infrastructure through agentless configuration auditing. In the fast-moving world of virtual infrastructure, ensuring compliance with secure benchmarks and continuous configuration auditing is imperative.
About nCircle Suite360
nCircle provides the world's most comprehensive suite of solutions for agentless security and configuration auditing. nCircle's solutions combine the broadest discovery of networked systems and their operating systems, applications, vulnerabilities and configurations with advanced analytics to help enterprises reduce security risk and achieve compliance. nCircle's solutions include IP360(TM) for vulnerability and risk management, WebApp360(TM) for web application vulnerability auditing, Configuration Compliance Manager (CCM)(TM) for configuration auditing and file integrity monitoring, Certified PCI Scan Service(TM) for on-demand self-service PCI scanning, and Suite360 Intelligence Hub (TM) for IT governance, risk and compliance (ITGRC) reporting and analytics.
nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,000 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks