RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

Size: px
Start display at page:

Download "RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method"

Transcription

1 RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version Apache HTTP Server - versions 2.1, 2.2 Apple Mac OS X Arbor Networks Peakflow X - version 4.1 Aruba Networks Aruba Networks Mobility Controller - version ArubaOS Aventail Aventail SSL VPN - version 8.8 CA Integrated Threat Management - version r8 Check Point Provider-1 - version 4.1 Firewall-1/VPN-1/SmartDefense - versions R54 - R65 CipherTrust Check Point LEA API CipherTrust IronMail - version 5.5 Access Control Server - versions 3.3, 4.0, 4.2 (software only) Access Control Server - versions 4.0, 4.1, 4.2 (appliance) Adaptive Security Appliance Software - versions 7.1(2), 7.2 (to generate syslog events) ASA Security Services Module Software - version 5.1(1p1) (to generate IDS events) Avocent B Avocent IP KVM - version Dell PowerEdge 2161DS-2 - parser trap handler Baracuda Networks Spam Firewall - version 3.4 & 3.5 Blue Coat Systems CacheOS (CacheFlow Appliance) Aironet AP (Wireless Access Point) - version IOS 12.2 Catalyst Switch 6500 CATOS - version 8.3 (alerting only) Works Common Services - versions 2.3, 3.0 Content Engine - versions 5.0, 5.4 Content Services Switch - versions 5.10, 8.10 Generic Filereader, Filereader, Blue Coat Systems C SGOS (Security Gateway Appliance) - versions 4.1, 4.2, 5.1, 5.2 IronPort - version xxx Mobility Services Engine - version PIX Firewall - version 7.0 Router - version IOS, 12.4 Secure IDS - versions 4.x, 5.0, 5.1, 6.0 SDEE, RDEP (prior to envision 4.0) Event Source Update 2009 RSA Security Inc. All rights reserved Page 1 of 5

2 Security - versions 4.0, 5.1 VPN 3000 Concentrator - versions 3.6.7, 4.0, 4.1, 4.7 Fortinet FortiGate Antivirus Firewall, running FortiOS - version 2.8, 3.0 Foundry Networks Switch - version 07 Wireless LAN Controller (WLC) - version Crossbeam Systems C-Series - versions 4.X, 5.X, 6.X CyberGuard Firewall TSP Family Series - version FreeBSD FreeBSD - version 5.4 G CyberGuard Cyberguard Classic - version 5.2 P4 D Debian Debian GNU/Linux 3.1 & 4.0 Dell E PowerConnect 5324 Switch - version EMC Celerra - version 5.5 (branded as: EMC Control Station, Blades, DataMover) EMC Clariion - version Navisphere 6.28 EMC Symmetrix Solutions Enabler - version 6.4 EMC Voyence - version Enterasys Networks Dragon - version 5.x, 6.x, 7.2 Extreme Networks F ExtremeWare Switch - version 6.2, 7.2, 7.7, NIC Windows Service F5 BigIP - version 9.4 F5 F5 Firepass - version Vendor Guardium H Device Collection SQL Guard HP ProCurve Switch series 2600/2800/5300 HP Open VMS - all versions Log file FTP HP UX - version 11.X, C2 v 11.X I AIX 5L (Security and Authentication messages only) iseries (AS400 V5R2 and above) Additional files: ftpscript, auditpgm (Lotus) Lotus Domino, NG Mainframe ACF2 ZOS - version 1.4 Mainframe DB2 UDB - versions 7, 8/ ZOS v1.4 Mainframe IDMS - versions (all) Mainframe IMS - versions (all) Mainframe SMA_RT OS390/ZOS - version Mainframe RACF ZOS - version 1.4 Mainframe Top Secret ZOX - version 1.4 Event Source Update 2009 RSA Security Inc. All rights reserved Page 2 of 5

3 Websphere - version / Windows 2003 Filereader Imperva SecureSphere Web Application Firewall Intel NetStructure VPN - version 6.9 ISS ISS Product suite: Proventia Appliance, SiteProtector, Internet Scanner, RealSecure J Juniper Networks DX Application Accelerator - version Juniper Networks IDP - versions 3.0, 3.1, 3.2, 4.0, 4.1 Juniper Networks JUNOS Router - version 6.1 Juniper Networks NetScreen Firewall Screen OS - versions 5.1, 5.3, 5.4, 6.0 Juniper Networks NetScreen-Security Manager - versions 2004, 2006, 2007 Juniper Networks SSL VPN - versions 5.4, 5.5, 6.0 Juniper Networks Steel-Belted Radius - version 5.4 L Lancope StealthWatch - versions 5.5, 5.6 (StealthWatch Xe for NetFlow, StealthWatch Xe for sflow, SteathWatch NC) McAfee Foundscan Professional/Enterprise - versions 5.0, McAfee Host Intrusion Prevention (also branded as Entercept): version supported on McAfee epolicy Orchestrator version 3.6 version 7.0 supported on McAfee epolicy Orchestrator verison 4.0 McAfee Intrushield - versions 2.1, 3.1, 4.1 McAfee VirusScan Enterprise - version 8.0i Windows DHCP Server, Windows 2000, Windows 2003 Configuration, Windows 2000 Configuration, Windows 2003 Exchange Server - versions 2003 and 2007 Internet Authentication Service version 2003 IIS (Internet Information Services) - versions 5.x and 6.x ISA Server - versions 2000, 2004, 2006 Operations Manager - version SP1 (Windows 2003 R2) less Windows SQL Server - version 2000, 2005 and Windows (agentless) Event Logging API M Mazu Networks Mazu Profiler - versions 5.5.2, 6.0, 7.0 agent) - Adiscon Event Reporter agent) - InterSect-Alliance BackLog agent) - InterSect Alliance SNARE via via via McAfee epolicy Orchestrator - versions 3.5, 3.6 and 4.x Event Source Update 2009 RSA Security Inc. All rights reserved Page 3 of 5

4 N version 7.3 NetContinuum NetContinuum Web Application Firewall - version NC OS 5.x Network Appliance Data ONTAP - version 6.x RSA Security Authentication Manager- versions 5.2, 6.0, 6.1, 7.1 RSA Security Data Loss Prevention - version S Network Appliance NetCache - version 5.5R3, 5.6.2R1, 6.03, 6.1 NFR NIDS - version 3.x, 4.x, 5.x Nokia Nortel IP Series version 3.5 and earlier, 3.6, and 3.8, Alteon Switch Firewall - version 8.x Filereader Nortel Contivity VPN Switch SAP R3 Enterprise - version 4.7 Secure Computing Sidewinder G2 Security Appliance - versions x, x, x File Reader Solsoft NP - version Nortel Passport 8600 Routing Switch - version SonicWALL Firewall (alerting only) (rebranded to Ethernet Routing Switch 8600) Sophos Enterprise Console - version 3.0 Novell edirectory - version 8.8 Novell SuSE Linux - version 9, 10, 10.2 O Open Source NFDump - netflow v5, v7, and v9 Open Source SNORT - version 2.8 (signature level ) See: SNORT Alternative Branding Oracle Oracle - versions 8i, 9i and 10g R Sun Solaris - versions 2.8, 2.9, 2.10 Sun Solaris Basic Security Module (BSM) - versions 8, 9, 10, 11 Sybase Sybase Adaptive Server Enterprise - version 15 Symantec AntiVirus Corporate Edition - versions 9.0, 10.0, 10.1, and 11 Symantec Enterprise Firewall - versions 6.x, 7.x, 8.x Symantec Intruder Alert - version 3.6 Symantec Network Security - version 4.0 T TippingPoint UnityOne - version 2.1 Top Layer Attack Mitigator - version 2.1 Red Hat Red Hat Enterprise Linux 3, 4 & 5 Top Layer Secure Edge Controller - version 2.01 Trend Micro OfficeScan Corporate Edition - version 7.0 Control Manager - version 3.5 RSA Security Access Manager - version 6.0 on Solaris, Windows, and Linux Tripwire Tripwire Enterprise - versions 5.4, 5.5, 7.5 File Reader RSA Security Adaptive Authentication (OnPrem) - Event Source Update 2009 RSA Security Inc. All rights reserved Page 4 of 5

5 W WebSense Web Security Suite - versions 5.5, 6.3, 7.x This is an indicative list created on July 30 th 2009, contact RSA support to find the latest status and details of the integration. Event Source Update 2009 RSA Security Inc. All rights reserved Page 5 of 5

Supported Devices (Event Log Sources)

Supported Devices (Event Log Sources) Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Security Event Viewer and Security Event Manager offer scalable and comprehensive data security assistance monitoring

More information

HawkEye AP Log Adapter List Updated January 2014

HawkEye AP Log Adapter List Updated January 2014 HawkEye AP Log Adapter List Updated January 2014 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

Release Notes ArcSight SmartConnector

Release Notes ArcSight SmartConnector Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Copyright 2009 ArcSight, Inc. All rights reserved. ArcSight,

More information

HawkEye AP Log Adapter List Updated January 2016

HawkEye AP Log Adapter List Updated January 2016 HawkEye AP Log Adapter List Updated January 2016 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee

More information

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...

More information

Supported Data & Log Sources

Supported Data & Log Sources Supported Data & Log Sources IT Compliance & Event Log Management Software for SIEM 14 South Networks IntraLock 30 3Com 4400 Switch 3Com 4500 Switch 3Com 4500G Switch 3Com 4800G Switch 3Com 5500 Switch

More information

JUNIPER NETWORKS STRM TECHNICAL NOTE

JUNIPER NETWORKS STRM TECHNICAL NOTE JUNIPER NETWORKS STRM TECHNICAL NOTE USING EXTENSION DOCUMENTS JUNE 2008 Device extensions allow you to modify how a DSM parses logs, which is useful for resolving parsing issues. However, before you define

More information

Secure Your Operations through NOC/SOC Integration

Secure Your Operations through NOC/SOC Integration IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation IBM Business/Service Assurance Offering Only Tivoli s suite offers

More information

Select the right security information and event management solution to automate security and compliance operations.

Select the right security information and event management solution to automate security and compliance operations. Security information and event management solutions Buyer s guide: purchasing criteria Select the right security information and event management solution to automate security and compliance operations.

More information

Detecting a Hacking Attempt

Detecting a Hacking Attempt Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6

More information

Configuration Audit & Control

Configuration Audit & Control The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration

More information

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

Reference Guide. Skybox View 7.0.600. Revision: 11

Reference Guide. Skybox View 7.0.600. Revision: 11 Reference Guide Skybox View 7.0.600 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided

More information

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE CONFIDENCE: SECURED PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007

More information

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga Vendor/Product Log Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked

More information

Virtualization Journey Stages

Virtualization Journey Stages Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

Pulse Policy Secure. Supported Platforms Guide. Product Release 5.1. Document Revision 1.0 Published: 2014-12-15

Pulse Policy Secure. Supported Platforms Guide. Product Release 5.1. Document Revision 1.0 Published: 2014-12-15 Pulse Policy Secure Supported Platforms Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200

More information

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

Supported Log File Formats

Supported Log File Formats Supported File Formats Vendor/Product Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com 8e6 R2000 8e6 R3000 Aladin Esafe Blocked s Allied Telesyn ATI Level 3 Switch

More information

Joshua Beeman University Information Security Officer October 17, 2011

Joshua Beeman University Information Security Officer October 17, 2011 Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon

More information

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY Connectors Overview Our library of out-of-the-box Connectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source

More information

McAfee SIEM Device Support

McAfee SIEM Device Support McAfee SIEM Device Support By Vendor Vendor Device Name Device Type Supported Logs A10 Networks Load Balancer (AX Series) Load Balancer ASP Syslog Adtran NetVanta Network Switches & Routers ASP Syslog

More information

How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or

How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or Supported Products (Sample List) April, 2013 - Supported Products (Sample List) Supported Products (Sample List) LogRhythm is designed to support the collection, analysis, correlation, management and reporting

More information

og 4 NET A SureL 201

og 4 NET A SureL 201 SureLog ANET 2014 1. SURELOG: ADVANCED SECURITY MANAGEMENT... 3 2. ADVANTAGES... 3 Why Fast EPS Performance Matters... 3 3. LOG MANAGEMENT... 5 Comprehensive Log Data Collection and Log Management... 5

More information

Installation Guide. Sentinel Log Manager 1.2.2. July 2014

Installation Guide. Sentinel Log Manager 1.2.2. July 2014 Installation Guide Sentinel Log Manager 1.2.2 July 2014 Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED

More information

TIBCO LogLogic Unity Quick Reference Guide Concepts

TIBCO LogLogic Unity Quick Reference Guide Concepts TIBCO LogLogic Unity Quick Reference Guide Concepts Overview TIBCO LogLogic Unity is a sleek, modern and scalable platform enabling technical teams to resolve open issues, which require advanced troubleshooting

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper

More information

Restorepoint Plug-in Guide. Version 4.0

Restorepoint Plug-in Guide. Version 4.0 Restorepoint Plug-in Guide Version 40 Contents 1 Overview 2 2 Supported Devices 3 3 Real-time Change Detection 5 4 Device-specific Settings 6 5 Generic push plugin 27 6 Copyright notice 30 1 Overview This

More information

The due date for questions has been extended to 10 AM on Wednesday January 11, 2012.

The due date for questions has been extended to 10 AM on Wednesday January 11, 2012. DATE: January 9, 2012 TO: FROM: RE: All Prospective Proposers Janet Foster AVP Procurement Services 240-684-5141 RFP 90986 Managed Security Services Addendum #3 dated 01/09/2012 The following amends the

More information

Contract Information Sheet. Agency Contract Number 9465337 Contract Name Effective Date Nov 1, 2005 Ending Date Oct 31, 2007 CONTRACT VENDOR

Contract Information Sheet. Agency Contract Number 9465337 Contract Name Effective Date Nov 1, 2005 Ending Date Oct 31, 2007 CONTRACT VENDOR Office of the Senior Vice President for Finance and Administration Procurement Office Contract Information Sheet CONTRACT HAS BEEN RENEWED FOR ADDITIONAL ONE YEAR PERIOD Agency Contract Number 9465337

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached

More information

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement Service Description Remote Consulting Service Introduction to your service agreement Remote ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services ). Each RCS

More information

Novell Sentinel Log Manager

Novell Sentinel Log Manager AUTHORIZED DOCUMENTATION Installation Guide Novell Sentinel Log Manager 1.1 December 2010 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

How To Write An Ets Request For Proposal (Rfp)

How To Write An Ets Request For Proposal (Rfp) Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

SNMP Collector Supported Device Inventory

SNMP Collector Supported Device Inventory Acme Acme Packet SD-3820 Border Controller Alcatel Bluecoat Alcatel 6850 BLUE COAT AV2400 / State of Device Utilization QoS Utilization QoS Subsystem Backplane Module 1.4 BLUE COAT AV510 Lan/Wan BLUE COAT

More information

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2) Log Correlation Engine 4.2 Architecture Guide October 3, 2013 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Architecture... 3 Components of the Log Correlation Engine...

More information

NetBrain Workstation 6.0

NetBrain Workstation 6.0 Live Discovery: NetBrain can discover and map any SNMP reachable device. Device Vendor and Type Support Level Provided Tier 1 Tier 2 Tier 3 Router Alcatel Lucent Service Router Yes Yes Yes Cisco IOS Router

More information

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP. RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,

More information

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006 High Speed Data Transfer from the APS Kenneth Sidorowicz September 27, 2006 Deep Inspection Firewalls Secure Computing G2 Model 4150 firewalls were installed during the September 2004 accelerator shutdown

More information

BYOD: Leveraging Technology Solutions to Alleviate Security and Privacy Concerns

BYOD: Leveraging Technology Solutions to Alleviate Security and Privacy Concerns BYOD: Leveraging Technology Solutions to Alleviate Security and Privacy Concerns An Ingram Micro White Paper August 2013 Table of Contents Introduction... 3 The Benefits of BYOD... 3 Data Points to Widespread

More information

Status of Open Source and commercial IPv6 firewall implementations

Status of Open Source and commercial IPv6 firewall implementations Status of Open Source and commercial IPv6 firewall implementations Dr. Peter Bieringer AERAsec Network Services & Security GmbH info@aerasec.de European Conference on Applied IPv6 (ECAI6) Cologne, Germany

More information

Device Adapter Capabilities Report

Device Adapter Capabilities Report Device Adapter Capabilities Report Page 1 of 19 Span Custom 3Com 4500 3Com 4500 3.02 and 3Com SuperStack 3 3Com SuperStack 3Com 3200, 3800, 3.12 and 4200, 4400, 4900 3Com 1100, 3300 2.7 and 3Com 3Com 50

More information

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No. 210802

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No. 210802 Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No. 210802 Introduction The Pacific Northwest National Laboratory (PNNL) is located in Richland Washington

More information

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement

Service Description. Remote Consulting Service. Introduction to your service agreement. The scope of your service agreement Service Description Remote Consulting Service Introduction to your service agreement Remote Consulting Services ( RCS ) provide for remote assistance with certain IT infrastructure tasks ( Service or Services

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

ManageEngine Password Manager Pro Vs Thycotic Secret Server

ManageEngine Password Manager Pro Vs Thycotic Secret Server ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on August 19, 2015) Feature ManageEngine Password

More information

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER QUICKSTART GUIDE: ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER TABLE OF CONTENTS Introduction...2 Getting Started...4 Configuring Log Sources...4 Common Log Sources...5 INTRODUCTION A FRESH APPROACH TO IDENTIFYING

More information

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager Audit and Control of Enterprise Vulnerability Management Grant Johnson, Technical Account Manager Phoenix May 14, 2014 Key Elements of EVM IT Asset Inventory and Control Risk-based Vulnerability Management

More information

Cisco Security Agent (CSA) Network Admission Control (NAC)

Cisco Security Agent (CSA) Network Admission Control (NAC) Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1 Agenda CSA

More information

Setting up an icap Server for ISG- 1000/2000 AV Support

Setting up an icap Server for ISG- 1000/2000 AV Support Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA

More information

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS STEALTHWATCH BY LANCOPE Lancope expertly provides flow-based visibility

More information

Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY

Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009 Firewall Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc. Lexington, Massachusetts www.wintergreenresearch.com

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member

More information

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Eoin Thornton Senior Security Architect Zinopy Security Ltd. RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming

More information

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices Last Updated 7/30/15 Vendor Name Device Type A10 Networks Load Balancer Load Balancer All Syslog AX Series Accellion Secure File Transfer Application All Syslog Access Layers Portnox NAC 2.x Syslog Adtran

More information

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices Last Updated 11/10/15 A10 Networks Load Balancer Load Balancer All ASP Syslog AX Series Accellion Secure File Transfer Application All ASP Syslog Access Layers Portnox NAC 2.x ASP Syslog Adtran Bluesocket

More information

SENTINEL MANAGEMENT & MONITORING

SENTINEL MANAGEMENT & MONITORING MANAGEMENT & MONITORING Network Monitoring Server Monitoring Database Monitoring Application Monitoring End User Response Time Monitoring Virtualisation Monitoring VOIP Monitoring SLA Monitoring Knowing

More information

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM

More information

How To Make A Network Safer With Stealthwatch

How To Make A Network Safer With Stealthwatch Netzwerkkonzept Informationsveranstaltung am 03.07.2007 Im Bristol Hotel Mainz Thema: Ideen zum Netzwerkdesign - Switching -WLAN - Security - VoIP Datum: 03.07.2007, Seite: 1 Network Behaviour Analysis

More information

Symantec AntiVirus for Network Attached Storage 5.1

Symantec AntiVirus for Network Attached Storage 5.1 Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1 DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed

More information

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

Deployment Guide. Websense Web Security Websense Web Filter. v7.1 Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States

More information

DEREK A. CHAMORRO CISSP, CCNP Austin, TX Website: therandomsecurityguy.com Twitter: @theredinthesky

DEREK A. CHAMORRO CISSP, CCNP Austin, TX Website: therandomsecurityguy.com Twitter: @theredinthesky DEREK A. CHAMORRO CISSP, CCNP Website: therandomsecurityguy.com Twitter: @theredinthesky SUMMARY OF QUALIFICATIONS Expertise in performing vulnerability assessments and penetration testing (white, black,

More information

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on

More information

Competitive Replacement Program: Product Matrix

Competitive Replacement Program: Product Matrix Competitive Replacement Program: Product Matrix Helping you get the right Application Delivery Networking solution for your organization s needs. Category Eligible Trade-in Products F5 Purchased Products

More information

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM 2 REDUCE COSTS. IMPROVE EFFICIENCY. MANAGE RISK. MaxPatrol from Positive Technologies provides visibility and control of security compliance across your entire

More information

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods ForeScout CounterACT Endpoint Contents Introduction.... 3 Overview of ForeScout CounterACT... 3 Overview of Discovery and Inspection... 4 Host & Network Device Discovery... 4 Endpoint Detection & Inspection

More information

Net LineDancer Update Notice

Net LineDancer Update Notice Net LineDancer Update Notice Update 14.06 Rev.20151007.1420 Added support for sending SNMP traps when a job fails. Added support to deep link directly to each page of the devices detail view. Added support

More information

HP Converged Infrastructure

HP Converged Infrastructure HP Converged Infrastructure HP is uniquely positioned to deliver the data center of the future 1 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Enforcive /Cross-Platform Audit

Enforcive /Cross-Platform Audit Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

ACL Compliance Director FAQ

ACL Compliance Director FAQ Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...

More information

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network

More information

Evolution in IT Support

Evolution in IT Support My Metrics Evolution in IT Support Like all businesses, you depend on your network. Have you ever needed to send an important email or access vital information, but the system or data was inaccessible?

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

IBM RealSecure Server Sensor System Requirements

IBM RealSecure Server Sensor System Requirements IBM RealSecure Server Sensor System Requirements Contents of This Document This document describes the system requirements for the current versions of IBM RealSecure Server Sensor components. Overview

More information

Global IT Networks Skills Matrix

Global IT Networks Skills Matrix Global IT Networks Skills Matrix Server Core Infrastructure and Management Windows Server (all versions) SQL (Infrastructure) SQL (DBA) Active Directory Active Directory Certificate s Active Directory

More information

English Requirement: You must be able to understand and be understood in English.

English Requirement: You must be able to understand and be understood in English. MICHAEL R. BLOOMBERG Mayor MARTHA K. HIRST Commissioner THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E

More information

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

CIO Update: The Gartner Firewall Magic Quadrant for 2H02 IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market

More information