Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/29/2009
02:16 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lumension Integrates Network Frontiers' Unified Compliance Framework With Lumension Risk Manager

Integration gives Lumension Risk Manager customers direct access to UCF's compliance database

Scottsdale, AZ, Jun 29, 2009 -- Lumension', the global leader in operational endpoint security, has partnered with Network Frontiers, a leader in IT compliance, to deliver the world's most comprehensive global compliance database for Lumension's customers.

Network Frontiers' Unified Compliance Framework helps enterprises simplify and centralize compliance efforts by providing a single framework to establish a common set of methods, procedures, and controls across industry mandates, standards, requirements, and guidelines.

The UCF rationalizes IT controls for more than 400 international regulatory requirements, standards and guidelines into a single set of straightforward requirements that clearly map the many points where global, state and industry regulations overlap. This enables organizations to easily define commonalities among regulatory bodies; to leverage policies, processes and tools already in place; and to establish a streamlined, cost-effective plan to achieve continuous compliance across the enterprise. The integration of Network Frontiers' UCF and Lumension' Risk Manager (shipping in the second half of 2009), enables enterprises to manage compliance requirements more effectively by utilizing controls and standards that have been clearly defined and eliminate redundancy.

Through Lumension' Risk Manager, customers will have direct access to the UCF's comprehensive compliance database, allowing organizations to:

  • Create a single point of reference for hundreds of complex regulations, requirements and guidelines
  • Assert compliance across multiple authority documents simultaneously
  • Eliminate redundancies by eliminating overlapping requirements and documents
  • Drill down for comprehensive explanations and sources for each common control

    "Key to simplifying compliance management and reducing costs is leveraging the appropriate tools and technologies," said Brandon Dunlap, Managing Director of Research at Brightfly.

    "The Unified Compliance Framework allows security professionals to easily address hundreds of regulations by harmonizing a set of controls against which all regulatory standards and best practices are mapped. By adopting the UCF, compliance related technology vendors are providing a real value-add to their customers: to implement a single set of controls and comply with many different industry regulations and standards while reducing significant costs related to compliance with mandates such as PCI-DSS (Payment Card), Sarbanes Oxley, CobiT, NIST and many others."

    Director of Solution Marketing at Lumension Jeff Hughes commented: "As regulations and technology practices have mounted over the years, organizations continue to struggle to keep ahead of the latest requirements. Adding to the compliance chaos is the onslaught of new mandates that are introducing new standards, requirements, processes, controls, and guidelines. Enterprises need a way to link security activities with compliance mandates in order to fill gaps and provide visibility for auditors. Through the UCF, our customers can achieve a more cost effective, streamlined plan, reduce complexity and cut costs of compliance and audit by rationalizing their IT controls through a single framework for a cohesive look into the organization's compliance and risk posture."

    "Further, the UCF allows our customers to enhance their compliance and risk management efforts to manage critical risk and comply with multiple industry and global regulations under a single umbrella. I believe it's a great way to provide value-add for our customers by further simplifying regulatory mandates and bringing sanity to the world of compliance chaos."

    The UCF includes controls from a variety of regulations and guidelines, including Sarbanes-Oxley (SOX), Basel Data Security Standard (PCI DSS), NASD Manual, HIPAA, FERC Security Program, Uniform Electronic Transactions Act, IRS Revenue Procedure and Federal Rules of Civil Procedure.

    "The only way to take full advantage of the UCF is to leverage our common controls in a solution which incorporates the UCF," said Craig Isaacs, CEO of Network Frontiers. "Lumension Risk Manager leverages the UCF to ensure enterprises can get a broad and deep view of their security and regulatory profile, automatically identify key concerns, and remediate risk effectively and efficiently within the context of standardized compliance regulations and controls."

    Links to Lumension's Multimedia

  • Optimal Security Blog: Naked Truth about Compliance and Risk Management: Bottom Up vs. Top Down Approach
  • Optimal Security Videocast on Compliance and Risk Management
  • Whitepaper: Five Ways to Reduce Your Audit Tax Lumension is currently finalizing the integration of the UCF database and it will be made available to all Lumension customers currently utilizing Compliance and Risk Management solutions.

    About Lumension Security, Inc. Lumension Security, Inc., a global leader in operational endpoint security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Utah, Florida, Luxembourg, the United Kingdom, Spain, Australia, India, Hong Kong and Singapore. Lumension: IT Secured. Success Optimized.' More information can be found at www.lumension.com. About Network Frontiers Since 1992, Network Frontiers has developed ground-breaking tools to support IT best practices with a special focus on regulatory compliance, metrics, systems continuity and governance. The Unified Compliance Framework (UCF) is Network Frontiers' flagship product. By focusing on commonalities across regulations, standards-based development, and simplified architectures, the UCF supports a strategic approach to IT compliance that reduces cost, limits liability, and leverages the value of compliance-related technologies and services across the enterprise. The UCF's content and methodology is the direct result of Network Frontiers deep understanding of IT regulations and standards and decades of experience consulting for clients, publications, and vendors in the mission-critical IT arena. The UCF was created by Dorian Cougias and his research partner, Marcelo Halpern of the international law firm Latham and Watkins, which oversees all legal aspects of the UCF. More information can be found at www.unifiedcompliance.com.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Why Cyber-Risk Is a C-Suite Issue
    Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
    DevSecOps: The Answer to the Cloud Security Skills Gap
    Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
    Attackers' Costs Increasing as Businesses Focus on Security
    Robert Lemos, Contributing Writer,  11/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-5118
    PUBLISHED: 2019-11-18
    A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
    CVE-2019-12422
    PUBLISHED: 2019-11-18
    Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
    CVE-2012-4441
    PUBLISHED: 2019-11-18
    Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.
    CVE-2019-10764
    PUBLISHED: 2019-11-18
    In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which m...
    CVE-2019-19117
    PUBLISHED: 2019-11-18
    /usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.