Organizations Participating — Archive

Important: The OVAL Compatibility Program was moved to "archive" status in December 2009, and replaced with the "OVAL Adoption Program." Under the OVAL Adoption Program product validation is performed by an external organization, allowing the OVAL Team to focus on educating vendors on best practices regarding the use and implementation OVAL and on how OVAL can continue to evolve as needed by the community.

Refer to the OVAL Adoption Program section for addition information and to review all products and services listed.

TOTALS
Organizations Participating: 28
Products & Services: 40

All organizations participating in the Compatibility Program are listed below, including those with OVAL-Compatible Products and Services and those with Declarations to Be OVAL-Compatible.


Products are listed alphabetically by organization name:

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


AgilianceDate Declared: November 8, 2007

Web Site: www.agiliance.com
Quote/Declaration: In order to promote open standards and leveraging existing tools already deployed as authoritative sources of compliance audit detail, Agiliance executes "OVAL" scripts to implement CIS benchmarks. Agiliance IT-GRC has implemented CIS benchmark support for most OSes as well as for selected applications (e.g. Oracle database). Agiliance is using OVAL compatibility declarations to support this capability. In addition, Agiliance has upgraded to OVAL v5.3 to accommodate SCAP in its 'XCCDF and OVAL' import tool.


Name: IT GRC Platform 3.0
Type: Risk and Compliance Management Solution  
OVAL Definition Consumer: Yes
OVAL Results Consumer: Yes
OVAL Systems Characteristics Consumer: Yes
OVAL Definition Producer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Producer: Planned

Last Updated: November 8, 2007

Back to top


Ai Metrix, a SYS Technologies companyDate Declared: October 15, 2007

Web Site: www.systechnologies.com
Quote/Declaration: The NeuralStar framework together with an SCAP-certified tool combine to bring the power of automated content and compliance, and automated evaluation and remediation to the SCAP. When teamed with an SCAP vendor, the NeuralStar consolidated dashboard can display SCAP scan results including OVAL, XCCDF, CCE, CVSS and other standards as they mature thus assisting FISMA compliance reporting.


Name: NeuralStar Network
Type: Management System (NMS) for SCAP Services and Reporting  
OVAL Results Consumer: Planned

Last Updated: October 22, 2007

Back to top


ArcSight, Inc.Date Declared: July 5, 2006

Web Site: www.arcsight.com
Quote/Declaration: As a pioneer and leading provider of security management solutions for the enterprise ArcSight actively promotes and supports open systems standards such as OVAL.


Name: ArcSight Enterprise Security Manager
Type: Enterprise Security Management  
OVAL Results Consumer: Planned

Last Updated: September 15, 2006

Back to top


Assuria LimitedDate Declared: September 4, 2006

Web Site: www.assuria.com
Quote/Declaration: Assuria Auditor (formerly known as ISS System Scanner), a host-based vulnerability assessment and policy compliance tool, assesses host security, detecting and reporting system security weaknesses. Assuria Auditor measures, manages, and enforces security policies across a wide range of operating systems using a host-to-network view of critical systems and servers. Assuria Auditor's methodology simplifies the creation of system security baselines for users, groups, shares, services, and critical system files, and easily fits in with existing business processes. Fully scalable for enterprise installations, Assuria Auditor manages large sensor populations and comes with a Web interface for distributed security management. Assuria Auditor issues reports designed for both technical and managerial audiences that identify areas of concern, the consequences of a security breach, and the remedy for each out-of-policy, mis-configuration, or vulnerability.

Assuria Auditor is CVE-compliant and Assuria Limited is committed to provide support for OVAL as an OVAL Definition Consumer and Producer, and an OVAL Results Producer, which will allow customers to integrate Assuria Auditor output with other OVAL-compatible results-consumer products.


Name: Assuria Auditor Version 4.2.5
Type: Vulnerability Assessment / Policy Compliance  
OVAL Definition Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned

Last Updated: September 15, 2006

Back to top


BigFix, Inc.Date Declared: June 20, 2006

Web Site: www.bigfix.com
Quote/Declaration: BigFix enables organizations to better manage their global IT infrastructures with solutions to discover, analyze, change, and maintain security and software configurations faster and more accurately, resulting in improved processes, greater visibility, better security and more reliable services while reducing costs.

BigFix supports the adoption of open standards such as OVAL as an important part of reducing IT security risk and improving policy and regulatory compliance. The BigFix Enterprise Suite for Vulnerability and Security Configuration Management consumes OVAL Definitions to provide real-time vulnerability detection and remediation for heterogeneous distributed networks. The suite will produce OVAL Systems Characteristics and OVAL Results to enable tools that consume OVAL to leverage the accurate and real-time configuration and security visibility provided by BigFix solutions.


Name: BigFix Enterprise Suite for Vulnerability and Security Configuration Management, Version 6.0
Type: Real-Time Security Configuration Management Suite 
OVAL Definition Consumer: Yes
OVAL Results Producer: Planned
OVAL Systems Characteristics Producer: Planned
Review Completed Questionnaire

Last Updated: October 4, 2006

Back to top


US ARMY CERDECDate Declared: May 3, 2007

Web Site: www.cerdec.army.mil
Quote/Declaration: Armadillo developed by US Army CERDEC is a vulnerability assessment and remediation tool to bring Linux servers into compliance with security regulations. Armadillo consumes OVAL definition files (such as the ones produced by Red Hat and Mitre) and applies patches where applicable. It works on LANs disconnected from the internet and is able to probe and remediate multiple hosts concurrently over SSH without the need to install any software on the target hosts.


Name: Armadillo
Type: Vulnerability Assessment and Remediation  
OVAL Definition Consumer: Planned
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
OVAL Definition Producer: No

Last Updated: May 3, 2007

Back to top


The Center for Internet SecurityDate Declared: September 11, 2007

Web Site: www.cisecurity.org
Quote/Declaration: CIS' CIS-CAT (CIS Security Assessment Tool) reads XCCDF and OVAL, and automatically tests systems for compliance with guidance provided in those formats. CIS-CAT currently provides full XCCDF, OVAL and CPE support.


Name: CIS-CAT
Type: Host-based security scanner tool  
OVAL Definition Consumer: Yes
OVAL Definition Producer: No
OVAL Results Consumer: No
OVAL Results Producer: No
OVAL Systems Characteristics Consumer: No
OVAL Systems Characteristics Producer: No

Last Updated: September 12, 2007

Back to top


Configuresoft, Inc.Date Declared: December 1, 2006

Web Site: www.configuresoft.com
Quote/Declaration: OVAL compatibility will improve the efficiency and effectiveness with which our customers can leverage authoritative vulnerability and remediation content, as well as improve inter-application integration across the provisioning, configuration and compliance stacks in the enterprise.


Name: Enterprise Configuration Manager
Type: Assessment and Remediation solution 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Yes
OVAL Results Producer: Yes
OVAL Definition Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: No
Review Completed Questionnaire

Last Updated: January 31, 2007

Back to top


eEye Digital Security, Inc.Date Declared: September 4, 2007

Web Site: www.eeye.com
Quote/Declaration: eEye understands the need for an open, standardized method of communicating security information across all platforms and applications. eEye is committed to providing support for OVAL in an effort to provide customers with a common method of sharing security information (internally and externally) and strengthening the security of their organizations.


Name: Retina Enterprise Suite
Type: Vulnerability Management  
OVAL Definition Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Definition Producer: No
OVAL Results Consumer: No
OVAL Systems Characteristics Producer: No

Name: Retina Network Security Scanner
Type: Network Security Risk Assessment  
OVAL Definition Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Definition Producer: No
OVAL Results Consumer: No
OVAL Systems Characteristics Producer: No

Last Updated: September 4, 2007

Back to top


GFI Software Ltd.Date Declared: February 20, 2007

Web Site: www.gfi.com
Quote/Declaration: GFI LANguard Network Security Scanner is our award winning software solution which helps security administrators be in contact with the real security status of their network. GFI LANguard N.S.S. integrates the three main pillars of security management i.e. Vulnerability Scanning, Network Auditing and Patch management into one product. The results of the three areas are processed, grouped and linked to provide a unified view which reflects more closely the big picture of the threats which are present on the network.

GFI recognizes the importance of standards in a field which is encountering even bigger challenges, variation of attacks and abuses of IT systems. While searching for a standard which will allow us to adhere to as well as encourage our customers to report vulnerabilities in a particular format, we found a perfect synergy between our technology and OVAL. We believe that such integration will provide a common ground for our customers and security administrators out there to share and unify experiences against these ever increasing threats.


Name: LANguard Network Security Scanner
Type: Network Vulnerability Assessment and Remediation 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
Review Completed Questionnaire

Last Updated: April 13, 2007

Back to top


Guidance Software Inc.Date Declared: August 3, 2007

Web Site: www.guidancesoftware.com
Quote/Declaration: We would like to use the OVAL database to perform vulnerability checks on end nodes within on organization. We'd like to consume an OVAL database, and iterate through it checking each end node for the defined vulnerability. At then end we would produce a report listing which machines passed/failed the vulnerability checks and for those that failed, which vulnerabilities exist.


Name: EnCase Information Assurance Suite
Type: Enterprise software  
OVAL Definition Consumer: Planned
OVAL Results Consumer: Planned
OVAL Systems Characteristics Consumer: Planned

Last Updated: August 6, 2007

Back to top


Hewlett-Packard Development CompanyDate Declared: April 17, 2007

Web Site: www.hp.com
Quote/Declaration: The Opsware Server Automation System along with The Opsware Network enables IT organizatons to efficiently manage their server infrastructure, ensure compliance with industry standards and internal best practices, and provides an actionable vulnerability service designed to rapidly identify and remediate network vulnerabilities that apply to the IT organization based on their server infrastructure.

HP (formerly Opsware) supports the OVAL standard for vulnerability disclosure. Standarizing on the OVAL format will assist the IT organization in reducing the vulnerability window between vulnerability notification and remediation.


Name: Opsware Server Automation System
Type: Application Management 
OVAL Definition Consumer: Yes
Review Completed Questionnaire

Name: The Opsware Network
Type: Repository of Content 
OVAL Definition Producer: Yes
Review Completed Questionnaire

Last Updated: November 13, 2007

Back to top


Inverse Path Ltd.Date Declared: February 21, 2008

Web Site: www.inversepath.com
Quote/Declaration: Our compliance tool aims at allowing an easy and effective management of security policies. We've always looked at standardization efforts as a very effective approach for improving the state of security and/or known vulnerability checking, OVAL does just that and we are committed in supporting it for seamless integration and empowering users without re-inventing the wheel.


Name: TPOL - OVAL Security Compliance
Type: Vulnerability/Patch/Compliance Assessment  
OVAL Definition Consumer: Yes
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
Review Completed Questionnaire

Last Updated: February 22, 2008

Back to top


KACE Networks, Inc.Date Declared: June 8, 2006

Web Site: www.kace.com
Quote/Declaration: The KBOX 1000 Series Systems Management Appliances by KACE are a secure line of server appliances that automate routine and complex IT maintenance tasks improving IT productivity and security. Included with the KBOX 1000 Series appliances are a set of security features which provide vulnerability auditing through seamlessly integrating OVAL tests and reporting on the outcomes at both at the individual node and aggregate network levels. The KBOX 1000 Series is also searchable by OVAL-ID. In addition, security policies can be set and enforced through automatic remediation and, if necessary, node quarantine to prevent security breaches and/or network infections.

KACE applauds the OVAL standard efforts as a key enabler for helping IT organizations deal with the very real security and productivity threats that have escalated dramatically in the last five years.


Name: KBOX 1000 Series Systems Management Appliances
Type: IT Automation Appliances 
OVAL Definition Consumer: Yes
Review Completed Questionnaire

Last Updated: October 16, 2006

Back to top


Lieberman Software CorporationDate Declared: February 19, 2008

Web Site: www.liebsoft.com
Quote/Declaration: Lieberman Software has always been at the forefront of providing security reporting and management tools for our government and commercial accounts. We believe that the active adoption and reporting on system characteristics based on OVAL standards would provide a substantial benefit for our client base and given them an even clearer evaluation of their security profile as well as the tools to bring their system and security architecture up to best practices more rapidly.


Name: User Manager Pro
Type: System security reporting, management, and remediation  
OVAL Definition Consumer: Planned
OVAL Results Producer: Planned

Last Updated: February 19, 2008

Back to top


Lumension SecurityDate Declared: September 5, 2006

Web Site: www.lumension.com
Quote/Declaration: The Lumension (formerly PatchLink) OVAL Add-In comes in several versions intregrated with Lumension Update, Lumension Enterprise Reporting and Lumension Scanner Integration. The Add-In is a Web application that consumes results and system characteristic files from clients through manual or automatic uploads. The Add-In consumes definitions from multiple source, consolidates and produces operating system family specific definition files. The Add-In includes command-line-based intrepreters and is designed to work with 3rd party intrepreters to produce system characteristic and result files. Data is stored in a database that supports XML as a native database and has Xpath support.


Name: Lumension Enterprise Reporting with OVAL Add-In, Version 6.3
Type: Vulnerability/Patch/Compliance Assessment  
OVAL Definition Consumer: Planned
OVAL Definition Producer: Planned
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned

Name: Lumension Intelligent OVAL Xml Editor, Version 6.3
Type: OVAL Utility  
OVAL Definition Producer: Planned
OVAL Definition Consumer: No
OVAL Results Consumer: No
OVAL Results Producer: No
OVAL Systems Characteristics Consumer: No
OVAL Systems Characteristics Producer: No

Name: Lumension OVAL Add-In (Special Edition), Version 6.3
Type: Vulnerability/Patch/Compliance Assessment 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Yes
OVAL Results Producer: Yes
OVAL Systems Characteristics Consumer: Yes
OVAL Systems Characteristics Producer: Yes
Review Completed Questionnaire

Name: Lumension Scanner Integration with OVAL Add-In, Version 6.3
Type: Vulnerability/Patch/Compliance Assessment  
OVAL Definition Consumer: Planned
OVAL Definition Producer: Planned
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned

Name: Lumension Update with OVAL Add-In, Version 6.3
Type: Vulnerability/Patch/Compliance Assessment  
OVAL Definition Consumer: Planned
OVAL Definition Producer: Planned
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned

Last Updated: September 14, 2007

Back to top


McAfee, Inc.Date Declared: January 29, 2007

Web Site: www.mcafee.com
Quote/Declaration: OVAL is establishing the bar on interoperability between tools in the vulnerability identification and vulnerability remediation management and system state fields. The ability to specifically describe vulnerabilities on a system and exchange that information between tools is doing a great deal to improve the offerings vendors supply to their customers. McAfee is actively working with OVAL to foster and advance this effort.


Name: Hercules Policy Auditor 4.5
Type: Automated Vulnerability Remediation, Compliance Management, Policy Audit, Policy Enforcement and Vulnerability Management 
OVAL Results Consumer: Yes
Review Completed Questionnaire

Name: Hercules Remediation Manager 4.5
Type: Automated Vulnerability Remediation, Compliance Management, Policy Audit, Policy Enforcement and Vulnerability Management 
OVAL Results Consumer: Yes
Review Completed Questionnaire

Last Updated: August 22, 2007

Back to top


MMG Security, Inc.Date Declared: October 12, 2006

Web Site: www.mmgsecurity.com
Quote/Declaration: Sussen is a host-based vulnerability assessment tool. It's purpose is to serach for vulnerabilties, configuration and policy issues on computer systems. Sussen uses agents for distributed deployments and a web interface for management/reporting.

MMG Security fully supports the OVAL standard and is commited to providing support for producing/consuming all OVAL documents and interoperability with other OVAL-compatible products.


Name: Sussen Version 1.0
Type: Vulnerability Assessment / Policy Compliance 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Yes
OVAL Results Producer: Yes
OVAL Systems Characteristics Consumer: Yes
OVAL Systems Characteristics Producer: Yes
Review Completed Questionnaire

Last Updated: February 2, 2006

Back to top


nCircle Network Security, Inc.Date Declared: September 14, 2006

Web Site: www.ncircle.com
Quote/Declaration: nCircle IP360 is an enterprise-class vulnerability and risk management system that proactively drives cost-effective network risk reduction. nCircle IP360 delivers a comprehensive view of your risk, continuously adapts to the changing threat environment, and is built for rapid deployment and ease of management across large, globally distributed networks. nCircle is committed to open standards of quality in the security community, and fully supports the OVAL standard for vulnerability checks. nCircle will assert compatibility between our checks and the OVAL standard, ensuring that the results of our checks match the OVAL results. Further integration will enable customers to import OVAL definitions as custom rules.

nCircle nTellect for Cisco IDS/IPS is a real-time threat prioritization system that leverages endpoint intelligence gathered from the nCircle IP360 vulnerability and risk management system. nTellect correlates host vulnerability and application information with Cisco Intrusion Detection and Prevention System alerts to identify real threats and suspicious activity against truly vulnerable targets. Prioritization of attacks based on endpoint intelligence significantly reduces the occurrence of false alerts and enable security personnel to focus their resources on high risk network attacks.


Name: IP360
Type: Vulnerability Management System  
OVAL Definition Consumer: Planned
OVAL Results Producer: Planned

Name: nTellect for Cisco IDS/IPS
Type: Real-Time Threat Prioritization System  
OVAL Definition Consumer: Planned

Last Updated: September 15, 2006

Back to top


NetIQ Solutions from AttachmateDate Declared: September 12, 2006

Web Site: www.netiq.com
Quote/Declaration: NetIQ Secure Configuration Manager measures and enforces compliance to configuration baselines in accordance with corporate policies, regulations and evolving threats and vulnerabilities. It also performs remediation on compliance and configuration gaps, using security knowledge that is updated in real time. Secure Configuration Manager proactively ensures that organizations are identifying the latest system vulnerabilities and complying with policies to manage information security risk. This allows users to correct exposures before they result in security breaches, failed audits or costly downtime. OVAL is an integral part of NetIQ's approach to assure compliance, manage IT risks and secure assets. NetIQ Secure Configuration Manager consumes OVAL Definitions to provide host based vulnerability assessment for global, heterogeneous environments. NetIQ Secure Configuration Manager also consumes OVAL results, allowing organizations to leverage existing investments in network vulnerability assessment tools while providing a single point of roll-up, scoring and presentation of security configuration and vulnerability assessment results.


Name: NetIQ Secure Configuration Manager 5.6
Type: Configuration and Vulnerability Management 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Planned
OVAL Results Producer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
Review Completed Questionnaire

Last Updated: January 31, 2007

Back to top


NIST Computer Security DivisionDate Declared: January 18, 2007

Web Site: csrc.nist.gov/
Quote/Declaration: The Security Content Automation Program (SCAP) is a public free repository of security content to be used for automating technical control compliance activities, vulnerability checking (both application misconfigurations and software flaws), and security measurement.


Name: Security Content Automation Program
Type: Repository of Compliance Checks 
OVAL Definition Producer: Yes
Review Completed Questionnaire

Last Updated: January 31, 2007

Back to top


Red Hat, Inc.Date Declared: May 18, 2006

Web Site: www.redhat.com
Quote/Declaration: The Red Hat Security Response team constantly tracks and investigates all security issues affecting Red Hat customers, providing timely and clearly explained patches and security advisories via the Red Hat Network, designed to help customers evaluate and manage their risk. By creating and supporting OVAL patch definitions we provide a structured and machine-readable version of our security advisories, allowing OVAL-compatible tools to test for the presence of described vulnerabilities.


Name: Red Hat Security Advisories
Type: Security Update Advisories 
OVAL Definition Producer: Yes
Review Completed Questionnaire

Last Updated: May 18, 2006

Back to top


Scalable Software, LLCDate Declared: July 7, 2006

Web Site: www.scalable.com
Quote/Declaration: Scalable Software's Command Center (CC) Examiner is an agentless application that assesses system compliance with best practice security configuration standards defined by the Center for Internet Security (CIS). CC Examiner also measure and reports against custom created security configuration standards and integrates evidentiary data into Scalable's CC IT compliance management system. CC Examiner supports the ability to import OVAL definitions associated with configuration security benchmarks and technical standards created by CIS, and to assess system compliance against these benchmarks.


Name: Command Center Examiner
Type: Security Configuration and Policy Compliance Checker  
OVAL Definition Consumer: Planned

Last Updated: July 7, 2006

Back to top


Secure Elements, Inc.Date Declared: June 16, 2006

Web Site: www.secure-elements.com
Quote/Declaration: C5 Compliance Platform consists of an integrated security appliance and host-based sensors, and is a plug-and-play compliance and vulnerability management solution. Our sensors are unique in that they are "light weight," with negligible processor, memory, and hard disk requirements. We also use the Common Vulnerabilities and Exposures (CVE) dictionary for standardized naming and vulnerability identification and other information security exposures.


Name: C5 Compliance Platform Version 3.0
Type: Enterprise Compliance and Vulnerability Management 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Yes
OVAL Results Producer: Yes
Review Completed Questionnaire

Last Updated: May 8, 2007

Back to top


Security-DatabaseDate Declared: January 7, 2007

Web Site: www.security-database.com
Quote/Declaration: SSA is a non-intrusive host-based security analyzer that fully uses the capabilities of the OVAL interpreter. Next releases will integrate the ability to report vulnerabilities using OVAL-ID, CVE and CVSS, missed patches, users policy and much more features. Security-Database, a senior security consultants consortium, actively promotes open standards projects. And the OVAL concept is one of the best that IT organizations has to keep an eye on.


Name: Security System Analyzer Version 1.5
Type: Vulnerability Assessment / Policy Compliance 
OVAL Definition Consumer: Yes
OVAL Results Consumer: Yes
OVAL Results Producer: Yes
OVAL Systems Characteristics Consumer: Yes
OVAL Systems Characteristics Producer: Yes
OVAL Definition Producer: No
Review Completed Questionnaire

Last Updated: April 11, 2007

Back to top


ThreatGuard, Inc.Date Declared: January 5, 2004

Web Site: www.ThreatGuard.com
Quote/Declaration: ThreatGuard's Vulnerability Management products utilize accurate vulnerability reporting as one of their cornerstones. The OVAL definitions provided and maintained by the OVAL community represent the most accessible and thorough collection of on-box vulnerability definitions for Windows, Linux, Solaris, HP-UX, and Cisco IOS. ThreatGuard recognizes the advantages in applying the OVAL definitions on a network-wide basis to enhance vulnerability detection, patch management, compliance management, and software inventory and has thus made OVAL Compatibility a significant feature of the ThreatGuard products since January 2005.

By seamlessly including OVAL tests in our vulnerability scanning subsystem, ThreatGuard, Inc. validates and endorses the use of OVAL definitions on a network-wide basis. ThreatGuard also performs value-added steps, such as providing solution text and integrated CVSS references where applicable. By performing these tests in Java from a Linux-based, auto-updated network appliance, ThreatGuard enables a wide array of organizations to take advantage of the OVAL team's tremendous work.


Name: Secutor Prime
Type: Compliance Management and Remediation 
OVAL Definition Consumer: Yes
OVAL Results Producer: Yes
OVAL Results Consumer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
OVAL Definition Producer: No
Review Completed Questionnaire

Name: ThreatGuard 4.5
Type: Continuous Security Auditing and Compliance Management 
OVAL Definition Consumer: Yes
OVAL Results Producer: Yes
OVAL Results Consumer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
OVAL Definition Producer: No
Review Completed Questionnaire

Name: ThreatGuard OEM Integration Kit 1.0
Type: Libraries to Build OVAL Compatibility into Third-Party Systems 
OVAL Definition Consumer: Yes
OVAL Results Producer: Yes
OVAL Results Consumer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
OVAL Definition Producer: No
Review Completed Questionnaire

Name: ThreatGuard On Demand 1.0
Type: On Demand Auditing and Compliance Management 
OVAL Definition Consumer: Yes
OVAL Results Producer: Yes
OVAL Results Consumer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
OVAL Definition Producer: No
Review Completed Questionnaire

Name: ThreatGuard Traveler 4.5
Type: Continuous Security Auditing and Compliance Management for Service Providers 
OVAL Definition Consumer: Yes
OVAL Results Producer: Yes
OVAL Results Consumer: Planned
OVAL Systems Characteristics Consumer: Planned
OVAL Systems Characteristics Producer: Planned
OVAL Definition Producer: No
Review Completed Questionnaire

Last Updated: January 19, 2007

Back to top

Page Last Updated: June 04, 2009