TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014
|
|
|
- Mercy Farmer
- 10 years ago
- Views:
Transcription
1 TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014 Chris Patzer ZF Norbert Klasen NetIQ
2 Agenda Sentinel Deployment Scenarios Case Study: ZF Lessons Learned 2
3 Infrastructure Patterns Single site 3
4 Distributed Environments So your environment is distributed, does the SIEM infrastructure need to be distributed as well? Required by law/contracts network topology/bandwidth horizontal scale out for performance Desirable for resilience 4
5 Infrastructure Patterns Large regional sites 5
6 One-Tier Distributed Architecture 6
7 Infrastructure Patterns Distributed environments 7
8 Case Study ZF Group
9 ZF Group Motion and Mobility 9
10 Worldwide Presence with Production, Development, Aftermarket Trading and Service 122 production companies Claudia Bucher/HGB 8 main development locations 32 service companies Over 650 service partners worldwide 10
11 The ZF Group An Overview 2013 Sales $ 21 billion Employees 72,600 Countries 26 In September, ZF agreed to buy TRW Automotive Holdings Corp. (TRW) for $13.5 billion 11
12 Employees 2012 by Region Western Europe 49,093 thereof in Germany 43,195 Eastern Europe 4,485 North America 6,856 South America 5,235 Asia-Pacific 7,888 Africa 1,218 Total: 74,775 Thereof: Research and Development (R&D) approx. 7,120 Training 1,980 12
13
14 Project Definition The project will introduce a SIEM system and integrate systems management ZF was not able to react to external or internal attacks effectively. Log files were not collected centrally and there was no possibility to correlate events or provide forensic information. Representative systems from all zones and regions of the IT Infrastructure to log data to SIEM Operating Systems Special Applications (with out-of-the-box and custom build collectors) 14
15 Not In Project Scope SIEM will not provide inventory data SIEM is not for compliance check and reporting project will not provide a configuration management system (baseline security, CERT) project will not implement classical intrusion detection system Worldwide Rollout Staffing of SOC 15
16 Project Targets / Milestones Contents: Milestones End of analysis: Rough overview on the systems that should log to SIEM End of conception: Systems and applications for the pilot are defined and attack scenarios modeled End of realisation: Systems are logging to the SIEM, EM is in place, attack scenarious are defined as correlation End of validation: Pilot systems are running and tests are succeeded Measurability For servers, network devices and applications the amount of world wide used systems is documented A list of systems and applications for the pilot is documented A list of out of scope systems and applications is documented Attack scenarios are defined and priorised A set of EM rules to implement is defined All systems defined are logging to SIEM Attack scenarious are modelled as correlations and anomaly detection All EM rules defined are integrated All project goals are reached 16
17 Change of Scope Security incident change of scope and priorities 3 steps First, servers with suspicious activity worldwide OS logs from all servers in the EMEA DMZ OS Logs from all servers worldwide Create emergency rules Postpone all application logs except Firewall Proxy AV 17
18 Sentinel Architecture at ZF 18
19 Numbers Sources 40 security devices (Firewall, Proxy, IDS, Anti-Virus) 4500 hosts (Linux, Unix, Windows) Event volume Daily world-wide average: 600 million events European servers: 150 GB/day Retention period OS 2 years Proxy FW AV IDS/IPS Average EPS worldwide Based on ObserverCategory 20
20 Operational EPS (EMEA) Servers Security Devices 21
21 Avertage EPS (EMEA) Servers Security Devices 1 hour search 22
22 Let s Get Physical Virtual servers were not able to handle load New main servers Blade, 16 cores, 128 GB RAM, FC 13 TB primary, 50 TB secondary storage (TBD) all collectors run remotely 6 servers and 26 CMs Virtual systems 23
23 Context (Maps) Maps to enrich data with different informations Easier handling ZF specifica for searches lines of maps so far Enhance data for the use in distributed systems sentinel server name in clear text 24
24 Internal Informations (Maps) Generated maps Configuration management system (CMS) Asset information like system type (server, desktop, notebook), responsible ZF group, location Used for searches and tickets Global directory service (GDS) Identity tracking with minimal set of mapped fields (only username, ZF group and location) Privacy reasons IP Adress Management (IPAM) Network zones for searches and reports Clear text information with region, country and location information DNS Hostname resolution of internal clients and servers IP Geolocation Countries 25
25 Threat Intelligence (Maps) Public reputation data OTX, abuse.ch Trackers Used for reports Whitelist ip addresses needed Private blacklists Internal systems that were investigated External sources 26
26 Operations Monitoring Sentinel System also used for operations monitoring Nagios, HP Openview and syslog Special collectors for that Written by ZF and NetIQ Used for CMS and ticket integration 27
27 Ticket Generation ZF uses Jira ticket system SOC does not use the Sentinel internal ticket system Tickets are created with a specialized syslog connector On the operating monitoring Sentinel server The tickets are enriched with CMS data Sending a ticket to the correct group Have all information regarding the CI 28
28 Ticket Generation Tickets are prepared on each Sentinel server Execute command Sent to the operations monitoring Sentinel Server Sent via syslog out of the script A specialized connector creates the ticket request 29
29 Ticket Generation Tickets are formatted by The executed command formats the ticket request with Wiki language for a better readability Link direct to the found event Information links for SOC and HelpDesk 30
30 Lessons Learned
31 Obvious Things Time synchronization Monitor Disk utilization and availability Daily review of internal logs ((st:(a p i) OR evt:collector) AND sev:[3 TO 5] AND NOT (evt:(readevent* IssueSAMLToken*))) 32
32 Customizations Adhere to a naming convention Common prefix for custom filter, rules, etc Action plugin being used in an action ZF_SM_EC_Windows_Log_Cleared ZF_SM_SE_Notify_SIEM_Admin Custom field for FQDN Dynamic lists are one dimensional and Sentinel splits into host and domain Chop off description from each Windows event 33
33 Buffering Collector managers Event source server queues Windows Collector 15 MB/file Event raw data buffers Plan enough disk space in a separate volume Sentinel servers Tune queues Tmp directory for reports Autovacuum disabled RDD disabled (not used in the moment) 34
34 Object UUIDs All Objects in Sentinel have a Universally Unique Identifier (UUID) Event Sources, Connectors, Collectors, Collector Managers, Sentinel Servers, Identities Asset These are different per server They can t be resoved on a different server / are overwritten by Sentinel Link information Persons / hosts would have a different identity / asset on each server 35
35 ESM Objects Use SQL script to extract all ids and names on all servers Combine into single map Distribute that to all servers Map CustomerVars to names 36
36 Identities and Assets Identities Customized collector to use UUID from data source Assets Don t use Asset API, DB tables, views so far script on one Sentinel server to generate map file directly Inject data into events Link to CMS (tbd) 37
37 Multiple Sentinel Servers Avoid them if you can Rather spend more on hardware If you can t, automation will help you 38
38 Automation Solution Packs Collect, organize and distribute content SQL Scripts to pull data for cross server reports REST API Update plugins Enable no-data alerts on all DCs 39
39 Automation OS level Run commands on all servers/cms Silent install Distribute Files Map Data (static) Dynamic List Rsync 40
40 Correlation in Distributed Environments Deviding by geo Some devices will be used cross-geo or centrally managed Those report up into one specific sentinel server symmetric rules could be hard to do Need to think of data locality, message passing, race conditions 41
41 Don t miss the Identity-Powered Experience in IT Central. Thank you NetIQ Corporation. All rights reserved.
42
43 This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States.
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014 Usman Choudhary Senior Director [email protected] Rajeev Khanolkar CEO SecurView Agenda What is Security Monitoring? Definition & concepts
Executing Large-Scale Data Center Transformation Projects with PlateSpin Migrate 12
Executing Large-Scale Data Center Transformation Projects with PlateSpin Migrate 12 WHITE PAPER Table of Contents What are Data Center Transformation Projects?... 1 Introduction to PlateSpin Migrate...
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the Effort Out of Log Management and Gain the Actionable Information You Need to Improve Your Organisation s
NetIQ Aegis Adapter for Databases
Contents NetIQ Aegis Adapter for Databases Configuration Guide May 2011 Overview... 1 Product Requirements... 1 Implementation Overview... 1 Installing the Database Adapter... 2 Configuring a Database
Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture
Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager Best Practices and Reference Architecture WHITE PAPER Table of Contents Introduction.... 1 Why monitor PlateSpin Protect
NetIQ Update October 31, 2013 Michel van der Laan
NetIQ Update October 31, 2013 Michel van der Laan Regional Director Attachmate Group Company Facts Global Organization: 3,600 employees in 30+ countries Strong Financial Position: Revenue $1.1 billion
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications Matt Weisberg Vice President & CIO, Weisberg Consulting, Inc. [email protected] Paul McKeith Technical Sales, Novell, Inc. [email protected]
Security and HIPAA Compliance
Contents Meeting the Challenge of HIPAA...3 Key areas of risk...3 Solutions for meeting the challenge of HIPAA...5 Mapping to HIPAA...5 Conclusion...7 About NetIQ...7 About Attachmate...7 Security and
NetIQ AppManager for Cisco Interactive Voice Response. Management Guide
NetIQ AppManager for Cisco Interactive Voice Response Management Guide February 2009 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
A Practical Guide to Cost-Effective Disaster Recovery Planning
A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the two traditional approaches
Virtualization Management Survey Analysis White Paper August 2008
Contents Introduction Survey Results and Observations... 3 Virtualization Management Survey Analysis White Paper August 2008 Conclusion... 11 About NetIQ... 11 About Attachmate... 11 Over a six week period
The Challenges of Administering Active Directory
The Challenges of Administering Active Directory As Active Directory s role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The
Real-Time Security for Active Directory
Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The
CAS8491 Data Center Transformation as Service
CAS8491 Data Center Transformation as Service Gary Ardito Chief Architect Cloud Service Provider Solutions Pradeep Chaturvedi Product Management Agenda Workload Migration Challenges PlateSpin Recon PlateSpin
Trial Guide. NetIQ Security Manager. October 2011
Trial Guide NetIQ Security Manager October 2011 NetIQ Security Manager is protected by United States Patent No: 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND
Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security
Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security A key capability of any information security program is the ability to rapidly detect and help correct data breaches.
User Guide. NetIQ Security Manager. October 2011
User Guide NetIQ Security Manager October 2011 NetIQ Security Manager is protected by United States Patent No: 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND
The Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
NetIQ Aegis Adapter for VMware vcenter Server
Contents NetIQ Aegis Adapter for VMware vcenter Server Configuration Guide May 2011 Overview... 1 Product Requirements... 1 Supported Configurations... 2 Implementation Overview... 2 Ensuring Minimum Rights
Strong authentication. NetIQ - All Rights Reserved
Strong authentication NetIQ - All Rights Reserved Agenda Strong authentication Demo 2 Questions about Identification / Authentication What is authentication? Identity verification, are you who you say
NetIQ AppManager for Cisco Intelligent Contact Management. Management Guide
NetIQ AppManager for Cisco Intelligent Contact Management Management Guide February 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE
NetIQ Präsentation. 9. Oktober 2012. Otto W. Schäfer. Account Manager [email protected]
NetIQ Präsentation 9. Oktober 2012 Otto W. Schäfer Account Manager [email protected] 2 2011 NetIQ Corporation. All rights reserved. The Attachmate Group, Inc. Unternehmenskennzahlen Globales Unternehmen:
NetIQ AppManager ResponseTime for Microsoft Active Directory Management Guide
NetIQ AppManager ResponseTime for Microsoft Active Directory Management Guide August 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED
Installation and Configuration Guide. NetIQ Security and Compliance Dashboard
Installation and Configuration Guide NetIQ Security and Compliance Dashboard June 2011 Legal Notice NetIQ Secure Configuration Manager is covered by United States Patent No(s): 5829001, 7093251. THIS DOCUMENT
Upgrading to MailMarshal Version 6.0 SMTP Technical Reference
Upgrading to MailMarshal Version 6.0 SMTP Technical Reference April 19, 2005 Contents Introduction... 3 Case 1: Standalone MailMarshal SMTP Server... 3 Case 2: Array of MailMarshal SMTP Servers... 14 Additional
Staying Secure in a Cloudy World
Staying Secure in a Cloudy World The unprecedented rate at which organizations have adopted cloud computing has fundamentally transformed business and government computing infrastructure. IT market researcher
NetIQ AppManager for NetBackup UNIX
NetIQ AppManager for NetBackup UNIX Management Guide January 2008 Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335. THIS
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
NetIQ Sentinel 7. Security Intelligence Made Easy
NetIQ Sentinel 7 Security Intelligence Made Easy For security professionals who must answer the question, How secure are we? but are overwhelmed with the constant change and complexity of the computing
McAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
Evolving Threat Landscape
Evolving Threat Landscape Briefing Overview Changing Threat Landscape Profile of the Attack Bit9 Solution Architecture Demonstartion Questions Growing Risks of Advanced Threats APT is on the rise 71% increase
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014
CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014 Agenda 1. About CorreLog 2. Log Management vs. SIEM 3. The
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Management Guide. NetIQ AppManager Connector for IBM Tivoli Netcool/OMNIbus
Management Guide NetIQ AppManager Connector for IBM Tivoli Netcool/OMNIbus May 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Upgrading From NetIQ Security Manager 6.5 to Sentinel 7.0
Contents Overview... 1 Understanding Sentinel 7.0 Architecture... 1 Planning to Upgrade From Security Manager to Sentinel... 3 Enabling Security Manager Data Forwarding... 4 Using Sentinel to Search Log
NetIQ AppManager for Nortel Contact Center Manager Server. Management Guide
NetIQ AppManager for Nortel Contact Center Manager Server Management Guide July 2011 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
User Guide. NetIQ VigilEnt Policy Center. August 2011
User Guide NetIQ VigilEnt Policy Center August 2011 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE
NetIQ AppManager for Cisco Unity Express. Management Guide
NetIQ AppManager for Cisco Unity Express Management Guide February 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Symantec Security Information Manager 4.8 Release Notes
Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
NetIQ AppManager SNMP Toolkit. Management Guide
NetIQ AppManager SNMP Toolkit Management Guide July 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR
NetIQ AppManager for IP Phone Quality. Management Guide
NetIQ AppManager for IP Phone Quality Management Guide February 2011 Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.
Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security
Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security A key capability of any information security program is the ability to rapidly detect and help correct data breaches.
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:»
Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security
WHITE PAPER Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security A key capability of any information security program is the ability to rapidly detect and help correct
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
NetIQ Access Manager. Developer Kit 3.2. May 2012
NetIQ Access Manager Developer Kit 3.2 May 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON DISCLOSURE
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Security Operations Metrics Definitions for Management and Operations Teams
Whitepaper Security Operations Metrics Definitions for Management and Operations Teams Measuring Performance across Business Imperatives, Operational Goals, Analytical Processes and SIEM Technologies Research
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Server & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers
NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers The World's Fastest and Most Scalable SIEM Finally an enterprise-class security information and event management system
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. View a graphical summary of the applications on the network, the respective users, and
Administration Guide NetIQ Sentinel
Administration Guide NetIQ Sentinel February 2015 www.netiq.com/documentation Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
GOOD PRACTICE GUIDE 13 (GPG13)
GOOD PRACTICE GUIDE 13 (GPG13) GPG13 - AT A GLANCE Protective Monitoring (PM) is based on Good Practice Guide 13 Comprises of 12 sections called Proactive Monitoring Controls 1-12 Based on four Recording
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Installation Guide NetIQ AppManager
Installation Guide NetIQ AppManager April 2016 www.netiq.com/documentation Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Memory Forensics & Security Analytics: Detecting Unknown Malware
Memory Forensics & Security Analytics: Detecting Unknown Malware SESSION ID: SEC-T09 Fahad Ehsan Associate Director Security Research and Analytics UBS AG Where it all started. ------------------------------------------------------------------------------------------
GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan
Fahad Ehsan Cyber Security Researcher Where it all started. ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt)
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents
PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Sentinel 7.0.1 Migration Utility
Contents Sentinel 7.0.1 Migration Utility Technical Reference June 2012 Overview 3 Assessing your Environment 6 Exporting Sentinel 6.1 and Sentinel 6.1 RD Configuration Data 8 Importing Configuration Data
Find the needle in the security haystack
Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Reporting and Incident Management for Firewalls
Reporting and Incident Management for Firewalls The keys to unlocking your firewall s secrets Contents White Paper November 8, 2001 The Role Of The Firewall In Network Security... 2 Firewall Activity Reporting
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
User Guide. Directory and Resource Administrator Exchange Administrator. Directory and Resource Administrator Exchange Administrator User Guide
Directory and Resource Administrator Exchange Administrator User Guide User Guide Directory and Resource Administrator Exchange Administrator September 2010 Legal Notice NetIQ Directory Resource Administrator
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era Ted Gruenloh Director of Operations Sentinel IPS * Agenda! Review of the current Network Security
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide September 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND
AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst
ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of
PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
PANORAMA Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. Web Interface HTTPS Panorama SSL View a graphical summary of the applications
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
