You are on page 1of 33

MaxPatrol 8

ptsecurity.ru
Positive Technologies
Facts and Figures
About us

Main products
Every
year 200+
security audits
of corporate systems
Visionary 2017
200+
detected zero-day
WAF Magic Quadrant

vulnerabilities

years of research and expertise detected zero-day vulnerabilities in


15 30+
Mobile Telco

zero-day vulnerabilities in SCADA security researches of mobile and web


150+ 500+ applications
Our customers
MaxPatrol 8
Security and Compliance Control
Our statistics

An amateur hacker can access every second system

73% 96% 87% 73%

Perimeter protection Standard Incidents became Attacks did not require


does not prevent solutions successful because of high qualification from
penetration serious errors hackers
could prevent attacks in configuration

Source: Positive Research 2017


Why infrastructure is vulnerable

Weak passwords
Third-party
software

Insecure wireless
networks
Errors in settings of:
• network equipment
• perimeter protection systems
Web application • web applications
errors • databases
MaxPatrol 8: solution

Inventory
1 configuration control

Complex
2 security assessment

Automation
3 of compliance control

Reports for technical specialists


4 and managers
Product of the year

5 Knowledge base updated daily


Vulnerability Management
according to Cyber Security Awards 2016
MaxPatrol 8
Use cases
Functions of the system

Database Applications

Wireless and ERP systems


VOIP networks

Network Web applications


infrastructure and
systems Compliance control
Security control

PCI, ISO, etc. Corporate policies


Changes control Key indicators
of effectiveness

Managers Auditors
Knowledge base
• Reducing human errors due • Complex tool for security
to automation assessment
• KPI reports from different • Supports main international
business units standards
• Compliance with internal Infosec specialists IT specialists • Configurable reports
standards
• Data on the current security • Vulnerability detection • Easy to implement
level • Compliance management • IT resources inventory
• Policy compliance control • Recommendations on fixing
• Vulnerability elimination control • Reports on updates
Additional scenarios

ERP ICS TELECOM

NetWeaverTM

R/3

R/3
ENTERPRISE
MaxPatrol 8 for SCADA

MaxPatrol has built-in checks for specialized network


equipment, such as Cisco Connected Grid, supports
Modbus, S7, DNP3, IEC104 and other industrial protocols.

The knowledge base contains more than 30,000 checks on


vulnerabilities and security requirements for HMI/SCADA,
PLC, RTU from leading manufacturers: Siemens,
Schneider Electric, Rockwell Automation, ABB.
MaxPatrol 8 for SAP

COMPLIANCE WITH TECHNICAL INVENTORY OF SYSTEM COMPONENTS


REQUIREMENTS

 For application layer  SAP application servers


 For system layer  DBMS servers
 For network layer  workstations
 For user layer  network equipment
 protection tools

DETECTION AND ELIMINATION OF ANALYSIS OF SYSTEM


TECHNICAL VULNERABILITIES CONFIGURATIONS AND COMPONENTS

 SAP R/3 and SAP R/3 Enterprise  system parameters


 SAP NetWeaver AS ABAP  business modules (ERP, HR, MM)
 SAP NetWeaver AS JAVA  SAP system services
 SAP business modules  encryption settings
 SAPRouter  RFC connections not in use
 account status and critical privileges
Supported systems

systems
1000+ that are compatible with MaxPatrol 8

Operating systems Databases

Network equipment Infrastructure


applications

Virtualization
solutions Desktop applications

Security tools
ViPNet
Flowchart

RESOURCES REPORTING
PCI DSS, ISO 27001,
Desktop Operating v
applications systems MANAGEMENT

• Search for vulnerabilities


Network PENTEST • Network scanning ANALYTICAL
DBMS
equipment • Web application audit
• DBMS scanning
• System checks
TECHNICAL
• Configuration analysis
SAP WEB AUDIT
• Software analysis
• Inventory

• Control of compliance  Standard compliance


Virtual
VPN
COMPLIANCE 1
with standards
environment
 Asset inventory
 Dynamics of changes
Vulnerability and Corporate standards
ICS Antivirus
software knowledge  Vulnerability data
base
Pentest mode

• Black-box analysis

• Detect vulnerabilities:
• by analyzing messages (banners)

• by using exploit-like behaviour

• by using heuristic methods

• Web application analysis

• Password brute-forcing

• Network services diagnostics


Pentest mode
Audit mode

• Does not require to install the agent

• Uses standard remote access protocols


• Hardware and software inventory
• Check for security updates
• Detection of vulnerabilities and configuration
errors
• Configuration analysis
• Account control
• Change control
Audit mode
Audit mode
Compliance mode

• More than 150 built-in standards

• Automatic determination of compliance with


applicable standards

• Support of high-level standards and requirements of regulators:


• Banking information security standard
• PCI DSS
• ISO 27001/27002

• Monitoring implementation of internal


corporate rules
Compliance mode
Compliance mode
Change control

Differential reports. Notifications about changes in the infrastrucrure

Password
1
change

Modification of
2
access control lists

Changes in
3
checksums of
files
MaxPatrol – Dynamic Scheduling

Dynamic Scheduling

• If a scanning must be performed on 2nd of


each month

• Available time slot


- Mon ~ Fri
00:00 ~ 02:00 (Scanning)
02:00 ~ 04:00 (No scan) – System backup
05:00 ~ 06:00 (Scanning)
06:00 ~ 12:00 (No scan) – Office hour
12:00 ~ 13:00 (Scanning)
13:00 ~ 19:00 (No scan) – Office hour
19:00 ~ 24:00 (Scanning)

- Sat ~ Sun
00:00 ~ 02:00 (Scanning)
02:00 ~ 04:00 (No scan) – System backup
05:00 ~ 24:00 (Scanning)

• You can specify date and time to scan


• If the scanning is not finished in the specified time,
then MP pauses the scan and resumes at next
allowable time

→ Minimize System Impact


Integrated opportunity

• Asset management

• Help-desk systems

• Risk management

• Patch management

• SIM/SIEM

• IDM
MaxPatrol 8 architecture

COMPONENTS

MP Server

MP Scanner

MP Consolidator

MP Console

MP Mobile Server

MP Local Update Server


Offline scanner

The offline scanner component is intended


for scanning hosts isolated from the local
network.

It allows performing a full scan of Windows


systems in the pentest, audit, compliance,
forensic modes.

The scanning offline module is supplied on a


special USB drive.
Built-in reports
Online portal
Online portal: detailed visualization
MaxPatrol 8 advantages

Automation of Regular assessment of


vulnerability detection KPI efficiency of IT and IS
and elimination departments

Information security Increasing the


standards for information system
information systems security level
and applications

Optimization of Reducing financial


protection tools usage costs
Thank You!

ptsecurity.com

You might also like