ConfigOSSteelCloud
|
SDS IronSphereSoftware Diversified Services
|
|||||
Related Products
|
||||||
About
ConfigOS is currently implemented in classified and unclassified environments, tactical and weapon system programs, disconnected labs, and the commercial cloud. ConfigOS is client-less technology, requiring no software agents. ConfigOS scans endpoint systems and remediates hundreds of STIG controls in under 90 seconds. Automated remediation rollback as well as comprehensive compliance reporting and STIG Viewer Checklist output are provided. ConfigOS was designed to harden every CAT 1/2/3 STIG control around an application baseline in about 60 minutes - typically eliminating weeks or months from the RMF accreditation timeline. ConfigOS addresses Microsoft Windows workstation and server operating systems, SQL Server, IIS, IE, Chrome, and all of the Microsoft Office components. The same instance of ConfigOS addresses Red Hat 5/6/7, SUSE, Ubuntu, and Oracle Linux. ConfigOS content includes over 10,000 STIG and CIS controls. New functionality in Command Center includes a patent-pend
|
About
This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Insititutions requiring client-less technology that requires no software agents
|
Audience
Companies in search of a solution offering continuous mainframe security monitoring and auditing
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSteelCloud
Founded: 1987
United States
www.steelcloud.com
|
Company InformationSoftware Diversified Services
Founded: 1982
United States
www.sdsusa.com/security-software/automatic-mainframe-stig-monitoring/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
|
|
|