Community in read only mode June 18 & 19
This community will be set in READ ONLY mode for a while on Tuesday June 18 into Wednesday June 19 while we import content and users from our Micro Focus Forums community site. MORE INFORMATION

Don’t wait for a data breach to hit headlines, act now!

Micro Focus Contributor
Micro Focus Contributor
1 0 1,608

Did you know that the longer it takes to detect a breach, the more expensive it will be? According to a study by Ponemon Institute, the global average cost of a data breach increased by $3.86 million, a 6.4% increase compared to last year.

Data breaches and security vulnerabilities put customers and corporate data at risk. In addition to the direct costs incurred, there are innumerable indirect costs of a data breach. Direct costs include the expenses to reduce the damage caused by the breach, for example, the cost to protect the identity of victims and legal aid. More troubling are the indirect costs, which include lasting damage to a company’s brand and the loss of potential new customers. If these breaches and vulnerabilities aren’t detected in a timely manner, the consequences can be extensive and damaging. Data Center Automation (DCA) provides a solution, giving visibility into vulnerability risks across the data center.

The DCA risk dashboard shows vulnerability risks across server OS using:

  • Common Vulnerabilities and Exposures (CVEs) data listed in the National Vulnerability Database (NVD), the U.S. government’s standards-based vulnerability management data repository. The NVD data is used to identify the latest vulnerabilities published by severity and date.
  • Patch metadata from OS vendors.
  • Patch scan results which indicate the patches required to remediate impacted resources.

DCA reports this information to give an actionable risk dashboard (see Figure 1).

Figure 1: DCA risk dashboardRisk dashboard.png

DCA Role-based access control (RBAC) controls what is visible on the risk dashboard. RBAC facilitates granular access control allowing only authorized users to access the data center resources based on their roles.

  1. Key risks – widgets can be configured to track trending vulnerabilities. The graphs indicate weekly trends of how many resources are impacted.
  2. Most recent vulnerabilities (Critical and High) – displays the most recent vulnerabilities and the number of resources that are impacted by those vulnerabilities.
  3. Resource vulnerability – shows the resource vulnerability exposure. The color-coded segments show the distribution of the resource vulnerabilities (vulnerable, not vulnerable, exception approved, and not measured).
  4. Resource type by CVE – shows the severity of risk by resource types in the data center i.e. critical, high, and medium.
  5. Vulnerability age – indicates how long the vulnerability has been in the data center. As older risks are easier to exploit hence, the dashboard helps prioritize the vulnerabilities based on age and risk state.

Micro Focus DCA is a one-stop shop to:

  • Manage vulnerability risk in the data center.
  • View vulnerabilities and compliance risks in a single risk dashboard.
  • Stay updated on the latest vulnerabilities in the data center.
  • Prioritize risks for remediation.

For more information on product features and technical guides, visit the DCA customer documentation.

For more information on what’s new in DCA, use cases, product discussions, idea exchanges, videos and blogs see the ITOM Practitioner Portal.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.