icon_CloudMgmt icon_DollarSign icon_Globe icon_ITAuto icon_ITOps icon_ITSMgmt icon_Mainframe icon_MyIT icon_Ribbon icon_Star icon_User icon_Users icon_VideoPlay icon_Workload icon_caution icon_close s-chevronLeft s-chevronRight s-chevronThinRight s-chevronThinRight s-chevronThinLeft s-chevronThinLeft s-trophy s-chevronDown

Application

Updated: Dec-12-2023

Cimtrak Cyber Security Solution

CimTrak provides a bi-directional ticket/incident synchronization capability that communicates directly with BMC Helix ITSM, underscoring and enforcing that only planned and expected changes are allowed. By reconciling authorized changes against observed/detected changes, circumvented and malicious changes are immediately highlighted for corrective action. This process guarantees that only expected and authorized changes occur, ensuring a trusted and resilient infrastructure. The combined results drive higher operational availability while mitigating the risk of security threats and breaches.

Cimtrak Cyber Security Solution

CimTrak provides a bi-directional ticket/incident synchronization capability that communicates directly with BMC Helix ITSM, underscoring and enforcing that only planned and expected changes are allowed. By reconciling authorized changes against observed/detected changes, circumvented and malicious changes are immediately highlighted for corrective action. This process guarantees that only expected and authorized changes occur, ensuring a trusted and resilient infrastructure. The combined results drive higher operational availability while mitigating the risk of security threats and breaches.

Key Features

  • System Hardening – CimTrak can validate and verify that your infrastructure is hardened and secure with either CIS Benchmarks or DISA STIGs as your root of trust.
  • Configuration Management – CimTrak can provide management and control of configurations and baselines for an information system to enable security and facilitate the management of risk.
  • Change Control – CimTrak can help facilitate the process of regulating and approving changes throughout the entire operational life cycle of an information system.
  • Change Reconciliation – CimTrak can compare observed changes against expected/authorized changes to highlight unwanted change(s) that are then malicious or circumvented.
  • Change Prevention – CimTrak can prevent changes entirely for those files and directories that should never change, avoiding the start of a security breach or problem.
  • Roll-back and Remediation – CimTrak can restore to a trusted baseline, NOT to be confused with reprovisioning...these two are very different!
  • File White-Listing – CimTrak provides a database of known and trusted files with a unique hash (fingerprint or signature) and metadata to validate and verify the integrity and authenticity of any OS file(s).
  • File Reputation Services – CimTrak leverages various databases of malware and signatures that can be used as ancillary data to identify and block malicious and dangerous files from execution.
  • Digesting STIX/TAXII Feeds – CimTrak can digest threat intelligence feeds to analyze and evaluate real-time security decisions and vulnerability risks.
  • Workflow and Ticketing System – CimTrak integrates with workflow and ticketing systems to enable a process of reconciling authorized changes against observed changes.

Works with

BMC Helix ITSM

Publisher

Partner