As a manufacturer-independent, cross-functional tool for security monitoring, AMPEG Security Lighthouse offers deep insight into the security status of the network. More than 450 pre-defined evaluations for ad-hoc and long-term analyses are available immediately after installation and offer a comprehensive analysis of the company network security level.
The collectors of the Security Lighthouse collect information from the central sources of the security software in use. The collected data is transferred to the Security Lighthouse database after it has been normalised, correlated and condensed for the analyses.
- Continuous security monitoring
In the Security Dashboard with over 450 predefined analyses on board.
- Assess the security situation
With ad-hoc and long-term analyses based on threshold and limit values of the regulatory framework and an overlapping correlation of data from different safety areas (s. Assess the security situation).
- Process-oriented evaluation
Safeguarding business processes by checking the compliance status of the integrated systems (s. Business Process - Security Level).
- Security Information Map
Helicopter view of the nationwide security status signalised by traffic light colours for the locations or operational units (s. Security Information Map).
Evaluation of the security status according to criticality, protection class, type, operating system, etc. of the computer systems. Additional criteria can be imported and evaluated as a company category from existing sources, such as a CMDB.
- Security Overviews
For example, click on the entry for a system or an update to see the complete status.
- Information Sharing
Up-to-date information can be passed on to those responsible for security in a targeted manner (s. Information Sharing).
- CVE Catalogue
Comparison of information from the patch management and inventory with the integrated CVE catalogue, among others, in order to identify vulnerabilities and evaluate them using the CVSS Score.
- Analysed security areas
The list of imported information can be found under Analysed Security Areas.
- Supplementary reporting
Alerts, exports and reports are offered in addition to monitoring (s. Alerts, Reporting und Export).
- Security Dashboards
Flexible, customisable dashboards allow all security managers and, if required, process owners targeted access to security-relevant information. (s. Flexibility with Dashboards).
- Rule type
Definition of threshold and limit values for the assessment of the security status (s. Rule Type).
- Role-based access control
Sophisticated concept for access control (s. Role-based access control).
- Collectors for import
The required information is collected via API or directly from the database of the security software in use. The implementation effort is very low because no agents are rolled out.
- Data retention over several years
If desired, the imported information can be retained for up to five years.
- Web application
No installation on the workstations required.
- Installation of the Security Lighthouse Server
On application servers operated locally or in the cloud (s. System Requirements).
In addition, AMPEG reacts quickly to requests of all kind and implements customer wishes very quickly, Sternberg adds, speaking about the positive experience of the introductory phase: There are no long waiting times as we have known them from other service providers. Our supplier delivered missing analyses within two to three weeks.
IT Security Officer, KWS SAAT SE
The findings that SCHOTT was able to draw from the data detected by Security Lighthouse were significant. "The control system clearly showed us where we stand. In a way, the data was sobering because we had thought that we were further ahead with our IT security. But that was not the case. However, and that was the positive thing about it, we now knew what deficits we had."
Head of Information Governance and Security at SCHOTT