McAfee SIEM Device Support

Size: px
Start display at page:

Download "McAfee SIEM Device Support"

Transcription

1 McAfee SIEM Device Support By Vendor Vendor Device Name Device Type Supported Logs A10 Networks Load Balancer (AX Series) Load Balancer ASP Syslog Adtran NetVanta Network Switches & Routers ASP Syslog Airdefense Airdefense Network Switches & Routers WIPS Alerts Java - Syslog Airtight Interactive Airtight Interactive Applications ASP Syslog Alcatel-Lucent InfoExpress ALLOW, DENY, EXIT, Authentication / Network Switches & Routers CyberGatekeeper LAN CGATE type only Java - Syslog UDP VitalQIP Applications / Host / Server / Operating Systems / Web Content / Filtering / Proxies ASP Apache Software Applications / Host / Server / Operating Java - Local files; Apache Access Logs only Foundation Systems / Web Content / Filtering / Proxies syslog UDP Apache Applications / Host / Server / Operating Access, Error and Systems / Web Content / Filtering / Proxies ModSecurity Logs ASP - Syslog Arbor Arbor Peakflow DoS/SP Network Switches & Routers Access, Error and ModSecurity Logs Java - Syslog UDP Arbor Peakflow X Network Switches & Routers Network Behavior Alerts Java - Syslog UDP Arbor Peakflow X Network Switches & Routers Network Behavior Alerts Aruba Aruba Wireless Access Points Custom Aruba Barracuda Barracuda SPAM Filter Security Appliances / UTMs Barracuda SPAM Filter Messages Barracuda Web Barracuda Web Filter Security Appliances / UTMs Security Gateways Messages Bit9 Bit9 Parity Suite Applications CEF Blue Coat Blue Coat SG Series Web Content / Filtering / Proxies Proxy and System Log Java - Syslog TCP Blue Coat SG Series Web Content / Filtering / Proxies Access Log ASP Syslog UDP Blue Lance BlueLance LT Auditor + Java - SQL Server Applications Netware Auditing for Novell Netware database

2 Vendor Device Name Device Type Supported Logs Blue Martini Blue Martini Application Code Based Blue Ridge BoarderGuard 5000 & 6000 Series Bradford Bradford Campus Manager NAC / Network Switches & Routers ASP Syslog Brocade Foundry BigIron, FastIron Foundary Syslog Network Switches & Routers and NetIron Messages IronView Network Manager NAC / Network Switches & Routers ASP Syslog CA CA Datacom Mainframe Nitro Plugin Protocol Identity & Access Management IAM / IDM Nitro Plugin Protocol Check Point Check Point Edge W32 & Firewall WU OPSEC Check Point Enterprise & Firewall Enterprise Pro OPSEC Check Point Express Firewall OPSEC Check Point FW-1 Limited Firewall OPSEC Check Point FW1, NG, NGX Standard Firewall OPSEC Check Point Smart Center Enterprise Pro Firewall OPSEC Check Point IPS-1 Sensory (formerly NFR Alerts Nitro Plugin Protocol Network Flight Recorder) Check Point HA VPN-1 Virtual Private Networks OPSEC Check Point VPN Pro Virtual Private Networks OPSEC Check Point VPN-1 Edge Virtual Private Networks OPSEC Check Point VPN-1 Express Virtual Private Networks OPSEC SmartEvent Firewall OPSEC

3 Cisco Cisco CSS (Content Services Switches) Other Cisco SDEE Application Protocol ASP - SDEE TACACS+ Authentication ASP Syslog TACPlus Authentication Tacplus messages Java Syslog UDP Cisco ASA Firewall %ASA messages Java - Syslog UDP Cisco ASA Firewall ASA messages ASP Syslog UDP Cisco EAP Java - Syslog UDP Cisco Firewall & Service Module Firewall FWSM messages Java - Syslog UDP Cisco PIX Firewall PIX messages Java - Syslog UDP Cisco PIX IDS Firewall / IDS messages only Java - Syslog UDP Cisco PIX and PIX IDS Firewall / PIX and IDS messages ASP Syslog UDP Cisco IOS ACL, IOS FW, Firewall / / Network %SEC, %FW only, %IDS IOS IDS Switches & Routers only Cisco IOS Firewall Firewall / Network Switches & Routers %FW only Java - Syslog UDP Cisco CSA Host / Server / Operating System / CSA Events SQL/Text %(CONTROLLER LINK OSPF LINEP CATOS Host / Server / Operating Systems / ROTO DVLAN FILESYS IP MGMT SEC Java - Syslog UDP Network Switches & Routers URITY SYS SEC NTT Login FW ) Messages %(CONTROLLER LINK OSPF LINEP CATOS Host / Server / Operating Systems / ROTO DVLAN FILESYS IP MGMT SEC Network Switches & Routers URITY SYS SEC NTT Login FW ) Messages Failed/Passed/Radius Cisco ACS Accounting/TACACS ASP Syslog UDP Accounting & Administration Cisco Guard ASP Syslog UDP Cisco IDS IDS messages only SDEE Cisco IDSM SDEE Cisco IPS SDEE Cisco IOS IDS / Network Switches & Routers %IDS only Cisco IOS IPS / Network Switches & Routers IPS Alerts, DUAL, PFINIT- SP, HSRP

4 Cisco Cisco NAC Appliance (Clean Access) NAC / Network Switches & Routers ASP Syslog Cisco NAC Appliance (Clean Access) NAC / Network Switches & Routers NAC Only Java - HTTP based requests NetFlow (Generic) Network Flow Collection ASP - Nitro Netflow Collector Aaa, Arp, Auth, Authpriv, cert-enroll, dhcp_snoop, fs-daemon, Fspf, ftp, Fwm, Im, interface-vlan, Ip, Ipconf, NX-OS (Nexus) / Network Switches & Routers Ipqos, Kernel, m2rib, Mail, Mfdm, Mfwd, Ntp, Port, port-channel, port-resources, Provision, Radius, Security, Snmpd, Sifmgr, spanning-tree, Syslog, Sysmgr, TACACS, TACACS+, Track, User, Uucp, vlan_mgr and zone ASP Syslog Cisco IOS ACL Network Switches & Routers %SEC only Java - Syslog UDP Cisco Wireless LAN Controllers Network Switches & Routers ASP Syslog Cisco MARS Security Management Incident Notification XMLs Java - (SMTP) Cisco VPN Concentrator Virtual Private Networks VPN messages Java - Syslog UDP Cisco VSM (VPN Switch Virtual Private Networks Blade) VPN messages Java - Syslog UDP Cisco Content Engine Web Content / Filtering / Proxies Proxy Logs Java - FTP Server on Receiver Cisco IronPort Web Content / Filtering / Proxies IronPort Syslog and Access Messages ASP - Syslog Citrix Citrix Secure Access Gateway Applications ASP Syslog Citrix NetScaler Web Content / Filtering / Proxies ASP Syslog Citrix NetScaler Web Web Content / Filtering / Proxies ASP Syslog Cluster Labs Pacemaker CRMD Applications ASP-Syslog Cooper Power Systems Cybectec Network Switches & Routers ASP Syslog Yukon IMS Applications ASP-Syslog CoreTrace CoreTrace Applications Bouncer Messages ASP Syslog CyberGuard CyberGuard (includes FS, SG, SL) Firewall FW messages Java - Syslog UDP Cyber-Ark Enterprise Password Vault Applications ASP Syslog

5 Dell PowerConnect Network Switches & Routers ASP Syslog EdgeWave iprism Web Security Web Content / Filtering / Proxies ASP Syslog eeye eeye Retina Vulnerability Systems data support eeye Retina Enterprise Vulnerability Systems Manager data support Enterasys Enterasys Dragon Java - MySQL database (TCP NIDS and HIDS Messages Sensor/Squire connection) N Series Switches Network Switches & Routers ASP Syslog NAC NAC/Network Switches & Routers ASP Syslog S Series Switches Network Switches & Routers ASP Syslog Extreme Networks ExtremeWare XOS NAC/Network Switches & Routers ASP Syslog F5 Access Policy Manager (APM) NAC/Network Switches & Routers ASP Syslog Application Security Manager (ASM) Web Content / Filtering / Proxies Nitro Plugin Protocol FirePass SSL VPN Virtual Private Network ASP Syslog Local Traffic Manager Web Content / Filtering / Proxies Fairwarning Fairwarning Privacy Monitoring Application Security Nitro Plugin Protocol FireEye FireEye Malware Protection Antivirus/Malware CEF Fluke Networks AirMagnet Enterprise Network Switches & Routers ASP Syslog Force10 Networks FTOS Network Routers & Switches ASP Syslog ForeScout CounterACT NAC/Network & Switches ASP Syslog Fortinet Fortinet Fortigate Firewall IPS, webfilter, spamfilter, event, traffic type messages Java - Syslog Fortinet Fortigate Firewall IPS, webfilter, spamfilter, event, traffic type messages ASP - Syslog Fortinet WAF Firewall ASP Syslog FreeRadius FreeRadius Authentication AUTH ASP Syslog Funkwerk PacketAlarm IPS IPS Alerts Java - Syslog UDP GTA GNAT Firewall ASP Syslog

6 HP HP-UX (Hewlett-Packard) Host / Server / Operating Systems ssh/telnet/ftp/rsh/inetd/sendm Java - Syslog UDP ail/syslogd/su LaserJet Printers ASP Syslog OpenVMS Operating Systems ASP - Syslog HP ProCurve Network Switches & Routers Procurve Syslog Messages Infoblox NIOS Applications ASP Syslog IBM Guardium Database Activity Monitoring ASP Syslog UDP I System Z DB2 Database DBM Agent x, 8.x, 9.x System Z DB2 Database Versions BSafe Agent RealSecure Network /Server ISS Real Secure Server Java - SQL Server database Host / Server / Operating Systems Sensor, Proventia A/G/M Sensor Series Applicances IBM AIX OS Host / Server / Operating Systems ssh/telnet/ftp/rsh/inetd/sendm Java - Syslog UDP ISS Desktop Protector ISS Real Secure Network Sensor Host / Server / Operating Systems / Other Other ail/syslogd/su BlackICE and Desktop Protection System RealSecure Network /Server Sensor, Proventia A/G/M Series Applicances Java - SQL Server database Java - SQL Server database ISS Site Protector Security Management RealSecure Network /Server Sensor, Proventia A/G/M Custom Text Series Applicances z/os, z/vm Mainframe SMF (System Management Facilities) Types 30, 14, 15, Nitro Plugin Protocol 17, 18, 56, 62, 64, 80 Tivoli Access Manager for Operating Systems Authentication Nitro Plugin Protocol Tivoli Identity & Access Manager IAM / IDM Nitro Plugin Protocol z/os, z/vm Mainframe RACF (Resource Access Control Facility Nitro Plugin Protocol Informix Database Imperva Database Activity Monitor Database Code Based Web Application Firewall Firewall Code Based Intersect Snare for Windows, Snare for SNARE Other iance AIX

7 IP Fix IP Fix Network Flow Collection Custom itron itron Enter Smart Grid Application ASP Syslog Juniper Juniper Netscreen System and Traffic Java - Syslog UDP OR ASP - Firewall Firewall notification messages Syslog Juniper Netscreen IDP 4.x via NSM Java - Syslog UDP OR ASP - Syslog Juniper Netscreen Security Manager Network Switches & Routers IDP, FW Java - Syslog UDP NSM Applications / Host / Server / Operating Systems ASP Juniper Routers (JunOS) Network Switches & Routers JunOS Messages Juniper Secure Access SSL VPN Virtual Private Networks Log/Monitoring Events ASP- Syslog UDP SRX Firewall/VPN JunOs Messages ASP Syslog UDP Kaspersky Admin Console Antivirus anti-virus events through the console Windows Agent KEMP Technologies LoadMaster Network Switches & Routers ASP Syslog Lancope Lancope Stealth Watch / Network Switches & Routers Stealth Watch messages only Java - Syslog UDP Lancope Stealth Watch / Network Switches & Routers ASP - Syslog LINUX LINUX Host / Server / Operating Systems AuditD, BIND, Netfilter, ProFTPD, Samba, Open ASP Syslog SSH, Pure FTPD, cron, exinit Lumension PatchLink Scan Vulnerability Systems data support Macintosh OS-X Server & Applications / Security Management / Server and Workstation Workstation Host / Server / Operating Systems ASP - Syslog MailGate, Ltd. MailGate Server Applications / Security Management / Host / Server / Operating Systems ASP Syslog Mainframe DB2 Host / Server / Operating Systems Bsafe Agent Mainframe IMS Host / Server / Operating Systems Bsafe Agent Mainframe SMF DB2 Host / Server / Operating Systems Bsafe Agent Mainframe SMF RACF Host / Server / Operating Systems Bsafe Agent Mainframe SMF FTP & Telnet Host / Server / Operating Systems Bsafe Agent Mainframe SMF VSAM Host / Server / Operating Systems Bsafe Agent

8 Mainframe Top Secret, Type 80 SMA_RT Host / Server / Operating Systems ICH/IEF/SMF/TSS messages Java Syslog UDP McAfee McAfee Antivirus AntiVirus WMI WMI McAfee epolicy Applications / Security Management / Host / Java - SQL Server database AV/HIPS/Host FW messages Orchestrator (EPO) Server / Operating Systems McAfee AntiSpyware (ASE), Data Loss Prevention (DLP), epolicy Orchestrator Agent [Common McAfee Framework Agent] (CMA), GroupShield for Domino (GSD), GroupShield for Exchange (GSE), McAfee Host Intrusion Prevention (HIPS), McAfee Network Access Control (MNAC), McAfee Policy Auditor (PAE), McAfee SiteAdvisor (SAE), McAfee VirusScan (VSE), SolidCore (SCOR) Firewall Enterprise Firewall / ASP Syslog Firewall Enterprise Firewall / FW Logs Only Java - Syslog UDP and Web Security Web Content / Filtering / Proxies CEF and Web Security Web Content / Filtering / Proxies ASP - Syslog McAfee HIPS HIPS data through epo for Java - Entercept API till 5.x HIPS 6.0 and above epo SQL Server database for 6.0 Network Security (formerly IntruShield) IPS Alerts Java - Syslog UDP Network Security (formerly IntruShield) IPS Alerts ASP - Syslog Vulnerability Manager Vulnerability Systems data support Web Gateway Web Content / Filtering / Proxies ASP Syslog McAfee WebShield SMTP Web Content / Filtering / Proxies Webshield Syslog Messages Microsoft Exchange Applications / Host / Server / Operating Systems Message Tracking Logs ASP - Windows Agent Forefront Threat Management Gateway IDS/IPS Code Based Microsoft Windows Applications / Host / Server / System, Security, Application, DNS, WMI WMI Operating Systems DHCP and File Replication. Microsoft Windows Server Debug DNS Logs (file) ASP Windows Agent Microsoft Windows Server Debug DHCP Logs (file) ASP Windows Agent Microsoft SQL Server Database WMI WMI Microsoft SQL Server Database DBM Agent - MSSQL 2000 (SP4), 2005, 2008 Microsoft ISA Server Firewall / Host / Server / Operating Systems / Web Content / Filtering / Proxies / Virtual Private Networks WMI WMI Microsoft Operations Manager Host / Server / Operating Systems MOM Messages Java - SQL Server database

9 Microsoft Microsoft IIS Host / Server / Operating Systems / IIS web traffic logs in W3C Java Parsing Agent - Local Files; Web Content / Filtering / Proxies format syslog using Snare Microsoft IIS Host / Server / Operating Systems / IIS web traffic logs in W3C Web Content / Filtering / Proxies format Windows Agent Microsoft Exchange Server Other WMI WMI Microsoft Active Directory Other WMI WMI Microsoft SCOM Security Management 2007 Nitro Plugin Mirage Threat and Response Mirage Counterpoint NAC / Network Switches & Routers Networks Messages Java - Syslog UDP ncircle IP360 Scanner Vulnerability Systems data support Nessus Nessus Vulnerability Systems Data Support NetApp DataFort Storage Switch ASP Syslog OnTap Logs audit, Data OnTap Storage message, sis and snapmirror ASP Windows Agent logs FAS Storage.evt files Windows Agent Netfort Applications / Security Management / Netfort LANGuardian Technologies Host / Server / Operating Systems ASP Syslog netiq netiq Security Manager Network Switches & Routers / Java - SQL Server database netiq Alerts Security Management NetWitness NextGen Application Protocol CEF Spectrum Malware URL Integration NitroSecurity NitroView DBM Database ASP - Syslog NitroSecurity IPS Firewall / / Network Switches & Routers ASP - Syslog Nitro Plug-in Protocol Other Nitro Plugin Protocol NitroSecurity SNMP Other SNMP Nokia Nokia IPSO Firewall IPSO OS logs Java - Syslog UDP Nortel Passport 8000 Network Switches & Routers ASP Syslog VPN Gateway 3050 Virtual Private Networks ASP Oracle MySQL Database Yes, x, 5.0.3x Oracle Common Audit Database System Java Agent - Local Files Oracle Fine-Grained Java - DB Audit Tables Database Fine Grained Audits Audit through JDBC

10 Oracle Oracle Database Identity & Access Manager DBM Agent - Oracle , 9.x, 10.x, 11.x IAM / IDM Nitro Plugin Protocol Osiris ISAKMP, RADIUS, Host / Server / Operating System / Host Integrity Monitoring SECURITY, Accounting, RIP, ASP Syslog VR messages only Palo Alto PA-2000, 4000, 500 Firewall ALL ASP - Syslog Patrick Townsend AS-400 Host CEF Peoplesoft Peoplesoft Applications Nitro Plugin Protocol PostFix PostFix Applications ASP-Syslog PostgreSQL PostgreSQL Database ASP Powertech AS-400 Host CEF ProofPoint Messaging Security Gateway Applications ASP Qualys QualysGuard Vulnerability Systems Data Support Quest ChangeAuditor for Active Applications Directory ASP WMI Radware DefensePro DefensePro Alerts Java - Syslog UDP FireProof and LinkProof Network Switches & Routers ASP Syslog Rapid 7 MetaSploit Pro Penetration Testing Custom Nexpose VA Scanner Vulnerability Systems Data Support ssh/telnet/ftp/rsh/inetd/sendm Red Hat Red Hat Linux OS Events Host / Server / Operating Systems ail/syslogd/su/pam Java - Syslog UDP unix/rhosts/xinetd Riverbed Steelhead Security Appliances / UTMs ASP Syslog RSA RSA Authentication Manager (windows) Authentication WMI WMI RSA Authentication Manager (UNIX) Authentication ACE Server Logs Only Java - Unix Syslog RSA Authenticaiton Manager (Windows & UNIX) Authentication ASP Syslog

11 SafeNet Safenet HSM Application Security ASP Syslog Saint Saint Vulnerability Vulnerability Systems Scanner data support Savant Savant Protection Anti-Malware CEF SecureAuth SecureAuth IEP Authentication ASP Syslog Applications / Security Management / Secure Crossing Secure Crossing ZenWall Host / Server / Operating Systems ASP Syslog sflow sflow (Generic) Network Flow Collection Nitro sflow Collector Silver Spring Networks Access and Endponts Smart Grid ASP Syslog SonicWALL Aventail Virtual Private Networks VPN messages ASP SonicWALL FW Firewall FW/IPS/VPN ASP - Syslog Sophos Sophos Security & Web Content / Filtering / Proxies Data Protection ASP Sophos Enterprise AV and endpoint events Antivirus/HIDS Console from the console Nitro Plugin Protocol Web Security & Control Web Content / Filtering / Proxies ASP - Syslog Sourcefire Snort NIDS IDS messages only Java - Syslog UDP Sourcefire Intrusion IDS messages Java - Estreamer API using Sensor only(estreamer) TCP port 8302 Sourcefire NS/RNA IDS/IPS IDS messages only(estreamer) Squid Squid Web Proxy Web Content / Filtering / Proxies Web Proxy Logs Java Squid Web Proxy Web Content / Filtering / Proxies Web Proxy Logs ASP Syslog StillSecure Strata Guard Firewall / Security Management / IDS Firewall Events / IPS / Virtual Private Networks ASP Sylosg Stonesoft Stonesoft Stonegate Firewall / Security Management / IDS IPS/FW/VPN Management Center / IPS / Virtual Private Networks Java Syslog UDP Stonesoft Stonegate Firewall /VPN Firewall / Virtual Private Networks FW/VPN activities Java Syslog UDP Stonesoft Stonegate IPS IPS Alerts Java Syslog UDP Sun Solaris BSM Host / Server / Operating Systems BSM Audit Logs Java - Syslog UDP Solaris OS Events Host / Server / Operating Systems ssh/telnet/ftp/rsh/inetd/sendm Java - Syslog UDP ail/syslogd/su/xinetd iplanet Web Content / Filtering / Proxies Java - Syslog UDP Sybase Sybase Database DBM Agent - 11.x, 12.x, 15.x

12 Symantec Symantec Anti Virus AntiVirus WMI WMI Symantec AV CE Server Antivirus NPP Symantec Endpoint Host FW/IPS/AV/Control/NAC AntiVirus Protection messages Java Syslog UDP Symantec Endpoint Host FW/IPS/AV/Control/NAC AntiVirus Protection messages ASP Syslog Symantec Intruder Alert Host / Server / Operating Systems ITA Alerts Java Syslog UDP Symantec Critical System Java SQL Server database (TCP Events and Audit messages Protection port 1433) Symantec ManHunt IDS messages only Java Syslog UDP Symantec HIDS / Other HIDS messages Java DB2 database PGP Universal Server Host / Server / Operating Systems Symantec Web Gateway Web Content / Filtering / Proxies messages ASP Syslog System i System i Host / Server / Operating Systems BSafe Agent TippingPoint Tippingpoint Unitity One ASP Syslog Tippingpoint SMS Format Security Management IDS messages Java Syslog UDP Tippingpoint SMS Format Security Management IDS messages ASP - Syslog Tofino Firewall LSM Firewall / Virtual Private Networks ASP Syslog Top Layer TopLayer Attack Mitigator ASP Syslog Trend Micro Control Manager (IMSS & IWSS) AntiVirus / Vulnerability Systems IMSS and IWSS Java SQL Server database Deep Security IDS HIDS HIDS and Windows messages ASP - Syslog OSSEC FIM/HIDS ASP Syslog Tripwire Enterprise Database / Security Management Tripwire Integrity Check messages Java Syslog UDP Tripwire NIDS / Other SNMP Trustvave NAC NAC NAC events ASP Syslog Vericept DLP CEF Webdefend Web Content / Filtering / Proxies ASP Syslog Type 80 Type 80 SMA_RT Host / Server / Operating Systems ICH/IEF/SMF/TSS messages Java Syslog UDP VMWare/EMC VMWare ESX/ESX i Applications Virtual System logs ASP - Syslog Vormetric Data Security Applications ASP Syslog WatchGuard WatchGuard Firebox Firewall ASP Syslog Websense Websense Enterprise Web Content / Filtering / Proxies Web Security and Filtering Java SQL Server database Messages Xirrus abgn WiFi Arrays Switches & Routers ASP Syslog Zonelabs Zonelabs Integrity Firewall Java SQL Data Source

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

Supported Devices (Event Log Sources)

Supported Devices (Event Log Sources) Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110

More information

HawkEye AP Log Adapter List Updated January 2014

HawkEye AP Log Adapter List Updated January 2014 HawkEye AP Log Adapter List Updated January 2014 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee

More information

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Security Event Viewer and Security Event Manager offer scalable and comprehensive data security assistance monitoring

More information

Reference Guide. Skybox View 7.0.600. Revision: 11

Reference Guide. Skybox View 7.0.600. Revision: 11 Reference Guide Skybox View 7.0.600 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided

More information

HawkEye AP Log Adapter List Updated January 2016

HawkEye AP Log Adapter List Updated January 2016 HawkEye AP Log Adapter List Updated January 2016 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices Last Updated 11/10/15 A10 Networks Load Balancer Load Balancer All ASP Syslog AX Series Accellion Secure File Transfer Application All ASP Syslog Access Layers Portnox NAC 2.x ASP Syslog Adtran Bluesocket

More information

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices Last Updated 7/30/15 Vendor Name Device Type A10 Networks Load Balancer Load Balancer All Syslog AX Series Accellion Secure File Transfer Application All Syslog Access Layers Portnox NAC 2.x Syslog Adtran

More information

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...

More information

How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or

How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or Supported Products (Sample List) April, 2013 - Supported Products (Sample List) Supported Products (Sample List) LogRhythm is designed to support the collection, analysis, correlation, management and reporting

More information

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

Release Notes ArcSight SmartConnector

Release Notes ArcSight SmartConnector Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Copyright 2009 ArcSight, Inc. All rights reserved. ArcSight,

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and

More information

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE CONFIDENCE: SECURED PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence

More information

Secure Your Operations through NOC/SOC Integration

Secure Your Operations through NOC/SOC Integration IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation IBM Business/Service Assurance Offering Only Tivoli s suite offers

More information

Supported Data & Log Sources

Supported Data & Log Sources Supported Data & Log Sources IT Compliance & Event Log Management Software for SIEM 14 South Networks IntraLock 30 3Com 4400 Switch 3Com 4500 Switch 3Com 4500G Switch 3Com 4800G Switch 3Com 5500 Switch

More information

Detecting a Hacking Attempt

Detecting a Hacking Attempt Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6

More information

Select the right security information and event management solution to automate security and compliance operations.

Select the right security information and event management solution to automate security and compliance operations. Security information and event management solutions Buyer s guide: purchasing criteria Select the right security information and event management solution to automate security and compliance operations.

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

JUNIPER NETWORKS STRM TECHNICAL NOTE

JUNIPER NETWORKS STRM TECHNICAL NOTE JUNIPER NETWORKS STRM TECHNICAL NOTE USING EXTENSION DOCUMENTS JUNE 2008 Device extensions allow you to modify how a DSM parses logs, which is useful for resolving parsing issues. However, before you define

More information

Joshua Beeman University Information Security Officer October 17, 2011

Joshua Beeman University Information Security Officer October 17, 2011 Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon

More information

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards

More information

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY Connectors Overview Our library of out-of-the-box Connectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga Vendor/Product Log Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked

More information

Supported Log File Formats

Supported Log File Formats Supported File Formats Vendor/Product Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com 8e6 R2000 8e6 R3000 Aladin Esafe Blocked s Allied Telesyn ATI Level 3 Switch

More information

og 4 NET A SureL 201

og 4 NET A SureL 201 SureLog ANET 2014 1. SURELOG: ADVANCED SECURITY MANAGEMENT... 3 2. ADVANTAGES... 3 Why Fast EPS Performance Matters... 3 3. LOG MANAGEMENT... 5 Comprehensive Log Data Collection and Log Management... 5

More information

Restorepoint Plug-in Guide. Version 4.0

Restorepoint Plug-in Guide. Version 4.0 Restorepoint Plug-in Guide Version 40 Contents 1 Overview 2 2 Supported Devices 3 3 Real-time Change Detection 5 4 Device-specific Settings 6 5 Generic push plugin 27 6 Copyright notice 30 1 Overview This

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security

More information

TABLE OF CONTENTS NETWORK SECURITY 1...1

TABLE OF CONTENTS NETWORK SECURITY 1...1 Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Contract Information Sheet. Agency Contract Number 9465337 Contract Name Effective Date Nov 1, 2005 Ending Date Oct 31, 2007 CONTRACT VENDOR

Contract Information Sheet. Agency Contract Number 9465337 Contract Name Effective Date Nov 1, 2005 Ending Date Oct 31, 2007 CONTRACT VENDOR Office of the Senior Vice President for Finance and Administration Procurement Office Contract Information Sheet CONTRACT HAS BEEN RENEWED FOR ADDITIONAL ONE YEAR PERIOD Agency Contract Number 9465337

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Enterprise Host Security Software Suite Standards and Policy ITP Number ITP-SEC001 Category Recommended Policy Contact RA-ITCental@pa.gov Effective Date August 28, 2008 Supersedes

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

SNMP Collector Supported Device Inventory

SNMP Collector Supported Device Inventory Acme Acme Packet SD-3820 Border Controller Alcatel Bluecoat Alcatel 6850 BLUE COAT AV2400 / State of Device Utilization QoS Utilization QoS Subsystem Backplane Module 1.4 BLUE COAT AV510 Lan/Wan BLUE COAT

More information

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2) Log Correlation Engine 4.2 Architecture Guide October 3, 2013 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Architecture... 3 Components of the Log Correlation Engine...

More information

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity World-class security solutions for your business Kaspersky Open Open Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile devices

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright

More information

Configuration Audit & Control

Configuration Audit & Control The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

TIBCO LogLogic Unity Quick Reference Guide Concepts

TIBCO LogLogic Unity Quick Reference Guide Concepts TIBCO LogLogic Unity Quick Reference Guide Concepts Overview TIBCO LogLogic Unity is a sleek, modern and scalable platform enabling technical teams to resolve open issues, which require advanced troubleshooting

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems Course Overview Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router s IPSec 3002 IKE 515 CA s Intrusion Detection Systems 4210 VPNs Routers 2 The security threats section will cover

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached

More information

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1) Continuous Monitoring for the New IT Landscape July 14, 2014 (Revision 1) Table of Contents Introduction... 3 The New IT Landscape... 3 Gaps in the New IT Landscape... 5 Tenable s Continuous Monitoring

More information

World-class security solutions for your business. Business Products. C a t a l o g u e

World-class security solutions for your business. Business Products. C a t a l o g u e World-class security solutions for your business Business Products C a t a l o g u e About Kaspersky Lab Kaspersky Lab is the largest developer of secure content management systems in Europe and is among

More information

NetBrain Workstation 6.0

NetBrain Workstation 6.0 Live Discovery: NetBrain can discover and map any SNMP reachable device. Device Vendor and Type Support Level Provided Tier 1 Tier 2 Tier 3 Router Alcatel Lucent Service Router Yes Yes Yes Cisco IOS Router

More information

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes

More information

Effective Use of Security Event Correlation

Effective Use of Security Event Correlation Effective Use of Security Event Correlation Mark G. Clancy Chief Information Security Officer The Depository Trust & Clearing Corporation DTCC Non-Confidential (White) About DTCC DTCC provides custody

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

PCI DSS. Get Compliant, Stay Compliant Seminar

PCI DSS. Get Compliant, Stay Compliant Seminar PCI DSS Get Compliant, Stay Compliant Seminar ValueSYS Solutions & Services Wael Hosny CEO ValueSYS Wael.hosny@valuesys.net Solutions you Need, with Quality you Deserve Seminar Agenda Time 09:00 10:00

More information

The due date for questions has been extended to 10 AM on Wednesday January 11, 2012.

The due date for questions has been extended to 10 AM on Wednesday January 11, 2012. DATE: January 9, 2012 TO: FROM: RE: All Prospective Proposers Janet Foster AVP Procurement Services 240-684-5141 RFP 90986 Managed Security Services Addendum #3 dated 01/09/2012 The following amends the

More information

Device Adapter Capabilities Report

Device Adapter Capabilities Report Device Adapter Capabilities Report Page 1 of 19 Span Custom 3Com 4500 3Com 4500 3.02 and 3Com SuperStack 3 3Com SuperStack 3Com 3200, 3800, 3.12 and 4200, 4400, 4900 3Com 1100, 3300 2.7 and 3Com 3Com 50

More information

Novell Sentinel Log Manager

Novell Sentinel Log Manager AUTHORIZED DOCUMENTATION Installation Guide Novell Sentinel Log Manager 1.1 December 2010 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006 High Speed Data Transfer from the APS Kenneth Sidorowicz September 27, 2006 Deep Inspection Firewalls Secure Computing G2 Model 4150 firewalls were installed during the September 2004 accelerator shutdown

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2) Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network

More information

Utility Modernization Cyber Security City of Glendale, California

Utility Modernization Cyber Security City of Glendale, California Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

DEREK A. CHAMORRO CISSP, CCNP Austin, TX Website: therandomsecurityguy.com Twitter: @theredinthesky

DEREK A. CHAMORRO CISSP, CCNP Austin, TX Website: therandomsecurityguy.com Twitter: @theredinthesky DEREK A. CHAMORRO CISSP, CCNP Website: therandomsecurityguy.com Twitter: @theredinthesky SUMMARY OF QUALIFICATIONS Expertise in performing vulnerability assessments and penetration testing (white, black,

More information

ManageEngine Password Manager Pro Vs Thycotic Secret Server

ManageEngine Password Manager Pro Vs Thycotic Secret Server ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on August 19, 2015) Feature ManageEngine Password

More information

Net LineDancer Update Notice

Net LineDancer Update Notice Net LineDancer Update Notice Update 14.06 Rev.20151007.1420 Added support for sending SNMP traps when a job fails. Added support to deep link directly to each page of the devices detail view. Added support

More information

Enforcive /Cross-Platform Audit

Enforcive /Cross-Platform Audit Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)

More information

Log Audit Ensuring Behavior Compliance Secoway elog System

Log Audit Ensuring Behavior Compliance Secoway elog System As organizations strengthen informatization construction, their application systems (service systems, operating systems, databases, and Web servers), security devices (firewalls and the UTM, IPS, IDS,

More information

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application

More information

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project. Our Security Ways we protect our valuables: By Edith Butler Fall 2008 Locks Security Alarm Video Surveillance, etc. History about IDS It began in 1980, with James Anderson's paper: History of IDS Cont

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE FAST FORWARD YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE VISUALIZE COMPLY PROTECT RedSeal Networks, Inc. 3965 Freedom Circle, 8th Floor, Santa Clara, 95054 Tel (408) 641-2200 Toll Free (888)

More information

Log Correlation Engine Log Normalization Guide. December 22, 2014 (Revision 2)

Log Correlation Engine Log Normalization Guide. December 22, 2014 (Revision 2) Log Correlation Engine Log Normalization Guide December 22, 2014 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Log Parsing and Normalization... 3 Architecture... 3 Normalization...

More information

ICANWK602A Plan, configure and test advanced server based security

ICANWK602A Plan, configure and test advanced server based security ICANWK602A Plan, configure and test advanced server based security Release: 1 ICANWK602A Plan, configure and test advanced server based security Modification History Release Release 1 Comments This Unit

More information

ACL Compliance Director FAQ

ACL Compliance Director FAQ Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

English Requirement: You must be able to understand and be understood in English.

English Requirement: You must be able to understand and be understood in English. MICHAEL R. BLOOMBERG Mayor MARTHA K. HIRST Commissioner THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E

More information

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4) Continuous Network Monitoring for the New IT Landscape March 16, 2015 (Revision 4) Table of Contents Introduction... 3 The New IT Landscape... 3 Gaps in the Modern IT Landscape... 5 Tenable s Five Critical

More information

Installation Guide. Sentinel Log Manager 1.2.2. July 2014

Installation Guide. Sentinel Log Manager 1.2.2. July 2014 Installation Guide Sentinel Log Manager 1.2.2 July 2014 Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED

More information

Secospace elog. Secospace elog

Secospace elog. Secospace elog Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Kentucky Information Technology Standards (KITS)

Kentucky Information Technology Standards (KITS) Kentucky Information Technology Standards (KITS) Full KITS Report - Word Search EAS EAS Name Standard KITS 5010 Intrusion Detection and Prevention Products must support approved Enterprise standards in

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information