IT Operations Management (ITOM)
cancel

Don’t wait for a data breach to hit headlines, act now!

Don’t wait for a data breach to hit headlines, act now!

Micro Focus Contributor

Did you know that the longer it takes to detect a breach, the more expensive it will be? According to a study by Ponemon Institute, the global average cost of a data breach increased by $3.86 million, a 6.4% increase compared to last year.

Data breaches and security vulnerabilities put customers and corporate data at risk. In addition to the direct costs incurred, there are innumerable indirect costs of a data breach. Direct costs include the expenses to reduce the damage caused by the breach, for example, the cost to protect the identity of victims and legal aid. More troubling are the indirect costs, which include lasting damage to a company’s brand and the loss of potential new customers. If these breaches and vulnerabilities aren’t detected in a timely manner, the consequences can be extensive and damaging. Data Center Automation (DCA) provides a solution, giving visibility into vulnerability risks across the data center.

The DCA risk dashboard shows vulnerability risks across server OS using:

  • Common Vulnerabilities and Exposures (CVEs) data listed in the National Vulnerability Database (NVD), the U.S. government’s standards-based vulnerability management data repository. The NVD data is used to identify the latest vulnerabilities published by severity and date.
  • Patch metadata from OS vendors.
  • Patch scan results which indicate the patches required to remediate impacted resources.

DCA reports this information to give an actionable risk dashboard (see Figure 1).

Figure 1: DCA risk dashboardRisk dashboard.png

DCA Role-based access control (RBAC) controls what is visible on the risk dashboard. RBAC facilitates granular access control allowing only authorized users to access the data center resources based on their roles.

  1. Key risks – widgets can be configured to track trending vulnerabilities. The graphs indicate weekly trends of how many resources are impacted.
  2. Most recent vulnerabilities (Critical and High) – displays the most recent vulnerabilities and the number of resources that are impacted by those vulnerabilities.
  3. Resource vulnerability – shows the resource vulnerability exposure. The color-coded segments show the distribution of the resource vulnerabilities (vulnerable, not vulnerable, exception approved, and not measured).
  4. Resource type by CVE – shows the severity of risk by resource types in the data center i.e. critical, high, and medium.
  5. Vulnerability age – indicates how long the vulnerability has been in the data center. As older risks are easier to exploit hence, the dashboard helps prioritize the vulnerabilities based on age and risk state.

Micro Focus DCA is a one-stop shop to:

  • Manage vulnerability risk in the data center.
  • View vulnerabilities and compliance risks in a single risk dashboard.
  • Stay updated on the latest vulnerabilities in the data center.
  • Prioritize risks for remediation.

For more information on product features and technical guides, visit the DCA customer documentation.

For more information on what’s new in DCA, use cases, product discussions, idea exchanges, videos and blogs see the ITOM Practitioner Portal.

0 Kudos