Data Center Automation

Automate IT compliance and vulnerability risk management across your hybrid enterprise.

Data Center Automation
Automate IT compliance and vulnerability risk management consistently and proactively.
Regulatory, security, and internal IT compliance
Regulatory, security, and internal IT compliance

Run compliance audit across server OS, databases, and middleware. Visualize in a single compliance dashboard and then remediate. Manage by policies and service level objectives. Learn more.

Proactive vulnerability risk management
Proactive vulnerability risk management

Scan against the latest threats. Prioritize and track top vulnerabilities in a central risk dashboard. Patch according to policies, service level objectives, and maintenance windows. Learn more.

Enterprise-standard provisioning and configuration
Enterprise-standard provisioning and configuration

Standardize at build time, and then scale. Use policy-aware provisioning templates for automated initial enforcement of compliance and patching policies. Learn more.

Multivendor support and integration
Multivendor support and integration

Get the broadest range of support for multivendor infrastructure. Extend integration to resources deployed by open source configuration tools to centralize compliance and risk management. Learn more.

Market-leading out-of-the-box content
Market-leading out-of-the-box content

Choose from compliance benchmarks and remediation actions aligned to the latest industry and regulatory guidance for PCI DSS, HIPAA, FISMA, CIS, ISO, and more. Learn more.

Container deployment
Container deployment

Deploy on container-based architecture for easy installation and effortless upgrades. Learn more.

Dive deeper. Discover more.

  • Regulatory, security, and internal IT compliance

    Regulatory, security, and internal IT compliance

    Regulatory, security, and internal IT compliance

    Regulatory, security, and internal IT compliance

    Manage compliance for server OS, databases, and middleware in a single UI. Policy-driven automation enables consistent and custom processes for compliance audits, orchestrated remediation, and any required exceptions. Service level objective management establishes the priority of fixing variances before they became violations. Actionable, drill-down dashboard shows compliance state by resources impacted and severity.

  • Proactive vulnerability risk management

    Proactive vulnerability risk management

    Proactive vulnerability risk management

    Proactive vulnerability risk management

    In the drill-down dashboard, prioritize key risk events and vulnerabilities. Orchestrated workflows run patch scans and remediation according to service level objectives. Vendor metadata download extracts patch inventory, content, signatures, and severity information directly from original vendor sources and Common Vulnerability Exposure (CVE) libraries. Automation of patch scans and remediation include order of installations and fulfillment of dependencies.

    Proactive vulnerability risk management
  • Enterprise-standard provisioning and configuration

    Enterprise-standard provisioning and configuration

    Enterprise-standard provisioning and configuration

    Enterprise-standard provisioning and configuration

    Use DCAX to automate enterprise-scale deployments. Bare metal and virtual image OS provisioning templates enable end-to-end builds with pre- and post-install configuration, layering of software components, compliance, and patching. With Docker-based Kubernetes cluster provisioning templates, deploy and configure master and worker nodes to support containerized applications.

    Enterprise-standard provisioning and configuration
  • Multivendor support and integration

    Multivendor support and integration

    Multivendor support and integration

    Multivendor support and integration

    Support the broadest range of multivendor infrastructure, including Windows, RHEL, SUSE, Ubuntu, Oracle, SQL Server, Db2, Microsoft IIS, and JBoss. Centralize risk management by using DCAX to discover and run compliance and patching operations on resources deployed by open-source configuration management tools. Using APIs, invoke compliance, patching, and remediation functions from any application or script.

    Multivendor support and integration
  • Market-leading out-of-the-box content

    Market-leading out-of-the-box content

    Market-leading out-of-the-box content

    Market-leading out-of-the-box content

    Keep the enterprise compliant from initial provisioning through resource retirement with a powerful library of regulatory and security compliance benchmarks (e.g., PCI DSS, HIPAA, FISMA, CIS, ISO 27001, and DISA), compliant deployment templates, and remediation actions. Modify or clone content in a way that fits the unique needs of the enterprise.

    Market-leading out-of-the-box content
  • Container deployment

    Container deployment

    Container deployment

    Container deployment

    DCAX is built on open-source container architecture for easy installation and upgrades, delivering quick time to value, high availability, and horizontal scaling. The modern architecture comes with shared services that include orchestration, discovery, role and credentials management, and ChatOps.

    Container deployment

Related Products

release-rel-2020-8-1-hotfix-4896 | Fri Aug 7 09:16:14 PDT 2020
4896
release/rel-2020-8-1-hotfix-4896
Fri Aug 7 09:16:14 PDT 2020