Operating systems (Windows, Linux, Solaris, AIX)
Network Devices (CISCO, Juniper, and More)
Scan Endpoints using CIS Benchmarks and DIA STIGs
Instant remediation Advice
Schedule Assessments of hardened state of endpoints
Track improvements to security posture via simple reports
Trusted third party guidelines are utilized to build policy/procedure for evaluation of current state
CimTrak evaluates and recommends actions and configurations needed for optimizing the security posture of the operating environment.
Hardening guidelines, in essence, become components of compliance standards and requirements such as CIS, DISA STIGs, PCI DSS, 800-53, 800-171, NERC-CIP and many others.