SlideShare una empresa de Scribd logo
1 de 27
Introduction to OESIS® Framework
April
2013
Applications Manageability – OESIS Framework
The Mission
OESIS Framework
 Enables software engineers and technology vendors to develop
products that can detect, classify, and manage thousands of third-
party software applications
 Enables implementing a simple and easy compliance check of
endpoints via embedded libraries
 Supported platforms include:
 Windows
 Mac OS X
 Linux
 Android
 iOS
OESIS Framework
 Support nearly any 3rd application in the market for:
Antivirus
Antispyware
Personal Firewall
Antiphishing
Backup
Patch Management
Hard Disk Encryption
Health Agents
URL Filtering
Data Loss Prevention
Public File Sharing
Web Browsers
Desktop Sharing
VPN Clients
Virtual Machines
Device Access
Control
Mobile Applications
o Android
o iOS
 OESIS APIs for above application-types: here
AntivirusAPIs
Detection APIs
 Retrieve the name and version of the antivirus product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing that can occur when
using only WMI
Assessment APIs
 Retrieve the count of malware signatures
 Retrieve the time of the last definition update
 Retrieve the real time protection status
 Retrieve the last full system scan time
 Retrieve the history of threat detections and actions performed to assess
the risk level of an endpoint (includes information such as threat name and
severity)
Remediation APIs
 Launch a full system scan
 Enable real time protection
 Activate an update of the virus definitions
View Supported Apps: click here
Web Browser APIs
Detection APIs
 Retrieve the name and version of the web browser
 Retrieve a list of installed browser extensions
 Check whether the browser is the default browser
 Determine which browsers are currently open on the machine
 Determine which sites are currently open in the browser
Assessment APIs
 Retrieve the browsing history
 Determine whether the browser's popup blocker is enabled
Remediation APIs
 Open a specific URL in the browser
 Close the browser
 Securely delete browsing history
View Supported Apps: click here
Hard Disk EncryptionAPIs
Detection APIs
 Retrieve the name and version of the hard disk encryption product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Check the encryption state
 Get a list of supported encryption algorithms
 Retrieve encrypted locations
Remediation APIs
 Enable Encryption
View Supported Apps: click here
Virtual Machine APIs
Detection APIs
 Retrieve the name and version of the virtual machine product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Determine if the virtual machine is running
 Retrieve a list of all VMs
 Retrieve details for each VM on the system including OS and version
Remediation APIs
 Stop a virtual machine
 Pause a virtual machine
View Supported Apps: click here
Public File SharingAPIs
Detection APIs
 Retrieve the name and version of the public file sharing application
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Determine if the application is running
Remediation APIs
 Terminate the running application
View Supported Apps: click here
OESIS Developer Testing Harness
OESIS Capability Charts
By Product, by OS, by Version
Mobile Capabilities
Product Categories
iOS additional category support in 2013!
Compliance
• Antivirus
• Firewall
• Backup
Management
• MDM
• MAM
Compromising
• Monitoring
Tools
• Location
Services
• Geo
Location
Android:
 Detection
 Name
 Vendor
 Version
 Is Authentic?
 Is Running?
 Remediation
 Launch Application
MobileAPIs
iOS:
 Detection
 Name
 Vendor
 Is Running?
Android and iOS
Mobile Testing Harness
OESIS User Stories
SSL VPN
 When granting remote network access, system administrators need
the ability to assess an endpoint to ensure that it will not
compromise the security of the network. Many SSL VPN solutions
provide this ability to administrators by utilizing OESIS Framework
to help power endpoint compliance checking.
OESIS User Stories
 Dell SonicWall
OESIS User Stories
 Citrix
OESIS User stories
NAC (Network Access Control)
 NAC solutions utilize OESIS to enable the creation and checking
of access policies. The solutions use OESIS to pull data from
endpoints that can be used to determine whether users may
connect. For example, the policy might require that a device
connecting to the corporate network has all the latest antivirus
definitions installed.
OESIS User stories
 Cisco
OESIS User stories
 Juniper Networks
User stories
Support Tools
 Vendors who provide remote technology services to consumers and
businesses to fix issues or configure endpoints utilize OESIS to build in
some of their standard checks.
User stories
 F-Secure
User stories
 Support.com
User stories
Many more:
 Managed Services
 Vendors of cloud based IT Management solutions, utilize OESIS to power
features of their cloud based applications.
 Compliance solutions and vulnerability assessment
 OESIS Framework provides extensive management capabilities that enable
applications in this market segment to meet compliance requirements or to
make sure that endpoints respond to security compliance mandates.
User stories
 iPass
User stories
 LogMeIn
OPSWAT Security Score
Free demo of OESIS Framework
http://www.opswat.com/products/security-score

Más contenido relacionado

La actualidad más candente

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 

La actualidad más candente (20)

AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
Cloud
CloudCloud
Cloud
 
AWS networking fundamentals
AWS networking fundamentalsAWS networking fundamentals
AWS networking fundamentals
 
Pentesting Cloud Environment
Pentesting Cloud EnvironmentPentesting Cloud Environment
Pentesting Cloud Environment
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
How to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI AttacksHow to Prevent RFI and LFI Attacks
How to Prevent RFI and LFI Attacks
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of Security
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
20170919 AWS Black Belt Online Seminar AWS Database Migration Service
20170919 AWS Black Belt Online Seminar AWS Database Migration Service20170919 AWS Black Belt Online Seminar AWS Database Migration Service
20170919 AWS Black Belt Online Seminar AWS Database Migration Service
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
SecDevOps
SecDevOpsSecDevOps
SecDevOps
 
Amazon GuardDuty Lab
Amazon GuardDuty LabAmazon GuardDuty Lab
Amazon GuardDuty Lab
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro Tips
 
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
Amazon EC2 deepdive and a sprinkel of AWS Compute | AWS Floor28
 
Aws ppt
Aws pptAws ppt
Aws ppt
 
Azure active directory
Azure active directoryAzure active directory
Azure active directory
 
Android pentesting
Android pentestingAndroid pentesting
Android pentesting
 

Destacado (7)

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown Threats
 
Biographical information for mmf2011 int'lrev
Biographical information for mmf2011 int'lrevBiographical information for mmf2011 int'lrev
Biographical information for mmf2011 int'lrev
 
Kettingenwebshop
KettingenwebshopKettingenwebshop
Kettingenwebshop
 
Seguridad
SeguridadSeguridad
Seguridad
 
Todos tienen pies
Todos tienen piesTodos tienen pies
Todos tienen pies
 
Handbook
HandbookHandbook
Handbook
 
The Tea Experience
The Tea ExperienceThe Tea Experience
The Tea Experience
 

Similar a Introduction to OESIS Framework

5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
richarddxd
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Kyle Lai
 

Similar a Introduction to OESIS Framework (20)

Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing100 effective software testing tools that boost your Testing
100 effective software testing tools that boost your Testing
 
SRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile ServicesSRV421 Deep Dive with AWS Mobile Services
SRV421 Deep Dive with AWS Mobile Services
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
 
Sequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 DenverSequence Like a Boss - BriForum 2015 Denver
Sequence Like a Boss - BriForum 2015 Denver
 
New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Test Automation for Mobile Applications
Test Automation for Mobile ApplicationsTest Automation for Mobile Applications
Test Automation for Mobile Applications
 
Mobile security
Mobile securityMobile security
Mobile security
 
Webinar: Automate Your Environment Provisioning for Mobile App Development
Webinar: Automate Your Environment Provisioning for Mobile App Development Webinar: Automate Your Environment Provisioning for Mobile App Development
Webinar: Automate Your Environment Provisioning for Mobile App Development
 
Powering your Apps with Cloud Services
Powering your Apps with Cloud ServicesPowering your Apps with Cloud Services
Powering your Apps with Cloud Services
 
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
Pactera Cybersecurity - Application Security Penetration Testing - Mobile, We...
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 

Más de OPSWAT

Más de OPSWAT (15)

How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted Applications
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data Breaches
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for Linux
 
Secure Data Workflow
Secure Data WorkflowSecure Data Workflow
Secure Data Workflow
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizations
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan Client
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanning
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Introduction to OESIS Framework

  • 1. Introduction to OESIS® Framework April 2013
  • 2. Applications Manageability – OESIS Framework The Mission
  • 3. OESIS Framework  Enables software engineers and technology vendors to develop products that can detect, classify, and manage thousands of third- party software applications  Enables implementing a simple and easy compliance check of endpoints via embedded libraries  Supported platforms include:  Windows  Mac OS X  Linux  Android  iOS
  • 4. OESIS Framework  Support nearly any 3rd application in the market for: Antivirus Antispyware Personal Firewall Antiphishing Backup Patch Management Hard Disk Encryption Health Agents URL Filtering Data Loss Prevention Public File Sharing Web Browsers Desktop Sharing VPN Clients Virtual Machines Device Access Control Mobile Applications o Android o iOS  OESIS APIs for above application-types: here
  • 5. AntivirusAPIs Detection APIs  Retrieve the name and version of the antivirus product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing that can occur when using only WMI Assessment APIs  Retrieve the count of malware signatures  Retrieve the time of the last definition update  Retrieve the real time protection status  Retrieve the last full system scan time  Retrieve the history of threat detections and actions performed to assess the risk level of an endpoint (includes information such as threat name and severity) Remediation APIs  Launch a full system scan  Enable real time protection  Activate an update of the virus definitions View Supported Apps: click here
  • 6. Web Browser APIs Detection APIs  Retrieve the name and version of the web browser  Retrieve a list of installed browser extensions  Check whether the browser is the default browser  Determine which browsers are currently open on the machine  Determine which sites are currently open in the browser Assessment APIs  Retrieve the browsing history  Determine whether the browser's popup blocker is enabled Remediation APIs  Open a specific URL in the browser  Close the browser  Securely delete browsing history View Supported Apps: click here
  • 7. Hard Disk EncryptionAPIs Detection APIs  Retrieve the name and version of the hard disk encryption product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Check the encryption state  Get a list of supported encryption algorithms  Retrieve encrypted locations Remediation APIs  Enable Encryption View Supported Apps: click here
  • 8. Virtual Machine APIs Detection APIs  Retrieve the name and version of the virtual machine product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Determine if the virtual machine is running  Retrieve a list of all VMs  Retrieve details for each VM on the system including OS and version Remediation APIs  Stop a virtual machine  Pause a virtual machine View Supported Apps: click here
  • 9. Public File SharingAPIs Detection APIs  Retrieve the name and version of the public file sharing application  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Determine if the application is running Remediation APIs  Terminate the running application View Supported Apps: click here
  • 11. OESIS Capability Charts By Product, by OS, by Version
  • 12. Mobile Capabilities Product Categories iOS additional category support in 2013! Compliance • Antivirus • Firewall • Backup Management • MDM • MAM Compromising • Monitoring Tools • Location Services • Geo Location
  • 13. Android:  Detection  Name  Vendor  Version  Is Authentic?  Is Running?  Remediation  Launch Application MobileAPIs iOS:  Detection  Name  Vendor  Is Running? Android and iOS
  • 15. OESIS User Stories SSL VPN  When granting remote network access, system administrators need the ability to assess an endpoint to ensure that it will not compromise the security of the network. Many SSL VPN solutions provide this ability to administrators by utilizing OESIS Framework to help power endpoint compliance checking.
  • 16. OESIS User Stories  Dell SonicWall
  • 18. OESIS User stories NAC (Network Access Control)  NAC solutions utilize OESIS to enable the creation and checking of access policies. The solutions use OESIS to pull data from endpoints that can be used to determine whether users may connect. For example, the policy might require that a device connecting to the corporate network has all the latest antivirus definitions installed.
  • 20. OESIS User stories  Juniper Networks
  • 21. User stories Support Tools  Vendors who provide remote technology services to consumers and businesses to fix issues or configure endpoints utilize OESIS to build in some of their standard checks.
  • 24. User stories Many more:  Managed Services  Vendors of cloud based IT Management solutions, utilize OESIS to power features of their cloud based applications.  Compliance solutions and vulnerability assessment  OESIS Framework provides extensive management capabilities that enable applications in this market segment to meet compliance requirements or to make sure that endpoints respond to security compliance mandates.
  • 27. OPSWAT Security Score Free demo of OESIS Framework http://www.opswat.com/products/security-score

Notas del editor

  1. 1 min