Data Center Automation

Automate IT compliance and vulnerability risk management across your hybrid enterprise.

Data Center Automation
Automate IT compliance and vulnerability risk management consistently and proactively.
Regulatory, security, and internal IT compliance
Regulatory, security, and internal IT compliance

Run compliance audits across server OS. Visualize the results in a single compliance dashboard and then remediate according to maintenance windows and SLOs. Learn more.

Proactive vulnerability risk management
Proactive vulnerability risk management

Scan against the latest threats. Prioritize and track top vulnerabilities in a central risk dashboard. Patch according to policies, service level objectives, and maintenance windows. Learn more.

Enterprise-standard provisioning and configuration
Enterprise-standard provisioning and configuration

Standardize at build time and then scale. Use policy-aware provisioning and configurations for automated initial enforcement of compliance and patching policies. Learn more.

Multivendor support and integration
Multivendor support and integration

Get the broadest range of support for multivendor infrastructure. Extend integration to resources deployed by open source configuration tools to centralize compliance and risk management. Learn more.

Market-leading out-of-the-box content
Market-leading out-of-the-box content

Choose from compliance benchmarks and remediation actions aligned to the latest industry and regulatory guidance for PCI DSS, HIPAA, FISMA, CIS, ISO, and more. Learn more.

Container deployment
Container deployment

Deploy on container-based architecture for easy installation and effortless upgrades. Learn more.

Dive deeper. Discover more.

  • Regulatory, security, and internal IT compliance

    Regulatory, security, and internal IT compliance

    Regulatory, security, and internal IT compliance

    Regulatory, security, and internal IT compliance

    Manage compliance for server OS, databases, and middleware in a single UI. Policy-driven automation enables consistent and custom processes for compliance audits, orchestrated remediation, and any required exceptions. Service level objective management establishes the priority of fixing variances before they became violations. Actionable, drill-down dashboard shows compliance state by resources impacted and severity.

  • Proactive vulnerability risk management

    Proactive vulnerability risk management

    Proactive vulnerability risk management

    Proactive vulnerability risk management

    In the drill-down dashboard, prioritize key risk events and vulnerabilities. Orchestrated workflows run patch scans and remediation according to service level objectives. Vendor metadata download extracts patch inventory, content, signatures, and severity information directly from original vendor sources and Common Vulnerability Exposure (CVE) libraries. Automation of patch scans and remediation include order of installations and fulfillment of dependencies.

    Proactive vulnerability risk management
  • Enterprise-standard provisioning and configuration

    Enterprise-standard provisioning and configuration

    Enterprise-standard provisioning and configuration

    Enterprise-standard provisioning and configuration

    Use DCA to automate enterprise-scale deployments. Provision pre-configured operating system baselines onto bare metal and virtual servers quickly, consistently, and with minimal manual intervention. Enforce policies, layer software components, and patch newly provisioned resources using pre- and post-install workflows.

    Enterprise-standard provisioning and configuration
  • Multivendor support and integration

    Multivendor support and integration

    Multivendor support and integration

    Multivendor support and integration

    Microsoft IIS, and JBoss. Centralize risk management by using DCA to discover and run compliance and patching operations on resources deployed by open-source configuration management tools. Using APIs, invoke compliance, patching, and remediation functions from any application or script.

    Multivendor support and integration
  • Market-leading out-of-the-box content

    Market-leading out-of-the-box content

    Market-leading out-of-the-box content

    Market-leading out-of-the-box content

    Keep the enterprise compliant from initial provisioning through resource retirement with a powerful library of regulatory and security compliance benchmarks (e.g., PCI DSS, HIPAA, FISMA, CIS, ISO 27001, and DISA), compliant deployment templates, and remediation actions. Modify or clone content in a way that fits the unique needs of the enterprise.

    Market-leading out-of-the-box content
  • Container deployment

    Container deployment

    Container deployment

    Container deployment

    DCA is built on open-source container architecture for easy installation and upgrades, delivering quick time to value, high availability, and horizontal scaling. The modern architecture comes with shared services that include orchestration, discovery, and role and credentials management.

    Container deployment

Related Products

release-rel-2020-10-1-5313 | Wed Oct 14 18:06:08 PDT 2020
5313
release/rel-2020-10-1-5313
Wed Oct 14 18:06:08 PDT 2020