Integrigy Corporate Overview
|
|
|
- Marylou O’Neal’
- 10 years ago
- Views:
Transcription
1 mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview
2 Integrigy Overview Integrigy Corporation specializes in application security for large enterprise, mission critical applications. Our application vulnerability assessment tool, AppSentry, assists companies in securing their largest and most important applications. Integrigy Consulting offers security assessment services for leading databases and ERP/CRM. Corporate Details Founded December 2001 Privately Held Based in Chicago, Illinois
3 Integrigy Background Extensive experience with Oracle Founded by former Big-6 consultants with significant experience on Oracle implementations in Fortune 500 companies Founders recognized a major gap in all implementations little or no security auditing done on projects Integrigy has found more security bugs in Oracle Applications than anyone else inside or outside of Oracle Both an ERP/CRM company and a security company Products developed to support and enhance an ERP/CRM implementation Integrigy understands the issues and risks challenging large ERP/CRM implementations Integrigy bridges the gap between applications, databases, and security
4 Integrigy Security Alerts Security Alert Versions Security Vulnerabilities Critical Patch Update July 2008 Critical Patch Update April 2008 Critical Patch Update July 2007 Critical Patch Update October 2005 Oracle 11g x 12.0.x x x 2 Issues in Oracle RDBMS Authentication 2 Oracle E-Business Suite vulnerabilities 8 vulnerabilities, SQL injection, XSS, information disclosure, etc. 11 vulnerabilities, SQL injection, XSS, information disclosure, etc. Default configuration issues Critical Patch Update July 2005 Critical Patch Update April 2005 Critical Patch Update Jan 2005 Oracle Security Alert #68 Oracle Security Alert #67 Oracle Security Alert # x x x Oracle 8i, 9i, 10g x x Oracle Security Alert # Oracle Security Alert # , 11.0.x SQL injection vulnerabilities Information disclosure SQL injection vulnerabilities Information disclosure SQL injection vulnerabilities Buffer overflows Listener information leakage 10 SQL injection vulnerabilities Buffer overflow in FNDWRR.exe Multiple vulnerabilities in AOL/J Setup Test Obtain sensitive information (valid session) No authentication in FNDFS program Retrieve any file from O/S
5 Integrigy Offerings Assessment AppSentry Prevention AppDefend Auditing and Compliance Integrigy Consulting
6 Integrigy s Products AppSentry Security scanner for databases, application servers, and ERP packages Performs advanced penetration testing and in-depth security and controls auditing Performs over 300+ audits and checks on Oracle products Runs on any Windows PC and requires no software to be installed on the target servers AppDefend Application firewall and intrusion prevention system for ERP packages Blocks common attacks like SQL injection, session hijacking, and cross site scripting Blocks access to unimplemented Oracle Applications modules Runs as an Apache modules and scans all incoming web requests
7 AppSentry Security Scanner for databases, application servers, and ERP/CRM Applications Validates security of network, operating system, web server, database, and application Modular design with distributed GUI and centralized server Security checks written in XML and Java Automatic program and security check updates In-depth security and controls auditing Advanced penetration testing Scanning of open network ports for well-known and application specific vulnerabilities Validation of application and technology stack configuration by analyzing configuration files, logs, and file versions Analysis of users and roles to isolate segregation of duty issues Transaction auditing to detect possible fraud
8 AppSentry Workflow Quick and simple workflow Create Policies (one-time) Policies and configurations are created once by DBA, Security Officer, or Internal Audit Scans can be executed by DBA or Security Officer on a weekly or monthly basis Create Configurations (one-time) Configure Session (policy and configuration) Execute Scan Repeat Scan Run Reports Resolve Issues
9 AppSentry Screenshot Results from all scans can be reviewed at any time Results can be browsed or reports run Comparisons can be run against any previous scan Each finding includes a detailed description and solution
10 AppSentry Modules - Current Database/Web Server/Application Oracle E-Business Suite Oracle Database Oracle Application Server Microsoft SQL Server Supported Versions 11i ( CU2) R12 (12.0, 12.1) 8i (8.1.7) 9i (9.0.1, 9.2.0) 10g (10.1, 10.2) 11g (11.1, 11.2) 9iAS (1.0.2, 9.0.2, 9.0.3) 10g (9.0.4, 10.1, 10.2)
11 AppSentry Modules - Development Database/Web Server/Application Oracle PeopleSoft SAP Oracle Collaboration Suite Oracle Clinical Oracle Retail Oracle Siebel IBM DB2 Sybase Apache (AppSentry Open-Source Edition) Oracle WebLogic
12 AppDefend Application-level intrusion prevention system for the ERP/CRM Applications Scans all incoming web requests for common web application vulnerabilities including SQL Injection Cross Site Scripting Session Hijacking Blocks unused CGI-Bin programs and sample applications Users can specify filters to block other programs or files AppDefend for the Oracle E-Business Suite Blocks published and un-published Oracle Applications security vulnerabilities Permits access to only enabled/installed Oracle Applications Modules Oracle Applications delivered with 12,000 accessible Java Server Pages and Java servlets, even though only a 1,000 or fewer may be used by the customer Implemented as an Apache module
13 AppDefend Architecture DMZ Data Center Oracle Applications Web and Forms Servers Oracle Applications Database Server AppDefend (Apache Module) Apache Oracle Database AppDefend Module 1. Method Check 2. Static/Dynamic 3. Static Deny List 4. Dynamic Deny List 5. Module Permit List 6. Length Byte Check 7. SQL Injection Check 8. XSS Scripting Check
14 AppDefend vs. Traditional IDS/IPS AppDefend Designed for Oracle Applications highly specialized rules in-place with the default configuration Blocks unused Oracle Applications modules 30 minute installation and configuration Scans entire web request including POST AppDefend is distributed to each application server for resiliency and performance Traditional IDS/IPS Must be heavily customized for Oracle Applications rules must be developed and tested Complex configuration required to block unused Oracle Applications modules Significant effort and skill required to deploy and configure Many IDS/IPS solutions do not scan POST data Potential single point of failure and a possible performance bottleneck
15 AppDefend for the Oracle E-Business Suite Oracle E-Business Suite , R and not supported due to Oracle desupport Industry Verticals (Automotive, Clinical, Exchange) AutoConfig and non-autoconfig implementations supported Apache 1.3.9, , and Supported Operating Systems Sun SPARC Solaris 2.6, 8, and 9 HP PA-RISC HP/UX 11.0 and IBM AIX 4.3.2, 4.3.3, and 5L Linux x86 Red Hat Enterprise Linux AS/ES 2.1 and AS/ES 3 SuSe 7.0, 7.1, 7.2, SLES7, and SLES8 United Linux 1.0
16 Integrigy Consulting Integrigy Consulting provides on-site security audit and assessment services for databases and applications, including penetration testing and vulnerability assessments Application Security Assessment for the Oracle E-Business Suite Database Security Assessment for Oracle and SQL Server Oracle E-Business Suite Security Design, Configuration, and Testing Oracle E-Business Suite Internet Deployment Penetration Testing
17 Application Security Assessment Overview The goal of the application security assessment is to identify security issues and weaknesses in the Oracle Applications production technical environment as it is installed, configured, maintained, and used The assessment is a quantifiable, consistent, and thorough review of the state of the application and infrastructure security at a point in time Findings will be reflective of the current state of security The deliverable is an actionable list of recommendations that will provide a foundation for a secure environment
18 Application Assessment Technical Scope Oracle Applications Production Environment Web servers, forms servers, concurrent manager servers, and database servers Oracle Applications Development Environments Assessed using Integrigy s AppSentry assessment tool Minimal manual testing Modules included in the scope of the project is only reviewed and assessed from a technical perspective Functional and business activities are not in scope. Segregation of duties is only analyzed for System Administrator functions and responsibilities Not for other module responsibilities or functions (GL, AP, etc.).
19 Application Customization Assessment All customizations assessed from a design and source code perspective web customizations interfaces custom forms reports Customization design assessed to determine any security issues inherent in the design and implementation of the customization Customization source code is reviewed to identify any potential security flaws in the implementation of the customization, which may include SQL injection, cross-site scripting, parameter tampering, information disclosure, and improper or missing authentication
20 Operational Security Assessment Operational activities related to the Oracle Applications environment are assessed to determine if there are security or controls weaknesses Security management, auditing, monitoring and troubleshooting, change management, patching, and development are assessed for the Oracle Applications, database, application servers, and operating system Operations specific to Oracle Applications are categorized into 27 domains Domains are individually assessed Domains are mapped to ISO and COBIT Interview questions and tests/validations for each domain are defined in the assessment methodology
21 Operational Processes Operational Security Domains Oracle Applications Technical Components Oracle Applications Database Application Server Operating System 1. Security 1.1 User Management 1.2 Segregation of Duties 1.3 Database Security 1.4 Network and Web 1.5 OS Security 2. Auditing 2.1 Application Auditing 2.2 Database Auditing 2.3 Web Logging 2.4 OS Auditing 3. Monitoring and Troubleshooting 3.1 Application 3.2 Database 3.3 Web and Forms 3.4 Operating System 4. Change Management 4.1 Object Migrations 4.2 Application Configuration 4.3 Change Control 4.4 Database Configuration 4.5 Change Control 4.6 Change Control 5. Patching 5.1 Application Patches 5.2 Database Patches 5.3 Application Server Patches 5.4 OS Patches 6. Development 6.1 Application 6.2 Database 6.3 Web 6.4 Shell and File Transfer
22 Integrigy Contact Information Integrigy Corporation P.O. Box Chicago, Illinois / Website: Sales: Development: Support: Security Alerts: Copyright 2011 Integrigy Corporation. All rights reserved.
AppSentry Application and Database Security Auditing
AppSentry Application and Database Security Auditing May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
AppDefend Application Firewall Overview
AppDefend Application Firewall Overview May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda Web Application Security AppDefend Overview Q&A 1 2 3 4 5 Oracle EBS Web Architecture
Oracle Database Security Myths
Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications
New Security Features in Oracle E-Business Suite 12.2
New Security Features in Oracle E-Business Suite 12.2 October 24, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About
Security Implications of Oracle Product Desupport April 23, 2015
Security Implications of Oracle Product Desupport April 23, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer
mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
IBM Tivoli Monitoring for Databases
Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric
Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation
ArcSDE Oracle Database Requirements
ArcSDE Oracle Database Requirements Supported Database Versions Supported Operating Systems Database Requirements Operating System Limitations Supported Database Versions Standard/Standard One/Enterprise
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
How To Perform An External Security Vulnerability Assessment Of An External Computer System
External Vulnerability Assessment -Executive Summary- Prepared for: ABC ORGANIZATION On March 9, 2008 Prepared by: AOS Security Solutions 1 of 5 Table of Contents Executive Summary... 3 Immediate Focus
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
SOSFTP Managed File Transfer
Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP
Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for Microsoft Windows Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
Application Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
Contents. Primavera P6 Tested Configurations Release Version: 6.2.1 Date: December 2013 Revision: 6.2.1.0.7
Primavera P6 Tested Configurations Release Version: 6.2.1 Date: December 2013 Revision: 6.2.1.0.7 This document lists the configurations that have been tested for the Primavera P6 version 6.2.1 release.
IBM InfoSphere Guardium
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
IBM Security Access Manager for Web
IBM Security Access Manager for Web Secure user access to web applications and data Highlights Implement centralized user authentication, authorization and secure session management for online portal and
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection
How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking
Track transactions end to end across your enterprise to drive fast response times and help maintain high customer satisfaction IBM Tivoli Composite Application Manager for Response Time Tracking Highlights
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Architecture and Mode of Operation
Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
HP Security Assessment Services
HP Security Assessment Services HP Data Center Services Technical data Your corporate information and intellectual property are important assets that you want to protect from unauthorized users. Developing
DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index
DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate
Contents. BMC Atrium Core 7.6.00 Compatibility Matrix
Contents INTRODUCTION... 2 Supported Configurations... 2 Known Issues... 2 Potential Issues... 2 Support Policy for later versions of vendor products released after Atrium Core 7.5.00... 2 BMC ATRIUM CMDB,
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
The SAProuter An Internet Window to your SAP Platform (and beyond)
The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this
Introduction to Computer Administration. System Administration
Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
Patch Assessment Content Update Release Notes for CCS 11.0. Version: 2012-2 Update
Patch Assessment Content Update Release Notes for CCS 11.0 Version: 2012-2 Update Patch Assessment Content Update 2012-2 Release Notes for CCS 11.0 Legal Notice Copyright 2012 Symantec Corporation. All
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List
Symantec NetBackup Enterprise Server and Server 7.x OS Software Compatibility List Created on December 20, 2013 Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
8070.S000 Application Security
8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx
Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin
Procase Consulting APEX 4.1 Introduction Oleg Mochkin 1 APEX Users 2 APEX Express Use Cases 3 APEX as Solution Unique RAD tools for Oracle Database Browser based development Declarative way to build Web
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
Implementing a secure high visited web site by using of Open Source softwares. S.Dawood Sajjadi Maryam Tanha. University Putra Malaysia (UPM)
Implementing of an open source high visited web site 1 Implementing a secure high visited web site by using of Open Source softwares S.Dawood Sajjadi Maryam Tanha University Putra Malaysia (UPM) March
Blackboard Learn TM, Release 9 Technology Architecture. John Fontaine
Blackboard Learn TM, Release 9 Technology Architecture John Fontaine Overview Background Blackboard Learn Deployment Model and Architecture Setup and Installation Common Administrative Tasks Tuning Integrating
Comparison of DBI Products and BMC SmartDBA
Comparison of DBI Products and BMC SmartDBA Feature Brother-Panther SmartDBA Notes Streamlined performance workflow Identify configuration changes that lead to performance issues Brother-Panther will start
How To Use Ibm Tivoli Monitoring Software
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
PCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite October 22, 2014 Mike Miller Chief Security Officer Integrigy Corporation Megan Kelly Senior Director of ERP Integrations CardConnect Moderated by Phil Reimann,
ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)
ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Crystal Reports XI Release 1 for Windows
Revision Date: November 5, 2007 Crystal Reports XI Release 1 for Windows Overview Contents This document lists specific platforms and configurations for the Crystal Reports XI Release 1. INTRODUCTION...
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
Oracle Utilities Network Management System
Oracle Utilities Network Management System Quick Install Guide Release 1.9.0.2 October 2009 Oracle Utilities Network Management System Quick Install Guide, Release 1.9.0.2 Copyright 1991, 2009, Oracle.
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
High Availability Implementation for JD Edwards EnterpriseOne
High Availability Implementation for JD Edwards EnterpriseOne Ken Yeh, Manager, ERP Systems/JDE Enersource Colin Dawes, Director of Technology Services, Syntax Presentation Abstract Enersource Corporation
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions
Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Teamcenter 10.1. Installation on UNIX and Linux Servers Guide. Publication Number PLM00011 J
Teamcenter 10.1 Installation on UNIX and Linux Servers Guide Publication Number PLM00011 J Proprietary and restricted rights notice This software and related documentation are proprietary to Siemens Product
Symantec Enterprise Security Manager Patch Policy Release Notes
Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement
The Security Organization p. 1 Anecdote p. 2. Introduction
Preface p. xxiii Introduction p. xxv The Security Organization p. 1 Anecdote p. 2 Introduction p. 2 Where to Put the Security Team p. 2 Where Should Security Sit? Below the IT Director Report p. 3 Where
Oracle Access Manager
Oracle Access Manager Third-Party Integrations for, WebPass, Application Server Connector and Policy Manager 10g (10.1.4.0.1), 10g (10.1.4.2.0), and 10g (10.1.4.3) August 2013 This document is a guide
Proposed Security Framework for ERP Systems
Proposed Security Framework for ERP Systems Sharafat Bibi 1, Noman Saleem 2 1 IT department, First Women Bank Ltd Karachi [email protected] 2 SUPARCO, Pakistan Karachi Abstract: The Enterprise
How to Audit the Top Ten E-Business Suite Security Risks
In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Effective and Best practices of load and performance testing Oracle Applications using BSD Oracle plug-in for Rational Performance Tester
Effective and Best practices of load and performance testing Oracle Applications using BSD Oracle plug-in for Rational Performance Tester Anitha P Somanathan & Krishna Murthy ISSR IBM India Pvt Ltd Rational
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
HP Service Manager Compatibility Matrix
HP Service Manager Compatibility Matrix Software Version 9.21 January 12, 2011 Click one of the following links to see more detailed information. Tier Definitions Servers Applications Support Windows Client
IBM Tivoli Directory Integrator
IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,
vrealize Hyperic Supported Configurations and System Requirements
vrealize Hyperic Supported Configurations and System Requirements vrealize Hyperic 5.8.4 This document supports the version of each product listed and supports all subsequent versions until the document
TABLE OF CONTENTS. Administration Guide - SAP for Oracle idataagent. Page 1 of 193 OVERVIEW SYSTEM REQUIREMENTS - SAP FOR ORACLE IDATAAGENT
Page 1 of 193 Administration Guide - SAP for Oracle idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Full Range of Backup and Recovery Options SnapProtect Backup Command Line Support Backup
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
BMC BladeLogic Client Automation Installation Guide
BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Shipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11e ()... 2 Director Management Console (console
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
