Improving Enterprise Security with Ecora’s Configuration Auditor
Enterprise security is traditionally managed with a plethora of tools. Common among them are firewalls, intrusion detection systems, vulnerability scanning, and penetration testing. Regardless of perimeter protection and the frequency of external scans, systems are continually compromised. What part of the security solution is being overlooked?
Time and time again it has been shown that an oversight in operating system or application configuration is a contributing factor in the great majority of exploits. Ecora’s Configuration Auditor software simplifies control through configuration management and assessment. In this document, we describe our methodology and the benefits of this tool for effectively securing the enterprise.
Download the paper in DOC format here.