This section focuses on the NIST CSF 2.0 Core Outcomes: Govern, Identify, Protect, Detect, Respond, and Recover. According to the NIST CSF 2.0, organizations should address these outcomes simultaneously / concurrently rather than sequentially. While the core outcomes include non-technical elements, Endpoint Central can support the implementation of their technical aspects.
S.No |
Category |
Description |
How Endpoint Central helps |
---|---|---|---|
1 |
Govern |
GV.OC-01: The organizational mission is understood and informs cybersecurity risk management. |
Endpoint Central has comprehensive reporting capability. Apart from providing deep insights about endpoint estate, it can also be used for governance and auditing purposes. |
2 |
Govern |
GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders. |
Endpoint Central helps in simplifying the communication and alignment of cybersecurity risk strategies with organizational goals using its centralized management console. |
3 |
Govern |
GV.RR-01: Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving. |
For IT admins and security ops to access the Endpoint Central console, Endpoint Central provides role-based access control and MFA. |
4 |
Govern |
GV.PO-01: Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced. |
Endpoint Central leverages its endpoint security features such as Endpoint DLP, Browser security, Risk-based Vulnerability and Patch management, Next-Gen Antivirus engine, Anti-Ransomware, and mobile security capabilities.
|
5 |
Govern |
GV.OV-01: Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction. |
Endpoint Central has a vulnerability age matrix and vulnerability severity summary, which can provide rich insights about the impact of patch implementation. Besides, Endpoint Central also provides comprehensive reports on vulnerable systems and missing patches in your IT. For auditing critical computers having sensitive applications, User Logon reports can help admins track users' access to critical endpoints. Endpoint Central also provides detailed audit reports containing access requests for popular blacklisted applications. |
6 |
Identify |
ID.AM-01: Physical devices and systems within the organization are inventoried. |
Endpoint Central delivers powerful asset management capabilities for both hardware and software, offering a comprehensive inventory of computers, devices, installed hardware, software, and stored files across your network. Endpoint Central agent scans the network periodically to fetch the installed software details. |
7 |
Identify |
ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded.
|
Endpoint Central delivers robust vulnerability management by offering continuous assessment and comprehensive visibility of threats through a centralized console. Beyond vulnerability assessment, it also includes built-in tools for remediating detected vulnerabilities. It also serves as a unified platform for IT operations and security teams to manage efficiently and secure endpoints. With role-based access control, security tasks within the IT environment can be delegated to dedicated security specialists, ensuring streamlined and focused management. For information systems, Endpoint Central enables risk-based vulnerability management, allowing administrators to prioritize vulnerabilities using metrics such as CVSS scores, CVE impact types, patch availability, and more. Endpoint Central helps in identifying all the assets in the network and performs agent-based scans periodically to uncover emerging vulnerabilities, network misconfigurations, high-risk software, active ports, and more. Endpoint Central scans the assets in your networks to identify OS, third-party applications, and zero-day vulnerabilities and helps you understand the impact of the threats through the severity ranking dashboard. Endpoint Central scans the network assets to detect OS vulnerabilities, third-party applications, and zero-day threats. It also assesses the potential impact using the severity ranking dashboard.
|
8 |
Identify |
ID.IM-01: Improvements are identified from evaluations. |
Endpoint Central helps in continuously assessing cybersecurity posture and simplify compliance evaluations using automated compliance reporting capabilities.
Endpoint Central also can help comply with 75+ CIS benchmarks |
9 |
Identify |
PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization. |
Endpoint Central leverages conditional access policies to validate authorized users to access business critical systems and data Endpoint Central leverages the principle of least privilege and has a robust endpoint privilege management capability, providing for application specific privilege management and just-in-time access to the end users. |
10 |
Protect |
PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected. |
Endpoint Central offers advanced data leakage prevention capabilities, enabling the detection and classification of personally identifiable information (PII). It provides complete control over data flow within your IT environment by allowing administrators to configure policies for data transfers through cloud services and peripheral devices. It can block the transfer of sensitive information via unauthorized USB devices. It can also control the download and printing limit for trusted devices. Endpoint Central can help admins to encrypt end-users Windows devices using its Bitlocker Management and Mac devices with FileVault encryption.
|
11 |
Protect |
PR.PS-01: Configuration management practices are established and applied. |
Endpoint Central helps in centralizing and managing user-based and computer-based configurations for improved efficiency. Endpoint Central helps discover all installed applications and executables, and categorizes them as authorized or unauthorized based on the application control filter (blocklist/ allow-list) set by the admin. It also helps maintain full visibility with a comprehensive inventory of all managed endpoints in the network. Endpoint Central can blocklist or allow-list applications and stand-alone EXEs to prevent unauthorized application usage. |
12 |
Protect |
PR.IR-01: Networks and environments are protected from unauthorized logical access and usage. |
Endpoint Central regulates user permissions and strict access control policies to ensure only authorized individuals and devices can connect to your network. Endpoint Central has Failover server capability (available as an add-on) and can be brought into action, in case if the primary server |
13 |
Detect |
DE.CM-01: Networks and network services are monitored to find potentially adverse events. |
Endpoint Central leverages AI-driven behavior-based detection and advanced deep-learning antivirus to safeguard against both online and offline malware threats. Endpoint Central limits cyberattacks by blocking non-business applications and malicious executables.
|
14 |
Detect |
DE.AE-02: Potentially adverse events are analyzed to better understand associated activities. |
Endpoint Central delivers real-time alerts for suspicious activity, security incidents, and potential threats on managed endpoints. Endpoint Central helps automate workflows to initiate incident response procedures, notify security teams, and escalate critical events. |
15 |
Respond |
RS.MA-01: The incident response plan is executed in coordination with relevant third parties once an incident is declared. |
Endpoint Central helps automate workflows to initiate incident response procedures, notify security teams, and escalate critical events.
|
16 |
Respond |
RS.AN-03: Analysis is performed to establish what has taken place during an incident and the root cause of the incident. |
Endpoint Central's Next Gen Antivirus helps SOC team with incident forensics. |
17 |
Respond |
RS.MI-01: Incidents are contained . |
If the next gen antivirus engine detects a suspicious behavior in endpoints, it can quarantine those endpoints and, after a thorough forensic analysis, can be deployed back into production. If a file is infected with ransomware, it can be restored with the most recent backup copy of the file. |
18 |
Recover |
RC.RP-01: The recovery portion of the incident |
If the next gen antivirus engine detects a suspicious behavior in endpoints, it can quarantine those endpoints and, after a thorough forensic analysis, can be deployed back into production. Endpoint Central also provides instant, non-erasable backup of the files in your network every three hours by leveraging Microsoft's volume shadow copy service. If a file is infected with ransomware, it can be restored with the most recent backup copy of the file. |
Thank you for your feedback!
Sorry about that!