Comprehensive Approach to Security
Best-in-class security consulting, managed & support services. Includes advanced approach to patching & compliance needs. We bring a proven, layered, defense-in-depth system to future-proof security environments for digital transformation.
Security Support for Critical Technology Stack Components
Unified security & unified visibility across the application, middleware, database & operating system layers. We provide services to identify, prevent and combat threats for legacy systems.
World-Class Expertise & Experience
Industry expertise, best-in-class tools & strategic partnerships. Our seasoned experts ensure tightened security controls & compliance measures across the software infrastructure ecosystem.
Our Security Philosophy
We deliver a layered, Defense in Depth approach to security.
This means targeting the weakness category (CWE) rather than chasing individual historic threats or CVEs or trying to predict future CVEs. Addressing individual vulnerabilities is counterproductive. Many are active but not yet discovered, and others are still exposed because the patches did not work.
Our proactive approach future proofs the security of your environments.
We use hardening techniques and compensating controls to ensure your systems can pass penetration testing and audits. This comes standard with our third-party support. Using CIS & STIG Benchmarks, we guarantee you a more secure environment.
حل أمان Spinnaker Support الذي يتألف من سبع نقاط
Vulnerabilities and exposures now arise from a variety of external and internal sources, and effective security must address the full technology stack. Download the Security Services Solution Brief.
From our initial risk review, our team of experienced engineers adhere to the Seven-Point Security Solution, shown below. An established framework that combines proven people, processes, and technology to resolve issues as they occur and deploy the necessary tools and techniques needed to proactively maintain a secure application environment.
- Discover & Harden
- Security Incident Response
- Threat Intelligence
1. مراجعة مخاطر مخصصة
An audit and risk review for your systems, including reports with recommendations on configurations, encryptions, access management, and best practices and guidelines. This feeds into Attack Surface Reduction.
2. تقليل مساحة الهجمات
We advise on how to properly configure and harden applications, operating systems, servers, databases, and networks.
3. Compliance Audit Support
Consultative services designed to adjust your audit controls in order to be in compliance with attestations such as SOC2, HIPAA, GDPR, and PCI.
4. Vulnerability Support
Submit a ticket at any time for security-related activities and to address vulnerabilities. We use compensating controls (external to application code) to mitigate security risk.
5. تأمين مكتبة المصادر
Includes white papers and solution briefs on a wide range of topics related to security that we can share with any of our customers.
6. Proactive Security Tooling
A portfolio of security products designed to implement the Spinnaker Security Philosophy across a range of Oracle products.
7. Risk Assessment Bulletin
We monitor Oracle CVEs and publish periodic email bulletins for customers. These include CVE descriptions and offer best practice recommendations.
Seven-Point Security vs. Software Publisher Patches
We understand that some enterprises considering third-party support are concerned about the loss of quarterly software patches for critical vulnerabilities and exposures (CVEs). While SAP supplies its customers with most security patches even when not on SAP Support, Oracle does not offer customers access to security tools after they leave its support program.
While code patches do block vulnerabilities, the reality of the software patching process often does not meet its promise.
The Reality of Software Patching
Our Response on Patching
|التوقيت||Patches are not timely (can be months or years late).||Virtual patching tools and proactive monitoring provide near-immediate protection.|
|SPECIFICITY||الملفات التصحيحية ملائمة للجميع وقد تكون مشكلة بالنسبة للتخصيصات.||You should only have to receive the fixes you need.|
|الإصدارات||Patches may not be available for older versions and applications.||By addressing issues at the infrastructure level, you protect the entire stack, regardless of app versions.|
|TESTING||تتطلب الملفات التصحيحية وقتًا ثمينًا للاختبار والتثبيت.||For CVEs, methods such as virtual patching save valuable time by cutting short testing and installation.|
|APPLICATION||Many organizations do not patch or patch regularly due to operational constraints.||Organizations must remain vigilant for CVEs and not rely on patches that may not actually solve the issue.|
Spinnaker Support Seven-Point Security Solution
Our Seven-Point Security Solution replaces a sole reliance on patching with a stronger framework that covers a wider range of security issues. Our refined approach begins with an initial risk assessment and continues with ongoing vulnerability management. Through people, process, and technology our global security professionals continue to work until the security issue is properly addressed and the risk is mitigated.قراءة المزيد
Software Publisher Patches vs. Spinnaker Support Security
When organizations consider switching from publisher to third-party software support, it’s common for them to have questions regarding patching and security risk. Spinnaker Support addresses those concerns with our standard Seven-Point Security Solution, which exceeds the performances of patches as a CVE solution. From day one of the customer experience, we use a multilayered approach to replace security patches and updates with a holistic approach to security.قراءة المزيد
Proactive Security Tooling
As a part of our Threat Intelligence, Spinnaker Support has partnered with commercial vendors to implement our security philosophy and offer protection to organizations that want or need these additional tools. We are responsible for all installation and training, some of which can take less than a day.
Our current selection of products includes middleware protection (Waratek), database protection (McAfee), and operating system protection (Trend Micro Deep Security). For additional details on our Security Solutions, please contact us directly.
هل أنت مستعد لتجربة الدعم الاستثنائية؟
اطلب استشارة مجانية لمعرفة المزيد حول كيف يمكننا تقديم دعم البرامج المؤسسية المخصص بشكل استثنائي بتكلفة أقل بكثير.