TrueSight Automation for Networks

TrueSight Automation for Networks

TrueSight Automation for Networks

Product Description:

TrueSight Automation for Networks is a scalable, industry-leading solution that automates the management of security vulnerabilities, configurations, compliance, and provisioning. Network administrators can quickly take corrective action to reduce the risk of breaches and reduce network outages. It also increases staff productivity and allows labor to be shifted to more strategic tasks.

Business Challenge

Today, IT organizations depend on high performing networks to keep their businesses running at peak efficiency. They also need to make frequent network changes to support new applications or business services. Additionally, new security threats emerge every day, making it difficult to maintain a secure environment and achieve SLAs.

Often, these changes are executed manually, through device-by-device interactions via CLIs or scripting. Detecting security vulnerabilities can require interfacing with multiple hardware and software tools—and if a device is found to be vulnerable, IT must take corrective action manually, risking errors that may cause expensive downtime or failures.

BMC Solution

TrueSight Automation for Networks helps close the window of vulnerability with native, scan-less detection of security risks in real-time and one-touch rule generation remediation actions. With this single solution, IT staff can manage physical and virtual network devices, as well as SDN infrastructures, across most major platforms— improving network agility and ensuring compliance.

Intuitive, interactive UI facilitates triage and remediation.

Product Details

Automated Security Vulnerability Management

Automated Security Vulnerability Management

Intuitive, easy-to-use dashboards provide visibility to vulnerabilities, analyze them, set priorities, link vulnerabilities to identified fixesor configuration changes, and take automated corrective action. Leverage out-of-the-box content for Cisco® security advisories, or NIST National Vulnerability DB for vulnerability remediation. Use vulnerability management APIs to automate management of vendor security vulnerability notifications.

Compliance

Use the compliance engine to apply standards for regulatory and security regulations such as CIS and DISA. Customized rule sets for other regulations or internal policies can also be created.Automate audit preparation activities and use built-in, customizable reports to demonstrate compliance. Use integrated change management to close the loop on automated compliance actions.

Virtualization and Cloud Computing

Virtualization and Cloud Computing

Rapidly provision and configure large physical, virtual, and cloud environments.

Provisioning

Provisioning

With support for many vendors and virtualization platforms, including SDN Controllers and wireless devices, admins can expedite new multi-tiered networks, including services for VLANs such as firewalling, load balancing, and WAN acceleration. Deploy access control list (ACL) changes and syntax scanning without disrupting the network.

Configuration

Configuration

Implement a policy-based approach to configure or change network devices with templates based on best practices to simplify administration and ongoing maintenance.

Administration

Administration

Leverage single-sign-on (SSO) for ease of use. Auto import LDAP or AD users. Improve security and workload sharing by controlling who can view and change configurations through fine-grained role-based access control (RBAC). Use multi-server administration to manage multiple TrueSight Automation for Networks servers from a single console.

Broad Solution Support

Broad Solution Support

Integrate with BMC Helix CMDB to understand business service context before impacting device configurations. Manage and document changes in ITSM with TrueSight Orchestration to close the loop on continuous ITIL® compliance.

OS Image Management

OS Image Management

Manage OS images with built-in OS image library and deploy actions. Includes support for remote file servers for flexible implementation.

APIs and External Links

APIs and External Links/URLs

Develop custom workflow automation to control TrueSight Automation for Networks functions through in-bound APIs. Launch in context from other applications to speed problem resolution.

Device Import

Device Import

Import and start managing devices from discovery tools such as BMC Discovery, CiscoWorks, Entuity Network Analytics, HelpSystems™ Intermapper®, Ipswitch® WhatsUp Gold®, user-defined database query, or CSV formatted file.

Data Export

Data Export

Feed event information from TrueSight Automation for Networks into log analysis and management solutions such as TrueSight Operations Management and Splunk v.

Key Features :

TrueSight Automation for Networks helps admins automate and accelerate vulnerability management, provisioning, configuration, auditing, and maintenance of network devices including routers, switches, load balancers, firewalls, and IDS solutions.

  • Vulnerability management – Fast, automated, scanless detection of vulnerabilities and automated remediation based on Cisco® security advisories and the National Vulnerability Database (NVD).
  • Compliance – Built-in templates for regulatory compliance, plus closed-loop change tracking.
  • SmartMerge – Auto-generate scripts to execute changes or rollback entire configurations without rebooting.
  • Real-time status – Get configuration, compliance or security data from across the entire network in minutes.
  • Scalability – Includes a multi-server administration portal for greater scalability and ease-of-use
TrueSight Automation for Networks Key Features Updated
TrueSight Automation for Networks Key Benefits

Key Benefits:

  • Accelerate consistent, high-volume network changes for greater uptime
  • Reduce mean time to resolution (MTTR) with visibility into change details and business services impacted
TrueSight Automation for Networks Key Benefits

Our Clients

Resources

Blogs

Blog

Case Study

case study

Datasheet

Datasheet

Webinars

Webinar