Increased systems security tops virtually every organizational list as the area where continued improvements are critical. Protection from malicious threats or accidental loss surrounding the confidentiality, integrity or availability of information is not only a business requirement for today’s organization, but increasingly a legal and ethical one.
K1000 security audit and enforcement is an easy-to-use, cost effective appliance-based complement to traditional desktop management software security packages. The K1000 provides users with the ability to uncover and remediate problems quickly, saving you time and your company money. The K1000 helps identify vulnerabilities across all end nodes, and enforce compliance with company policies across all desktops, laptops and servers. It reduces the risk of malware, spyware, and viruses, and eliminates vulnerabilities. This helps reduce user down time due to infection or other security breaches.
The K1000 provides several easy-to-use ways to enforce PC configurations for improved security. First K1000 security audit and enforcement includes a number of pre-built policies that provide drop down options for easy deployment. These include:
K1000 security audit and enforcement includes OVAL-based vulnerability scanning of all managed Windows systems. OVAL is the information community standard endorsed by US Computer Emergency Readiness Team (US Cert) and the Department of Homeland Security. It promotes open, publicly available security content and standardization of its transfer across security tools and services. This includes setting the testing schedule (Security/OVAL Tab), and results reporting. Over 1700 pre-defined tests are included, and new tests are added as they are defined and published.
The K1000 allows for the flexible scheduling and targeting of OVAL vulnerability scans. For instance scans can be scheduled to occur on a reoccurring basis (daily, weekly, etc.), or can be triggered manually. In addition scans can be targeted at individual machines, groups of machines or an entire network. During an OVAL scan, each target Windows machine is checked against the current list of known vulnerabilities. The output from the scan lists pass/fail results for each vulnerability. The results of scans are then reported by both vulnerability and machine providing the necessary information to quickly plan and execute remediation.
The K1000 Management Appliance features the Security Content Automation Protocol (SCAP) configuration Scanner, for use in configuration assessment and reporting. The SCAP scanner is integrated into the K1000 Appliance and provides easy to use automated scan scheduling and detailed reporting that enable IT managers to manage common endpoint configurations and confirm organizational compliance requirements such as the Federal Desktop Core Configuration (FDCC) standard.
FDCC is a set of compliance requirements created by the U.S. Government that define configuration requirements for securing computing systems against threats. The K1000 SCAP Scanner enables agencies of all sizes to audit their systems to ensure FDCC compliance, but may also be used by other organizations who seek to leverage the FDCC benchmarks to help enforce their own set of configuration standards.
The K1000 FDCC Scanner is certified by the National Institute of Standards & Technology (NIST) and is one of the selected few tools that are eligible for use at government agencies.
Got a pre-sales question?Let our KACE experts help.
View Product Demo
Take a Screenshot Tour
Try the Free Trial
Compare to Competition
See KACE appliances in action.