Securing business data

Configuration & Build Management

Build Validation

CNS’ build validation service is designed to help businesses comply with their regulatory mandates without overstretching their IT function and resources. The service us built on CNS' proprietary VALIDATIONengine technology. 

validation-engine

The service provides automated & scheduled build & configuration checks against bespoke baseline templates for WINDOWS, UNIX, LINUX and more.

Whether you require PCI-DSS build compliance or compliance against a host of Government build regulations (such as HMS IS2 Baseline Control Set), CNS’ VALIDATIONengine will give you the ability to choose your own compliance validation template. Build validation templates can be scheduled to automatically scan and validate your IT estate ranging from network devices and servers to applications and databases, on a regular and cyclic basis and as part of your company’s compliance life-cycle strategy. 

Agent-less deployments give a fully flexible, customizable and secure service whilst TCO is lowered by dramatically reducing  internal administration overhead, improving efficiency of IT Operations and being better prepared for meeting the required audit & regulation standards. Validation testing, reporting and prioritised maintenance scheduling can all be delivered thereby allowing internal staff to concentrate on their primary ‘day job’ activities. 

Configuration Management

CNS’ configuration management service (based on our proprietary CONFIGengine) deals with the automatic identification, controlled storage, change control, status reporting and review of target network component configurations throughout the enterprise estate.

Compliance and regulatory mandate has forced many organisations into  taking accountability for the traceability and integrity of data in transit across their IT estate; CNS’ CONFIGengine makes a significant contribution to helping their customers achieve this through providing a mechanism for assuring the integrity and availability of their data network.
CONFIGengine tackles the following primary objectives of configuration management;

A primary exponent to securing a network is the need to identify, control and report on the configuration of a networks components at any given time. As a result, configuration management is now considered an integral process within the compliance life-cycle. 

Configuration Identification
What are the components of the network?
What is the configuration of a network device?

Configuration Change Control
Identify and maintain device configuration baselines
Identify and control device access and applied changes

Configuration Status Accounting
Maintain record of configuration changes
Report configuration status change

Configuration Review
Regular review of device configuration against best practice
Regular review of status accounting information

A primary exponent to securing a network is the need to identify, control and report on the configuration of a networks components at any given time. As a result, configuration management is now considered an integral process within the compliance life-cycle.

Get in touch

Talk to our experts today
call us

Get in touch

Talk to our experts today +44 (0) 20 7592 8800

Send us a message

We'll get back to you Send us a message

Connect with us

See what we're saying elsewhere