Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Rollout: RedSeal's SRM: Page 2 of 4

RedSeal has simplified setup and configuration by making it possible to pull in data from Cisco IOS and PIX configurations, as well as Nessus or QualysGuard vulnerability scans. Manual system setup is possible, but by pulling in external configuration files, RedSeal SRM can get a better picture of how the network is really set up and more accurately analyze it.

There are many different methods for tracking vulnerabilities. Although the Common Vulnerabilities and Exposures list tries to provide a consistent method for naming vulnerabilities and exploits, many vendors provide their own advisory IDs, and vulnerability scanners may even refer to the same vendor advisory with different names. All these IDs can be complex to follow in a single environment. RedSeal has solved this problem by providing its own Threat Reference Library, which refers to other vendor advisories in an attempt to bring some consistency to your network. Vulnerability scan data can be compared against this library to come up with a common language to use across your network.

Riskmap Reveals Vulnerabilities

Once the analysis has been run, SRM creates a RiskMap for your network. This customizable diagram of your network provides quick visual feedback to the importance and exposure of your systems. Infrastructure elements are displayed individually, while subnets are presented as cylinders. The size and color of these cylinders quickly shows their business value (based on their size) and threat exposure (how much of the cylinder is colored red). With this basic data in hand, you can ask SRM to show where threats are coming from or where threats can be directed from a given subnet. This visualization tool helps you see how quickly, and following which paths, an attacker can leapfrog through your network. By following the links from subnet to subnet, you can find the holes that are most important to plug first.