Cyber Security and Information Regulation in the Dominican Republic

As the growth of technology is increasing rapidly, the amount of internet penetration in the dominican republic has made it vulnerable to cyber attacks. In order to overcome this situation, the Dominican Republic has formulated Cyber Security norms and regulations to ensure uninterrupted functioning of businesses.

These regulations have been collected and articulated by SS-Dominicana - a system integration company which provides services and solutions in Information Security, Business Continuity and IT management. In this page, we shall see the most reliable solutions provided by ManageEngine, which satisfies the Cyber Security Regulations of the Dominican Republic.

The solutions which fulfill these regulations are stated below, along with the article references contained in the document- "Cyber Security and Information Regulation in the Dominican Republic."

Article 28. Network Management : Device Configuration of Network

The article no.28 in the "Cyber Security and Information Regulation in the Dominican Republic" states the guidelines to be fulfilled by a network monitoring tool in terms of its efficiency to manage device configurations. ManageEngine's Network Configuration Manager is one such tool which satisfies the compliance requirements, since it offers multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. Now, let us see the excerpts from the document and find out how Network Configuration Manager satisfies the requirements.

Excerpt 1 (Ref. article 28):

"Define standard practices and policies and automatically control that the configurations of the devices comply with compliance standards."

Here's how Network Configuration Manager helps to achieve the compliance requirement stated above:

  • Network Configuration Manager helps to achieve auditable network compliance across industry-specific compliance policies.
  • It provides default policies to comply with standard industry guidelines like HIPAA, SOX, PCI and Cisco IOS policy.
  • On top of that, it also gives users the flexibility to create custom policies to meet the internal guidelines of their enterprises.
  • Users can directly apply these policies to devices and generate detailed reports on the compliance status of every device.

Excerpt 2 (Ref. article 28):

"Perform a "backup" of the configurations of the devices, maintain a history, compare versions and "upload" the changes, all from a centralized web GUI."

Here's how Network Configuration Manager helps to achieve configuration backup in network devices to fulfill the given guideline :

  • Network Configuration Manager backs up configurations of a large number of network devices in a very short time.
  • Users can make changes in configurations using change management and upload them.
  • Network Configuration Manager versions and stores configurations after each manual, scheduled, and automated backup.
  • These versioned backup files come together to form a configuration history.
  • Network admins can choose and compare a current configuration version with a previous version to spot configuration changes using Diff-View.

Excerpt 3 (Ref. article 28):

"Monitor changes in configurations, get instant notifications and prevent unauthorized changes."

Here's how Network Configuration Manager triggers change notifications as given in the above regulation:

  • Network Configuration Manager notifies users about configuration changes with the help of real-time change detection.
  • One can trigger notifications in the form of Email, SNMP traps, Syslog messages, Trouble tickets etc.
  • Thus, any unwanted change can be brought to notice and can be reverted immediately.

Excerpt 4 (Ref. article 28):

"Get a complete record about who, what and when the configuration changes happened. Record the actions, store them and reproduce them."

Here's how Network Configuration Manager helps to achieve the above standard with its dynamic change management:

  • Network Configuration Manager maintains a record of all the configuration changes made in network devices.
  • Users can receive immediate notifications on who made the change along with the time and date at which the change is made.
  • Network Configuration Manager also generates configuration change reports using which the admins can check for changes during a particular time period.

Thus, with the help of Network Configuration Manager, you can monitor the entire life cycle of device configuration management. Try out Network Configuration Manager by downloading the 30-day free version or request a personailzed demo.

For advanced network and server monitoring, integrate Network Configuration Manager along with OpManager. Read further to know more about OpManager and how it complies with the Dominican Republic!

Article 26. Management Information Systems

The article no.26 in the "Cyber Security and Information Regulation in the Dominican Republic" briefs about the general standards a network monitoring solution must possess in order to achieve a commendable network performance. OpManager is a tool which is in line with the guidelines stated, as it continuously monitors the network and provides an in-depth visibility and control over it. Now, let us see the excerpts from the document and understand how OpManager fulfills the guidelines.

Excerpt 1 (Ref. article 26)

"Real-time proactive monitoring of security and performance events throughout the infrastructure"

Know how OpManager suits the above stated requirement with its proactive network monitoring:

  • OpManager provides real-time monitoring functionality which enables users to instantly report on device performance in real-time without having to use an additional tool.
  • With its real-time performance graphs, OpManager enables users to get the latest information about device performance and its health, remotely.
  • These graphs provide statistics on device CPU and Memory Utilization and up-to-the-second information on any performance metric of a device.
  • Users can also monitor traffic/ Bandwidth utilization of an interface/ port in real-time.

Excerpt 2 (Ref. article 26)

"Consumption reports that illustrate how resources are being used. Alerts via email or SNMP when suspicious events occur."

Here's how OpManager fulfills the above stated condition with its intuitive reports and alerting mechanism:

  • OpManager provides 100 + out-of-the box reports to achieve a well-planned and optimized IT infrastructure.
  • OpManager also allows users to create Custom Reports which enables the Administrator to select & view trends of parameters based on his requirements.
  • Other than reports, OpManager also provides a well constructed fault management where a user can receive alerts over an SMS and Email whenever a fault is detected.
  • Alerts can also be viewed through Android app, iPhone app and iPad app.

Excerpt 3 (Ref. article 26)

"Management of the Change Cycle associated with Configuration Management integrated with the CMDB through automated flows and reports"

Here's how OpManager satisfies the condition given above:

  • OpManager can be integrated with ServiceDesk Plus (SDP) to manage configurations through automated flows and reports.
  • Users can proactively identify which business service or unit gets affected the most for an incident through "Asset Relationship" in Service Desk Plus CMDB.

Thus, OpManager satisfies the guidelines stated under article 26, with its integrated network monitoring solution which offers insights into various problematic areas of the network before the end-users are affected.

Try out OpManager's free version by downloading the 30-day trial or request a personalized demo to get to know the product better!