Leading standards require organizations to implement a secure configuration process for each technology. This includes:
Storage and backup systems are critical IT infrastructure that retains all production data as well as the backup data. Managing baseline configuration and secure configuration process for your storage and backup systems is extremely difficult, since most tools focus on host operating systems and web applications, and are unable to effectively communicate with the rather unique storage and backup technologies.
The release of ISO/IEC 27040:2024 provides an overview, analysis, and guidance for the security of storage & backup systems.
Secure Configuration and Baseline | Configuration Compliance | |
---|---|---|
Endpoint systems | McAfee Endpoint Security | Microsoft Endpoint Manager | Symantec Endpoint Protection | Tanium | CrowdStrike | SCCM | Ivanti Endpoint Manager | Qualys Policy Compliance | McAfee Endpoint Security | Symantec Endpoint Protection | Tanium |
Applications | | Tenable | Qualys | Rapid7 | Veracode | IBM Security AppScan | Tripwire | Qualys Policy Compliance | McAfee Application Control | AlienVault USM Anywhere |
Database systems | Imperva | IBM Guardium | McAfee Database Security | Oracle Database Vault | Imperva | IBM Guardium | McAfee Database Security | Trustwave |
Host systems | Tenable | Qualys | Rapid7 | Tenable | Qualys | Rapid7 | Tanium |
Storage systems | StorageGuard | StorageGuard |
Backup systems | StorageGuard | StorageGuard |
Get in touch to run a configuration audit of your storage & backups, and ensure your configuration baseline is met.
It’s time to automate the secure configuration of your storage & backup systems.
Virtual Panel with Check Point, Qualys and Rapid7: Vulnerability Management 2025 Innovations – January 16
Register