Uploaded on Nov 11, 2022
BigFix® Compliance provides unified, real-time visibility and policy enforcement to protect complex, highly distributed environments. Designed to dramatically reduce compliance reporting overhead as well as enforce compliance to standards, BigFix Compliance can help organizations both protect endpoints and meet security compliance requirements and policies. This easy-to-manage, quick-to-deploy solution supports compliance initiatives for highly diverse environments —from servers to desktop PCs, mobile Internet-connected laptops, virtual servers, cloud-based systems, and specialized equipment such as point-of-sale devices, ATMs, and self-service kiosks.
Ensuring continuous compliance of security and regulatory policies
BigFix Compliance Ensuring continuous compliance of security and regulatory policies The number of security threats that compromise endpoints and cause business level damages have been continually growing. With an ever more mobile workforce and new cloud initiatives, the very nature of the endpoint is changing. Along with it, heightened regulatory concerns put additional burdens on over stretched IT groups. BigFix® Compliance provides unified, real-time visibility and policy enforcement to protect complex, highly distributed environments. Designed to dramatically reduce compliance reporting overhead as well as enforce compliance to standards, BigFix Compliance can help organizations both protect endpoints and meet security compliance requirements and policies. This easy-to-manage, quick-to-deploy solution supports compliance initiatives for highly diverse environments —from servers to desktop PCs, mobile Internet-connected laptops, virtual servers, cloud based systems, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks. Its low impact on endpoint operations can enhance productivity and improve user experience. By constantly enforcing policy compliance wherever endpoints roam, it helps reduce risk and increase audit visibility. Its intelligent agent’s speed and efficiency provide continuous compliance with automated audit cycles measured in minutes versus weeks. Highlights • Continuously enforce compliance to industry security benchmarks or standards such as CIS, DISA STIG and PCI for endpoints virtually running any OS, in any location with automatic remediation of configuration drifts back to compliance baselines • Over 20,000 out-of-the-box compliance checks are continuously updated to current standard, which dramatically reduces the need for compliance expertise and the effort to put all endpoints in compliance. • Track and report compliance historical trends across security configuration, patch and vulnerability, to assess endpoint security risk and demonstrate compliance progress over time • Monitor and manage the deployment status and health of leading third-party Endpoint Protection solutions • Manage and distribute patches to all endpoints, regardless of OS, location, connection and type • Support compliance controls for Windows 10 and macOS clients without agents via BigFix Modern Client Management • Speed vulnerability remediation by automating the manual correlation of vulnerability data from external sources with BigFix Insights for Vulnerability Remediation. Continuous Compliance Delivering a broad range of powerful BigFix’s continuous compliance technology virtually eliminates security functions visibility and compliance gaps. Continuous compliance puts rules and enforcement at the endpoint and loops through all BigFix Compliance includes the following key functions without assigned polices without pausing, ensuring the endpoint is adding additional infrastructure or implementation costs: always in a compliant state. Device discovery With BigFix Compliance, device discovery is no longer a snapshot counting exercise. Instead, it creates dynamic situational awareness about changing conditions in the infrastructure. The ability to scan the entire network frequently delivers pervasive visibility and control to help ensure that organizations quickly identify all IP-addressable devices—including virtual machines, network devices, and peripherals such as printers, scanners, routers, and switches, in addition to computer endpoints—with minimal network impact. This function helps maintain visibility into all endpoints, including mobile laptop and notebook computers that are roaming beyond the organization’s network. Patch management In contrast, traditional point-in-time management solutions Patch management includes comprehensive capabilities for “check in” at unpredictable times, reducing viability, creating delivering patches for Windows, UNIX, Linux and, macOS and for gaps and increased risk due to noncompliant systems. These third-party vendors, including Adobe, Mozilla, Apple, and Oracle, to gaps can be caused by: distributed endpoints—regardless of their location, connection type or status. • Disconnected endpoints which are off network A single management server can support up to 250,000 endpoints, • Critical patches released on Patch Tuesday may take days shortening patch times with no loss of endpoint functionality, even or weeks to deploy and validate over low bandwidth or globally distributed networks. Virtual patch management capabilities enable offline patching, making stale • Complete patch status reporting may take days or weeks virtual machine images a thing of the past. Real-time reporting provides information on which patches were deployed, when they • End user-initiated changes effecting security compliance were deployed, and who deployed them, as well as automatic confirmation that patches were applied, for a complete closed-loop Because of continuous compliance, BigFix can commonly solution to the patching process. deliver 99% compliance across the enterprise. BigFix Compliance capabilities Security configuration management Out of the box, BigFix Compliance provide an extensive list of BigFix Compliance provides many important capabilities checklists developed based on authoritative security benchmarks which include: published by CIS, DISA STIG, USGCB, PCI DSS. The checks in a checklist can be easily customized to support an organization’s • Providing a real-time and automatic assessment to security security policy. Once a checklist is applied to an endpoint, BigFix configurations, continuous enforcement of security policies, and continually evaluates the endpoint’s security configurations against effective remediation of configuration drifts -- all supporting the deployed checklist. Compliance status is also continually continuous compliance of self-healing endpoints across more collected and reported to the BigFix Server. Any configuration drift than 60 operating systems and applications. can be identified quickly and an administrator can remediate the configuration issue remotely. With such a powerful approach of • Supporting out-of-the-box security checklists based on industry monitoring, reporting, and remediating security configurations best-practice security benchmarks such as the Payment Card across the entire IT environment, an organization can enforce Industry Data Security Standard (PCI DSS), Center for Internet endpoint security policies, minimize security risks, and effectively Security (CIS), and Defense Information Systems Agency reduce endpoint management costs. Security Technical Implementation Guides (DISA STIGs). • Managing and distributing patches to all endpoints for a variety of operating systems and software applications. Compliance analytics • Tracking, analyzing and reporting on policy compliance status The compliance statuses of all endpoints against deployed policies and historical trends, across three key security domains — are continually collected, aggregated, and reported using a powerful security configuration, patch, and vulnerability. Compliance Analytics engine, database and user interface in BigFix Compliance. Various compliance reports, showing both current • Monitoring and managing the deployment status and health of status and historical trend for the entire deployment or individual various third-party endpoint protection solutions such as endpoint, provide comprehensive analytics to meet the various anti-virus and anti-malware tools. needs of security, IT operation, or compliance teams. With • Scanning the entire network for all IP-addressable devices to Compliance Analytics, an organization is able to track the discover any endpoints that are not managed by BigFix. effectiveness of its compliance effort and quickly identify security exposures and risks. Compliance Analytics provides consistent • Interrogating endpoints with a Query tool and predefined or reports across all three security domains: Security configuration, user-created queries and get precise answers back in seconds. Patch and Vulnerability. • Quarantining systems through the BigFix agent itself, isolating the target from the network while maintaining control and Security configuration reporting visibility through the BigFix agent for remediation. For all the security configuration checklists deployed across the • Integrating with other market leading security solutions to entire environment using BigFix Compliance, Compliance Analytics provide deeper endpoint intelligence, identify risks, and provides various reports to show both current status and historic remediate vulnerabilities more effectively. trend for individual endpoint, individual checklist, or even individual check. An aggregated compliance posture for the entire Having a near real-time, visibility across the organization, BigFix is deployment is also provided to report the overall status and indispensable when combating zero-day threats. With BigFix, the progress toward the desired security configuration policies. remediation cycles are short and fast, which enables an industry- leading, rapid-response for address Security issues. Quarantine of non-compliant systems Many organizations need to strictly control how endpoints can access the corporate intranet, based on endpoint status or configuration against a predefined policy. For example, an endpoint cannot access the intranet unless it has the latest security patch installed or has the latest virus definition used by its anti-virus tool. BigFix Compliance provides a self-quarantine capability, so if an endpoint is discovered to be out of compliance with an endpoint compliance policy, the endpoint is placed in network quarantine until compliance is achieved. A quarantined endpoint can still be managed by BigFix so that it can be remediated, but all other network access is disabled. Security Configuration Reporting Endpoint inspection Patch reporting BigFix Query provides real-time status of all your endpoints, enabling accurate identification and inspection of vulnerable Patch reporting extends the analytics and reporting capabilities of devices through a user-friendly web interface. You can interrogate BigFix Compliance from security configuration to security endpoints and get precise answers back in seconds, telling you patching. This feature allows an organization to gain a which policies are enforced and which applications and services comprehensive and historical view of patching activities across are installed. You can even examine files and system configuration the entire deployment to assess the overall patching posture. It settings to help you identify additional security threats. Users can can enable more efficient prioritization of vulnerability use a library of predefined queries or quickly and easily create remediation by identifying the critical and high severity patches their own custom queries. BigFix Query also verifies the that are yet to be applied. It also tracks when each patch is remediation of endpoints, helping to bridge the gap between released and applied to each endpoint to help organizations security and IT operations to choose the right technology for their demonstrate compliance with regulations/policies and pass environment. Payment Card Industry Data Security Standard (PCI-DSS) compliance The BigFix Compliance Payment Card Industry (PCI) Add-on is designed to help with the enforcement and compliance reporting needed to satisfy the latest PCI-DSS requirements. Specific PCI-DSS configuration and policy compliance checks, as well as specialized dashboards, simplify the monitoring and reporting of PCI compliance, and the capability to continuously and automatically manage system configuration and currency improve endpoint security and integrity. Together, these capabilities can protect organizations from the malicious or unintentional loss of confidential customer and financial Patch Reporting information while lowering operational and security administration costs. This can prevent the negative publicity, legal Vulnerability reporting and financial impacts of a payment card data breach. BigFix Compliance Vulnerability Reporting focuses on tracking and reporting of endpoints’ vulnerability posture as a result of patching actions, enabling organizations to more broadly identify risks and demonstrate compliance. This vulnerability reporting feature provides significant value to the organization by providing: • Risk Posture Assessment: A Security Operations Center Manager or Security Analyst can get the current status, historical trend and details of vulnerabilities of various severities existed on each endpoint or across the environment. • Remediation Task Prioritization: An IT Operations Specialist can get more information to help more effectively prioritize patching actions to maximize the impact to the vulnerability posture change. • Vulnerability Compliance Demonstration: A Compliance Specialist can report how vulnerabilities have been Example PCI DSS Requirement Compliance remediated by patching actions to demonstrate compliance with specific regulatory or organization policies. Multivendor endpoint protection management This feature gives administrators a single point of control for managing third-party endpoint security clients from vendors such as McAfee, Symantec, Trend Micro, Sophos, and Microsoft. With this centralized management capability, organizations can enhance the scalability, speed, and reliability of protection solutions. This feature monitors system health to ensure that endpoint security clients are always running and that virus signatures are updated. In addition to providing a unified view of disparate technologies, it facilitates migrating endpoints from one solution to another with “one-click” software removal and reinstalls. Closed-loop verification ensures that updates and other changes are completed, including Internet-enabled verification for Vulnerability Posture Overview endpoints disconnected from the network. Analytics and reporting Unlike complex tools that cover a limited portion of endpoints, the unified architecture of BigFix can effectively Organizations need to quickly report their organization’s threat manage and ensure compliance of all servers, desktops, and posture to executives and perform advanced analysis to drive next mobile devices whether they are in the office, at home or in steps. BigFix Insights provides a powerful endpoint and integration the cloud. BigFix can find and fix endpoints faster than any platform and database for deeper data insights across traditional other solution – delivering greater than 98% first-pass patch on-premise, cloud, and MDM API managed endpoints. BigFix Insights success rates. leverages Business Intelligence (BI) reporting tools to provide out-of-the-box and customizable reports. BigFix Insights is included BigFix integrates with leading vulnerability management with BigFix Compliance. solutions like Tenable and Qualys to dramatically reduce the time required to remediate vulnerabilities. It also extends its Vulnerability remediation well-established endpoint management capabilities to AWS, Azure, and Google clouds, enabling organizations to use a Currently it can take days or weeks for IT Operations to remediate single solution to manage multiple clouds and on-prem in a vulnerabilities after a vulnerability scan, exposing organizations to consistent manner. potential attacks. BigFix Insights for Vulnerability Remediation automates the typically manual correlation of vulnerability data from The unique approach of BigFix, coupled with thousands of Tenable or Qualys with remediation Fixlets available within BigFix. out-of-the-box security checks, will enhance your security Using BigFix Insights for Vulnerability Remediation, organizations can posture and automate the fight against ransomware and speed remediation of endpoint vulnerabilities across the enterprise by other cyberattacks. compressing the time from vulnerability assessment to remediation; dramatically reduce errors from spreadsheet-based, manual processes; and improve an enterprise’s security posture by reducing the attack surface across the fleet of endpoints. BigFix Insights for The BigFix Family Vulnerability Remediation is included with BigFix Compliance. BigFix is the only endpoint management platform that enables Modern client management IT operations and security teams to fully automate the discovery, management and remediation of vulnerabilities and Organizations are deploying Windows 10 and macOS endpoints assets – for every endpoint, whether its on-prem, virtual, cloud across the enterprise at an accelerated pace. Both operating systems or mobile– regardless of operating system, location or are capable of being managed using either a traditional agent or connectivity. Mobile Device Management (MDM) APIs. Leveraging both approaches together provides the greatest range of management and automation BigFix empowers businesses and organizations to find more, capabilities. BigFix Modern Client Management allows organizations fix more and do more, faster. the ability to manage both modern and legacy endpoints side-by-side using a single, enterprise endpoint management solution. BigFix The BigFix family includes: Modern Client Management is included with BigFix Compliance. • BigFix Lifecycle to automate endpoint lifecycle manage- Integration options ment by enabling software and operating system deploy- ment, continuous compliance, self-service software catalog, BigFix is integrated with other IT security solutions to extend its power management, server automation, and vulnerability functionalities and provide deeper endpoint intelligence, identity risks, remediation and remediate vulnerabilities more effectively. For example, BigFix is tightly integrated with Security Information and Event Management • BigFix Compliance to continuously monitor and enforce (SIEM) solutions such as IBM QRadar; Endpoint Detection and endpoint security configurations and ensure compliance Response (EDR) solutions such as Carbon Black; and Network Access with regulatory or organizational security policies using Control (NAC) solutions such as Forescout. thousands of out-of-the-box compliance checklists. Prerequisites • BigFix Inventory to discover and manage over 100,000 software titles, reduce software license costs and mitigate security risks of unauthorized software. The prerequisites for BigFix Compliance are available online at help.hcltechsw.com/bigfix/landing/index.html. • BigFix Insights unifies and analyzes data from BigFix and third-party solution providers with deep analytics, new business processes, and powerful reporting. Why BigFix? • BigFix Mobile extends modern endpoint management The HCL BigFix endpoint management platform helps IT Opera- capabilities to iOS and Android devices. tions with Continuous Compliance and Intelligent Automation to manage over 100 operating system versions, enabling stream- Visit www.hcltechsw.com/bigfix/offerings/products for more lined management processes, tool consolidation and operational information. cost reduction. . For more information To learn more about BigFix, contact your HCL Software representative, HCL Business Partner, or visit www.BigFix.com. About HCL Software HCL Software, a division of HCL Technologies (HCL) develops, markets, sells, and supports over 30 product families in the areas of Customer Experience, Digital Solutions, DevSecOps, and Security and Automation. HCL Software is the cloud native solution factory for enterprise software and powers millions of apps at more than 20,000 organizations, including over half of the Fortune 1000 and Global 2000 companies. HCL Software's mission is to drive ultimate customer success with its IT investments through relentless product innovation. © Copyright 2021 HCL All product names, trademarks and registered trademarks are property of their respective owners. 072021
Comments