Product overview

As a manufacturer-independent, cross-functional tool for security monitoring, AMPEG Security Lighthouse offers deep insight into the security status of the network. More than 450 pre-defined evaluations for ad-hoc and long-term analyses are available immediately after installation and offer a comprehensive analysis of the company network security level.

Structure without additional agents

The collectors of the Security Lighthouse collect information from the central sources of the security software in use. The collected data is transferred to the Security Lighthouse database after it has been normalised, correlated and condensed for the analyses.

Analysis

  • Continuous security monitoring
    In the Security Dashboard with over 450 predefined analyses on board.
  • Assess the security situation
    With ad-hoc and long-term analyses based on threshold and limit values of the regulatory framework and an overlapping correlation of data from different safety areas (s. Assess the security situation).
  • Process-oriented evaluation
    Safeguarding business processes by checking the compliance status of the integrated systems (s. Business Process - Security Level).
  • Security Information Map
    Helicopter view of the nationwide security status signalised by traffic light colours for the locations or operational units (s. Security Information Map).
  • Categorisation
    Evaluation of the security status according to criticality, protection class, type, operating system, etc. of the computer systems. Additional criteria can be imported and evaluated as a company category from existing sources, such as a CMDB.
  • Security Overviews
    For example, click on the entry for a system or an update to see the complete status.
  • Information Sharing
    Up-to-date information can be passed on to those responsible for security in a targeted manner (s. Information Sharing).
  • CVE Catalogue
    Comparison of information from the patch management and inventory with the integrated CVE catalogue, among others, in order to identify vulnerabilities and evaluate them using the CVSS Score.
  • Analysed security areas
    The list of imported information can be found under Analysed Security Areas.
  • Supplementary reporting
    Alerts, exports and reports are offered in addition to monitoring (s. Alerts, Reporting und Export).

Application

  • Security Dashboards
    Flexible, customisable dashboards allow all security managers and, if required, process owners targeted access to security-relevant information. (s.  Flexibility with Dashboards).
  • Rule type
    Definition of threshold and limit values for the assessment of the security status (s. Rule Type).
  • Role-based access control
    Sophisticated concept for access control (s. Role-based access control).
  • Collectors for import
    The required information is collected via API or directly from the database of the security software in use. The implementation effort is very low because no agents are rolled out.
  • Data retention over several years
    If desired, the imported information can be retained for up to five years.
  • Web application
    No installation on the workstations required.
  • Installation of the Security Lighthouse Server
    On application servers operated locally or in the cloud (s. System Requirements).

Customer Voice KWS SAAT SE

In addition, AMPEG reacts quickly to requests of all kind and implements customer wishes very quickly, Sternberg adds, speaking about the positive experience of the intro­ductory phase: There are no long waiting times as we have known them from other ser­vice providers. Our supplier delivered miss­ing analyses within two to three weeks.

Andreas Sternberg,
IT Security Officer, KWS SAAT SE

forward to the references

Customer Voice SCHOTT

The findings that SCHOTT was able to draw from the data detected by Security Lighthouse were significant. "The con­trol system clearly showed us where we stand. In a way, the data was sobering because we had thought that we were further ahead with our IT security. But that was not the case. However, and that was the positive thing about it, we now knew what deficits we had."

Dirk Ossenbrueggen
Head of Information Governance and Security at SCHOTT

forward to the references