ConsoleWorks REACT

Risk Evaluation and Assessment for Cyber Threats

 

Download the White Paper

Based on a Zero Trust Foundation

ConsoleWorks REACT embodies the core principles of Zero Trust security, “never trust, always verify”. As the centralized human response and access control, logging, configuration monitoring, endpoint password management solution, our platform offers robust control over user access to essential resources for managing critical infrastructure operations.

 

 

By integrating the assessment of user risk factors, such as roles, access privileges, and behavioral patterns, with the assessment of asset risk factors, including vulnerabilities and security configurations, ConsoleWorks REACT delivers a holistic view of the overall cyber and operational risk landscape.

Download the white paper

ConsoleWorks REACT Methodology

 

Evaluated Risk Factors

Risk factors
Action command risk factor Asset security settings risk factor Threats Asset/location impact Asset criticality Day of week Time of day User role Vulnerabilities (CVEs & CPEs) risk factor

Action command risk factor

In ConsoleWorks REACT, command control rules can be defined for an asset type for specific users or groups of users. Command sequence monitoring is used to monitor a user’s session to determine whether that session activity is increasingly risk based on the sequence or frequency of commands being entered.

The result is an overall user or interactive user session value based on the potential for compromise to the asset.

Asset security settings risk factor

ConsoleWorks provides a range of methods to define and monitor system security settings, including monitoring system configurations for overall security settings, firewall changes, and other compliance- and security-related issues, and patch application monitoring. If differences are found, ConsoleWorks provides notification for investigation. The result is an overall specific system or group of systems value based on the potential for compromise.

Threats

ConsoleWorks REACT uses input from common threat detection technologies to help identify and assess the likelihood and potential impact of various cyber threats, such as malware or phishing attacks.

Asset/location impact

An asset can be assigned an impact level depending on the impact that asset has to an organization’s business if compromised.

Asset criticality

An asset can be assigned a criticality. A value can be assigned to an asset based on its criticality to the business.

Day of week

Certain employees may have standard workdays. Activity performed outside of those days could be an indication of nefarious activity by a user.

Time of day

Certain employees may have standard work hours. Activity performed outside of those hours could be an indication of nefarious activity by a user.

User role

A privileged user's role in the organization can have a direct correlation to the amount of risk associated with the user. A user who has "administrative" access to numerous critical assets may be considered a high-risk user. Alternatively, a new employee may also be considered high risk due to lack of experience.

Unique to ConsoleWorks is the ability to specify extremely granular access control rules to ensure least privilege and user access control rules for specified times. Vendors and contractors could also be assigned an impact level appropriate for either their non-employee status or the potential impact their work may introduce.

Vulnerabilities (CVEs & CPEs) risk factor

ConsoleWorks REACT integrates with the National Vulnerability Database (NVD) to help identify and assess the likelihood and potential impact of vulnerabilities in the organization’s systems, such as outdated software.

ConsoleWorks REACT Webinar

In today’s landscape, cyber risks are a critical concern for organizations of all sizes and industries. Cyber-attacks can have significant consequences, including financial losses, reputational damage, and legal liability.

Join us on October 18th where we’re going to show how ConsoleWorks REACT can help centralize and automate your cyber risk assessment for proactive response.

 

Register here!

We can help

Reach out today, and we'll talk through how we might be able to help!

Contact us