Policy Manager Comparison Checklist

A security policy is essential to any comprehensive cybersecurity strategy. Policy Minder makes it easy to define your security policy, check for policy exceptions, and stay compliant by automating security administration and reporting.

Policy Manager enables you improve system security without adding time-consuming, manual tasks to your workload. Use this checklist to see how your current solution compares.  

 

GENERAL PRODUCT FUNCTIONALITY Others Policy Manager
Security policies can be defined for security administration or compliance requirements
Discover the existing policy and use it as the initial policy setting
Compliance checks compare policies to actual server settings
Return out-of-compliant items to match policy values
Security configuration can be applied to multiple servers or customized for each one
Exception-based reports enhance efficiency
Email reports automatically
Document policies, compensating controls, and risk acceptance statements
Manage security policies and compliance with policies on multiple systems via a single screen
Comprehensive message log tracks administration and activity
Supports systems both on-premise and in the cloud
 

Back to top

 

 

 

AUTOMATING COMPLIANCE REQUIREMENTS AND REPORTING Others Policy Manager
Eliminate manual process of running reports, downloading information, and manually comparing lists to determine compliance or identify new items added to the list
Ensure consistent, accurate, and repeatable tasks that prove compliance
Report on out-of-compliance items and the fact that the policy is checked regularly
FixIt reports indicate how changes were made and what the previous values were
Ensure administrator tasks and reporting are accomplished regardless of how busy administrators are
Keep your security policies in one place and apply them to other partitions
 

Back to top

 

 

 

AUTOMATING SECURITY ADMINISTRATION Others Policy Manager
Policy Minder for IBM i
Discover new profiles, libraries, directories and objects
Maintain and identify all users with any special authority
Ensure user profiles are properly configured and correct them if they are not
Identify inactive profiles and remove them from the system
Ensure the ownership and authorities of libraries and objects in libraries are set correctly
Discover changes to authority settings on libraries, directories, objects and authorization lists
Fix ownership and authorities after a new deployment
Verify settings before and after a role swap, or following disaster recovery
Identify new or removed file shares
Discover changes to system values or where they don’t match policy
 
For AIX and Linux
Administer one server or multiple servers at the same time using agentless technology
Consolidated reports include results from multiple servers
Integrated cron feature enables you to check configurations as often as you want
Connections from the console to the servers occur over an SSH connection, ensuring no data flows in cleartext
Connections from the console to the servers are established using certificates, so no passwords are ever stored
Manage permissions and ownership of files and directories
Fix ownership and permissions after a new deployment
Determine when files’ contents have changed
Find files and directories with no owner
Identify inactive user accounts and take appropriate actions, such as disabling login and rlogin
Search for user accounts with UID of zero (other than root)
Find multiple accounts with the same UID
Ensure user accounts are configured correctly
Discover and fix security configuration settings that do not match policy
Discover which daemons are started and which are stopped
Automatically end daemons that shouldn’t be started or start daemons that should be running
 
Script Functions for AIX and Linux
Import existing scripts and consolidate them in one location
Define script conditions and return codes to be included in the compliance report
Automate running of scripts (compliance checks) across multiple servers
Define a FixIt script to be run when a script is non-compliant
Document when the script is run and whether it was successful, so you can provide proof to auditors
Determine whether a script changed since the last time it was run
Create user-defined policies to check unique requirements not defined within Policy Minder
 
For Windows
Administer one server or multiple servers at the same time using agentless technology
Integrated cron feature enables you to check configurations as often as you want
Consolidated reports include results from multiple servers
Identify inactive user accounts and take appropriate actions, such as disabling login and rlogin
Ensure user accounts are configured correctly
Verify files have ownership values consistent with your security policy for either individual or group owners
Keep track of file attributes such as Archive, Compressed, Hidden, or Read Only
Monitor the owner, group, check sum, and attributes of files on your Windows servers
 

Back to top

 

 

Let's Get Started

See Policy Manager in action to determine how it can help you meet your cybersecurity goals.

Request my free demo >