BMC, a global digital enterprise transformation company, announced atg Engage 2016 strategic extensions of its BladeLogic Threat Director solution, allowing organizations to address two of the biggest problems in current security strategies: blind spots and isolated processes.
The solution’s integration with BMC Discovery allows for the rapid identification of unsecured assets, and provides critical visibility into application dependencies so operations teams will be better able to anticipate the impact of actions on end users. Through integration with BMC’s BladeLogic Network Automation solution, organizations are now able to accelerate and scale security operations, closing the door on known vulnerabilities for both servers and networks.
“There is a real disconnect in enterprise security between the identification of issues and taking action. Most organizations approach problems from the traditional perspective: a series of defined starts and stops, with no information sharing between steps,” said Bill Berutti, president, Cloud Management/Data Center Automation at BMC. “That game plan can leave the door wide open to malicious attacks while IT teams struggle to scale and keep track of all the moving parts. At BMC we are seeing first-hand that organizations realize this approach needs to stop. Our integrated BladeLogic Threat Director solution enables enterprises to eliminate risks and blind spots to reduce the attack surface.”
One of the largest drivers of the inability to appropriately defend organizations against security vulnerabilities is still the lack of integration and coordination between security and operations. By leveraging IT automation capabilities, leadership can facilitate integration and coordination between the Security and Operations (SecOps) teams for a proactive approach to securing networks and servers, a critical concern as enterprises look to fast track digital business.
BMC’s BladeLogic Threat Director is an automation solution that natively integrates vulnerability scan data with operations data, ultimately allowing for accelerated, enterprise-grade remediation for both servers and networks. Through a clear task list, operations can address threats based on policy and impact, using criteria that protects uptime and maintains stability to ensure the most critical issues are fixed first. Leveraging operations inputs, the security dashboard provides key insight and updates to security teams on remediation workflow progress. Through the dashboard, an open dialogue is created for both teams to align priorities while doing away with opening tickets that never seem to reach a conclusion.
“In the simplest terms: an enterprise IT team can’t manage what they don’t know about,” said Jon Oltsik, senior principal analyst, Enterprise Strategy Group (ESG). “As lack of visibility leaves doors wide open to attacks, there is a continued need for innovation and investment in SecOps solutions to identify unknown assets and dependencies across the entire enterprise ecosystem, while incorporating automation to rapidly prioritize and execute remediation. Visibility and simplicity is the key to switch from the current reactive mindset to a proactive security approach.”