Lighthouses and pier lights help the crew of a vessel, to find the safe route to the harbour.
The Security Lighthouse supports security teams when navigating through the network to increase the security level.
A 360° view of all security-relevant areas in a network is the key to maximum data security. Lack of detailed insight into the security structure leads to so-called “blind spots” which offer ideal possibilities to intrude into the network. Gaining a deeper insight into the current security level of a network requires a central monitoring system which is able to process and evaluate data from all kinds of sources.
The collected data has to be interlinked and analysed in an intelligent manner. If companies are able to relate all available security information to each other and to analyse the actually achieved level of the information security nearly in real-time, it is easier for them to defend themselves against attacks and threats.
The permanent verification of the security level offers a detailed assessment of the security situation. Security Lighthouse provides the information to take countermeasures for vulnerable critical systems – targeted and efficient. The effectiveness of your security measures will be increased in a verifiable way.
Security Lighthouse is a central component in the tool box of the IT security. The status of the achieved security level will be visible in almost real-time. This transforms IT security into a measurable and manageable factor. To be aware of the companywide security status serves one goal: to minimise the attack surface and keep it as small as possible.
During the Proof of Concept (PoC), AMPEG was already able to show that for nearly all important ZF systems which were to be integrated, collectors could be made available as an “out of the box” interface solution. “The fact that the PoC went so smoothly against this background, and that we did not have to find individual solutions, made us expect a low-maintenance product.”
Head of IT Security at ZF
In addition, AMPEG reacts quickly to requests of all kind and implements customer wishes very quickly, Sternberg adds, speaking about the positive experience of the introductory phase: There are no long waiting times as we have known them from other service providers. Our supplier delivered missing analyses within two to three weeks.
IT Security Officer, KWS SAAT SE