GOALS AND OBJECTIVES
To protect company assets against cyber threats.
To implement a network vulnerability scanner.
- A solution from Tenable.sc
The network vulnerability scanner was implemented in accordance with the company’s roadmap for information security development, which was drawn up by Novotrans specialists in cooperation with Jet Infosystems consultants. Based on the results of pilot testing, a Tenable solution, which best met the company’s main requirements, was selected. Requirements included: ease of use, ability to integrate the solution into any subnet, and flexible settings for reporting.
One project-specific condition was implementation of a comprehensive solution at six sites located in different time zones. The solution had also to ensure equipment vulnerability verification at isolated facilities which are not united within a common corporate network.
Jet Infosystems engineers set up several types of reporting for users from IT, information security and various business units and implemented a separate version of the scanner on a laptop, for work at isolated sites; this laptop can, as a result, be used as a full-fledged workstation.
It took just two months for Novotrans information security specialists to eliminate highly critical vulnerabilities and significantly reduce the total number of vulnerabilities.
Project implementation timescale
Centrally scanned by information security specialists
Given that each of our group’s businesses has its own team and infrastructure, it is important for us to see which devices are being added in real time, whether they are desktop computers, laptops, network equipment or servers, and what the settings and software versions are. To be able to identify and fix configuration errors and vulnerabilities in a timely fashion, we decided to implement a scanner for network security analysis. Jet Infosystems specialists helped us to integrate this solution into our infrastructure on short timescales and at all sites, simultaneously.