Help Center

Security

The security of Prognosis, its communications and the monitored environment should be considered in conjunction with overall business infrastructure security. This may include; anti-virus software, firewalls, intrusion detection and access controls and privileges. This guide will provide recommendations for Prognosis security and details on how this can be set up. However, it is strongly recommended that the services of a security expert be consulted to ensure that a total security package is implemented over the entire business environment including Prognosis.

IR has developed this software with a 'Defense in Depth' (DiD) design where there are multiple layers of security controls in place within the product.

Software Security

The three layers of Software Security control are available and consist of the following:

Access LayerNetwork LayerSystem Layer

The Access Layer is responsible for user access to both the Web Application and Windows Client. It also controls if any administrative functions can be carried out by the logged in user and can limit what collected data can be viewed.

The Network layer is responsible for the communications between servers and other applications.

The System Layer is responsible for the various processes that run on the Prognosis Server.


For further details and recommendations refer to Recommendations for the Access LayerFor further details and recommendations refer to Recommendations for the Network LayerFor further details and recommendations refer to Recommendations for the System Layer

User/Process Security

In addition to the software layers above, the following recommendations for User Privileges and Process security controls have been supplied:

HPE NonStop ServersUNIX/Linux ServersWindows Servers

User and Process privilege required to use the product are provided

User and Process privilege required to use the product are provided

Windows Group Policy Object considerations for domain access should be addressed.


For further details and recommendations refer to Recommendations for HPE NonStop ServersFor further details and recommendations refer to Recommendations for UNIX/Linux ServersFor further details and recommendations refer to Recommendations for Windows Servers

Product Security

Further security guidance is provided for the various product suites and systems for monitoring to ensure that the highest level of security is deployed:

InfrastructureTransactCollaborate
For further details and recommendations refer to Recommendations for Infrastructure ProductsFor further details and recommendations refer to Recommendations for Transact ProductsFor further details and recommendations refer to Recommendations for Collaborate Products

Provide feedback on this article