Detect change to the attributes of any member entity or configuration
Side-by-side comparisons to highlight changes
Restore a previous configuration when necessary
Eliminating unexpected network outages requires knowledge of what’s actually changing from an expected and trusted state of operation. CimTrak provides comprehensive visibility and analysis across your entire network for changes that are the result of malicious or unintentional activity. Whether it's authorized or unauthorized activity, CimTrak's change reconciliation capability can highlight a side-by-side comparison of what's changed. If change(s) are unwanted, CimTrak can take corrective action and restore to any number of previous baselines to ensure trust and resiliency enterprise-wide.
A few examples of how traditional security tools would not detect or identify a problem resulting from malicious change(s) to Network Devices:
Impact: When the threat actor changes a hostname, it may not be recognizable by a human or system via DNS may no longer be able to communicate with it.
Impact: When the threat actor changes the device IP, it is no longer at the address the admins recognize. Any devices pointed to this IP will no longer be on the network or can communicate.
Impact: When the threat actor deletes the other users, this prevents them from having a chance to defend against the threat actor.
Impact: When the threat actor changes the password of the account in use, this prevents anybody from gaining admin access to the device ever again.
Impact: When the threat actor changes route tables, this changes the routes available for devices on the network to communicate properly.
Impact: When the threat actor changes interface configuration, any physical devices plugged into those interfaces will now have a different IP or configuration and/or may not communicate as expected.
Impact: When the threat actor changes firewall rules, they could open up ports facing the internet, providing many open doors into the network for more infiltration attempts and/or other threat actor collaboration.
Impact: When the threat actor changes the MOTD Banner, they include a message letting the user know they have been hacked and demand a ransom.