RT and RT for Incident Response
|
|
|
- Juliana Kelly
- 10 years ago
- Views:
Transcription
1 RT and RT for Incident Response
2 Carlos Fuentes Bermejo RTIR WG - Primary Technical Contact RedIRIS IRIS-CERT - Security Specialist Si habla español Couldn t be here today :(
3 Jesse Vincent Designed RT and RTIR (It s all my fault) Founded Best Practical (It s even more my fault) No puedo presentar en español. Lo Siento.
4 WARNING
5 I represent a software vendor
6 We sell support, training, consulting and customization for RT, RTIR and RTFM
7 This talk could be dangerously close to a sales pitch.
8 I m not a sales guy
9 All the software we make is open source.
10 We helped create RTIR to let CERT teams be more effective.
11 I want you to use RTIR for free - forever.
12 I will be happy if you use it for free.
13 (Now do you believe that I m not a sales guy?)
14 About RT
15 RT is a Ticketing System
16 RT helps keep you organized.
17 Every conversation gets a number, a status and an owner.
18 RT helps keep your customers happy.
19 RT sends an autoreply and ticket number when they report a problem.
20 RT helps keep your team from going crazy.
21 You know what s been done, and when.
22 RT helps you show your bosses how hard you work.
23 It s easy to run reports on all kinds of metrics.
24 RT builds an ad-hoc knowledge base.
25 (With RTFM, you can build an explicit Knowledge Base)
26 Some RT history... Created in 1996 First public release in released in 1999 Best Practical formed in 2001 RTIR Created in 2003 RTIR WG Started in 2005 RTIR 2.4 Released 2008 (Last week!)
27 What is RT useful for? Issue Tracking Trouble Ticketing Workflow Helpdesk Customer Service Process Management Bug Tracking
28 RT Homepage
29 Ticket Details
30 Ticket History
31 Ticket Update
32 Ticket History
33 RT Core Concepts Tickets Queues Custom Fields Scrips Access Control Gateway Internationalization
34 Tickets Track issues Have unique id #s Keep a history of correspondence Have one owner (And a bunch of other metadata)
35 Queues High-level grouping of tickets Each can have its own Access Control Business Logic (Scrips) Custom Fields
36 Custom Fields Track your own ticket metadata Freeform (optional validation) Select (one or many) Text block Upload files or images Custom data sources Per-field access control
37 Scrips Custom business logic (Also how RT sends mail) Each is built from Condition Action Template
38 Access Control User, Group or Role based Global and Per-queue rights
39 Gateway RT was first made to replace a mailing list RT is designed for interaction (and web. and command line) RT mediates and tracks all discussions
40 Internationalization Fully native UTF8 internally Speaks 22 languages Handles inbound and outbound encoding Contribute at
41 More RT Features Charts and Reports Dashboards Self-service interface Feeds RTFM PGP Support Themability Ticket Aging Ticket Locking Web API Perl API CLI tools Customizability The Community
42 Where to get RT
43 Questions about RT? (Next up: RTIR)
44 RTIR RT for Incident Response
45 What is RTIR? Ticketing System RT for Incident Response Designed for CERT/CSIRT Teams Designed for a CERT team - JANET-CERT Generalized for a standard process
46 Differences from RT RTIR is RT...with more features, a custom interface and special configuration
47 Designed for CERT/CSIRT Teams Metadata Workflows Views Plugins
48 We designed RTIR to help you get your job done.
49 RTIR keeps track of incidents.
50 RTIR keeps track of correspondence.
51 RTIR keeps an uneditable history.
52 RTIR makes incident research easier.
53 RTIR tracks your SLA commitments.
54 RTIR integrates with your other systems.
55 RTIR takes care of the boring parts of Incident Response.
56 The RTIR Workflow
57 RTIR Homepage
58 RTIR is built around Incidents Incidents tie everything together One Incident for many Incident Reports many Investigations many Blocks
59 RTIR Relationships
60 It usually starts with an Incident Report Conversations with Customers Something bad happened! Please help me!
61 Incident Report
62 Incident Report
63 Create an IR
64 Create an IR #2
65 IR Details
66 IR History
67 Incident Report Reply
68 Incident Report History
69 Once reported, the team tracks an Incident Track what actually happened Private / Internal Tie everything together
70 Incident Lifecycle
71 Create an Incident
72 Incident Details
73 Incident Details #2
74 Incident History
75 Incident Investigation
76 The team starts an Investigation Internal Research and Discovery Conversations with external partners Law Enforcement Network Providers Experts
77 Investigation Lifecycle
78 Investigation Workflows
79 Launch Investigation
80 Launch Investigation
81 Investigation Details
82 Investigation History
83 Sometimes the easiest answer is just a Block (Optional Feature) Tied to an Incident Records of network blockades Could autoupdate firewalls
84 Create a Block
85 Data Detectors
86 Automatic IP Detection
87 Data Detectors
88 Research Tools
89 RTIR History
90 RTIR 1.0 Sponsored by JANET-CERT Replaced a homebuilt Remedy system Built on RT
91 RTIR 1.0 Features Clickable Data Detectors IP/Domain/Address Lookup Tool RTIR Automated Rules SLA Monitoring Business-Hours Logic
92 RTIR 2 Sponsored by TERENA RTIR WG Initial vision by JANET-CERT Design collaboration between RTIR WG and Best Practical Built on RT 3.8 RTIR 2.4 released September 2008
93 RTIR WG Members JANET CSIRT/UKERNA (Chair of project) IRIS-CERT/RedIRIS (Technical contact) CERT POLSKA ACOnet-CERT LITNET CERT SUNet CERT SWITCH-CERT CERT.PT GOVCERT.NL
94 RTIR 2.4 New Features PGP Integration Ticket Locking Ticket Aging Database Pruning Message Forwarding Bulk Actions Quick Actions Per-User Timezones RTFM Integration IP Address Range Fields
95 RTIR 2.4 New Features Improved Automation Improved Searching Improved Customization Improved Reporting Improved UI More flexible workflow More user preferences Easier Integration Improved Testing Improved Performance
96 Using RTIR
97 Cost of RTIR: $0
98 Cost of required software: $0
99 Cost of required hardware: $0?
100 Operating System Unix/Linux/FreeBSD/MacOS X/Solaris/etc (We don t do Windows)
101 Database MySQL 4.1 or 5.0 PostgreSQL 8.x Oracle 9x or 10.x SQLite (for testing)
102 Web Server Apache mod_perl or FastCGI lightttpd FastCGI Standalone pure-perl server
103 Getting RTIR
104 RT & RTIR Community [email protected] [email protected] [email protected] [email protected]
105 Muchas gracias! Questions? Jesse Vincent
106 Bonus!
107 Aim Institution - IP correlation Correlate automatically the IPs of the IRs, Invs and Blocks with its institutions Allow us an easiest way to address an investigation Statistic by institution What institution got more complaints at the end of the year When I say institution, it could be department
108 Requirements and Requirements Installation Main one!!! database which associates every institution or department with its IP allocation space LDAP, MySQL,, even a whois server Modify the Customer CustomField of IR and Invs queues to support external values You have to create your own library Has to have three functions: SourceDescription ExternalValues GetInstitutionByIP
109 Requirements and Install Download It will be in Extensions area Condition OnIPCreate Condition OnIPDelete
110 Workflow To: Cert Subject: Complaint is attacking our network. Incoming Mail RT & RTIR Box Answer: UNAM Query: Database Box Institution of is?
111
112
RT and RT for Incident Response
RT and RT for Incident Response I represent a software vendor We sell support, training, consulting and customization for RT, RTIR and RTFM This talk could be dangerously close to a sales pitch. I m not
IT Support Tracking with Request Tracker (RT)
IT Support Tracking with Request Tracker (RT) Archibald Steiner AfNOG 2013 LUSAKA Overview What is RT? A bit of terminology Demonstration of the RT web interface Behind the scenes configuration options
Request Tracker for Incident Response (RTIR)
Request Tracker for Incident Response (RTIR) Kevin Falcone Best Practical Solutions RT/RTIR RT RTIR Extending RTIR Future development of RTIR REQUEST TRACKER RT is a ticketing system Bugtracking Helpdesk
RT for Incident Response (RTIR)
RT for Incident Response (RTIR) Andy Bone JANET-CERT Manager What is RTIR A tool for incident handling Currently in Beta Why Change History Increasing volume of incidents Requirement for multiple person
Request Tracker 3.8. Stefan Hornburg. Nordic Perl Workshop 2009. Oslo, 17 th April 2009
Request Tracker 3.8 Stefan Hornburg Nordic Perl Workshop 2009 Oslo, 17 th April 2009 Request Tracker Bugtracking System for Perl / CPAN Trouble Ticket System Companies Organizations Customers Few instances
RTIR incident handling work-flow
RTIR incident handling work-flow JANET CSIRT JANET(UK) WI/JCSIRT/003 Page 1 of 18 INTRODUCTION Request Tracker for Incident Response (RTIR) is the incident handling and ticketing system used by JANET CSIRT,
Request Tracker User s Guide. : Describes the User Interface and usage of Request Tracker V3.
Request Tracker User s Guide Abstract : Describes the User Interface and usage of Request Tracker V3. Issue : 05 Date : 08/27/2007 Document History Issue Author(s) Date Description Change 1 N. Metrowsky
Simplifying Your IT Helpdesk with Request Tracker
Simplifying Your IT Helpdesk with Request Tracker Abstract Jay Lee Network / Systems Administrator Sali Kaceli Manager of Academic Computing Philadelphia Biblical University Information Technology Department
Network Management & Monitoring Ticketing Systems with RT
Network Management & Monitoring Ticketing Systems with RT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Ticketing Systems with RT
Network Management & Monitoring Ticketing Systems with RT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
How To Create A Ticketing System With Rt.Org
Ticketing Systems with RT Jonathan Brewer Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Jitterbit Technical Overview : Microsoft Dynamics CRM
Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
Ticketing Systems and Documentation
Ticketing Systems and Documentation APRICOT 2009 February 20 Hervey Allen Why Ticketing Systems? Remember this? - Monitoring - Data collection - Accounting Notifications - Change control & monitoring -
Total Cloud Control with Oracle Enterprise Manager 12c. Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle
Total Cloud Control with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle 2 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert
Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management
Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Andy Oppenheim Enterprise Management, Product Management Mervyn Lally
Jitterbit Technical Overview : Salesforce
Jitterbit allows you to easily integrate Salesforce with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
The open source enterprise solution pre-configured for the IT Asset Management www.cmdbuild.org
1 The open source enterprise solution pre-configured for the IT Asset Management www.cmdbuild.org Tecnoteca Srl [email protected] www.tecnoteca.com CMDBuild READY2USE 2 CMDBuild READY2USE is a CMDBuild
use ready 2 The open source enterprise solution pre-configured for the IT Asset Management www.cmdbuild.org Tecnoteca Srl
1 ready 2 use The open source enterprise solution pre-configured for the IT Asset Management www.cmdbuild.org Tecnoteca Srl [email protected] www.tecnoteca.com CMDBuild ready2use 2 CMDBuild ready2use
Adam Rauch Partner, LabKey Software [email protected]. Extending LabKey Server Part 1: Retrieving and Presenting Data
Adam Rauch Partner, LabKey Software [email protected] Extending LabKey Server Part 1: Retrieving and Presenting Data Extending LabKey Server LabKey Server is a large system that combines an extensive set
Designing and Developing an Application for Incident Response Teams
Designing and Developing an Application for Incident Response Teams Kees Leune and Sebastiaan Tesink Tilburg University, The Netherlands FIRST 2006, Baltimore, MD, USA High-quality Internet for higher
Sugar Professional. Approvals + + + + Competitor tracking + + + + Territory management + + + + Third-party sales methodologies + + + +
Professional Corporate Enterprise Ultimate List price / user / month $35 $45 $60 $150 List price / user / year (contractual term) $420 $540 $720 $1,800 Application or user limits no limits no limits no
Jitterbit Technical Overview : Microsoft Dynamics AX
Jitterbit allows you to easily integrate Microsoft Dynamics AX with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views
Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into
Request Tracker/RTx::AssetTracker at DigitalGlobe
Request Tracker/RTx::AssetTracker at DigitalGlobe Introduction This document explores the process of implementing an enterprise Help Desk/Asset Management system at DigitalGlobe. This includes a discussion
Sugar Professional. Approvals + + + + Competitor tracking + + + + Territory management + + + + Third-party sales methodologies + + + +
Professional Corporate Enterprise Ultimate List price / user / month $35 $45 $60 $100 List price / user / year (contractual term) $420 $540 $720 $1,200 Application or user limits no limits no limits no
1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
Organise Your Business
Organise Your Business Second CRM On Demand Customer Relationships A Functional Introduction Presentation January, 2013 Organise Your Business Second CRM On Demand Customer Relationships Designed for Small
Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft
White Paper Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft What You Will Learn Cisco is continuously innovating to help businesses reinvent the enterprise data
everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service]
everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] [Essential Third Party Integration] [Cross Platform Service Desk Solution] [Reporting
ScienceLogic vs. Open Source IT Monitoring
ScienceLogic vs. Open Source IT Monitoring Next Generation Monitoring or Open Source Software? The table below compares ScienceLogic with currently available open source network management solutions across
OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o.
HOMO Vulnerabilis Aghast Awarensis Dexterous Securis OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o. History postmaster@, hostmaster@, abuse@ Mailbox
Ai.CRM. Extending SAP Consume-to-Cash Functionalities Product Overview
Ai.CRM Extending SAP Consume-to-Cash Functionalities Product Overview 3. Ai.CRM Modules Ai.PI 2. Ai.CRM Framework and Engines 1. SAP Consume-to-Cash Ai.CLF ORACLE SAP CC Marketing simulation SAP CC Rating
Agile Development with Jazz and Rational Team Concert
Agile Development with Jazz and Rational Team Concert Mayank Parikh [email protected] Acknowledgements: Thanks to Khurram Nizami for some of the slides in this presentation Agile Values: A Foundation
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience
Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Spyders Managed Security Services
Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built
ManageEngine ServiceDesk Plus - MSP Training Agenda
ManageEngine ServiceDesk Plus - MSP Training Agenda Introduction Target Audience Who Should Attend Course Objectives Course Agenda 1. Introduction : This document outlines the training plan for ManageEngine
SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012
SES / CIF Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 Doug Pearson Technical Director, REN-ISAC [email protected] Background on REN-ISAC The REN-ISAC mission is to
HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015
HEAT DSM 2015.2 Release Overview Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Highlights HEAT Discovery Integration Patch Management Enhancements HEAT PatchLink Integration HEAT
Company Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
Managing your Red Hat Enterprise Linux guests with RHN Satellite
Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions
PNMsoft Sequence Ticketing Solution (PSTS)
PNMsoft Sequence Ticketing Solution (PSTS) PNMsoft Sequence Ticketing Solution (PSTS) is a software solution built on an industry leading Business Process Management platform. It enables organizations
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
Installation, Configuration and Administration Guide
Installation, Configuration and Administration Guide ehd10.0.1 everything HelpDesk Installation, Configuration and Administration Guide GroupLink Corporation 2013 GroupLink Corporation. All rights reserved
Editions Comparison Chart
Sugar Professional Sugar Enterprise Sugar Ultimate List price / user / month $35 $60 $150 List price / user / year (contractual term) $420 $720 $1,800 Application or user limits no limits no limits no
WEB HELP DESK GETTING STARTED GUIDE
WEB HELP DESK GETTING STARTED GUIDE TABLE OF CONTENTS Install Web Help Desk (Windows)..... 3 Set Up Technician & Client Accounts 6 Configuring Ticket. 9 Configuring IT Asset..... 13 Useful Links 15 Use
W H IT E P A P E R. Salesforce CRM Security Audit Guide
W HITEPAPER Salesforce CRM Security Audit Guide Contents Introduction...1 Background...1 Security and Compliance Related Settings...1 Password Settings... 2 Audit and Recommendation... 2 Session Settings...
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Organise Your Business
Organise Your Business Second CRM On Demand Customer Relationships A Business Introduction Presentation June, 2013 Organise AND Improve What is Business Improvement Boosted win rates by 27% Improved sales
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
quality of service Screenshots
versasrs HelpDesk quality of service Screenshots versasrs HelpDesk Main Screen Ensures that your internal user issues remain visible until resolved. Prevents problems from falling through the cracks. Send
Performing Advanced Incident Response Interactive Exercise
Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...
The Need for Intelligent Network Security: Adapting IPS for today s Threats
The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network
State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)
State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) ServiceNow Implementation Project Objectives to be completed are: 1. Aide in optimizing processes and integration
Product Information. Sugar vs Zoho. Features Comparison
Product Information vs Zoho Features Comparison CRM Community Price / user / month $0 $35 $45 $60 $100 $0 $12 $25 Price / user / year $0 $420 $540 $720 $1,200 $0 $144 $300 User limits no limit no limit
2012 Nolio Ltd. All rights reserved
2012 Nolio Ltd. All rights reserved The information contained herein is proprietary and confidential. No part of this document may be reproduced without explicit prior written permission from Nolio Ltd.
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
MARION COUNTY Information Technology. REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite
MARION COUNTY Information Technology REQUEST FOR INFORMATION Integrated IT Help Desk Client Management Software Suite DATE & TIME RESPONSES ARE DUE: January 2, 2015, at 2:00 PM Envelope(s) shall be sealed
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External
Achieve Service Excellence with VivaDesk
Achieve Service Excellence with VivaDesk Organise and automate your customer service, help desk or service desk operations. vivantio.com Introducing VivaDesk VivaDesk is a service management software application
1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS
W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the
Integrating Online Banking and Top-up Card into Payment Gateway
Internship Report Master of Software Engineering (2012-2014) Integrating Online Banking and Top-up Card into Payment Gateway Author: DAO Nguyen Vu Supervisor: HO Hoang Thuong January 11, 2015 Acknowledgment
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
Cisco UCS Central Software
Data Sheet Cisco UCS Central Software Cisco UCS Manager provides a single point of management for an entire Cisco Unified Computing System (Cisco UCS) domain of up to 160 servers and associated infrastructure.
1 Product. Open Text is the leading fax server vendor in the world. *
1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor
Microsoft PPM for Application Administrators using Microsoft Project Online
Microsoft for Application Administrators using Microsoft Project Online An engaging training session designed to train application administrators the fundamentals of maintaining Project Online. About this
MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
Management Packs for Database
Management Packs for Database Diagnostics Pack for Database Oracle Diagnostics Pack for Database offers a complete, cost-effective, and easy to use solution for managing the performance of Oracle Database
Siebel Open UI Service Planning and Execution
Siebel Open UI Service Planning and Execution Jahnavi S 1, Dr. Girijamma 2, Mr. Shashidhar H R 3 and Janani.S 4 1 Assistant Professor in Dayananad Sagar Academy of Technology and Management, VTU University,
Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows
Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)
ActiveVOS Server Architecture. March 2009
ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...
Improving End-User Support with the K1000 Help Desk/Service Desk
Improving End-User Support with the K1000 Help Desk/Service Desk Nathan Fluegel, Dell KACE Director of Education Brian Burchfiel, Dell KACE Engineer Gerald Gillespie, Dell KACE Kanadian Agenda Key Service
Minimizing ITSM cost of entry: HP Service Anywhere
Minimizing ITSM cost of entry: HP Service Anywhere Simple. Scalable. SaaS. Ioannis Mangos Senior Business Consutant HP Software Greece & Cyprus Fundamental question: On-Premise or SaaS Key factors affecting
Simple Service Modeling FAQs TrueSight Operations Management (BPPM) versions 9.5 and 9.6 11/31/2014
QUESTION: Where on the BMC Communities site can I find best practice guidance for creating custom KMs and importing them into BPPM 9.5 CMA? ANSWER: https://communities.bmc.com/docs/doc-31482 QUESTION:
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
Symantec Security Information Manager 4.8 User Guide
Symantec Security Information Manager 4.8 User Guide Symantec Security Information Manager User Guide The software described in this book is furnished under a license agreement and may be used only in
Junos WebApp Secure 5.0.0-10 (formerly Mykonos)
Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net April, 2013 Juniper Networks, Inc.
Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC
Information Risk Management Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Agenda Data Breaches Required Capabilities of preventing Data Loss Information
CRM for Customer Service and Support
OV E RV I E W CRM for Customer Service and Support MAXIMIZER CRM Published By Maximize satisfaction. Drive repeat business Servicing customers effectively is a key component in growing your business through
What's New in SAS Data Management
Paper SAS034-2014 What's New in SAS Data Management Nancy Rausch, SAS Institute Inc., Cary, NC; Mike Frost, SAS Institute Inc., Cary, NC, Mike Ames, SAS Institute Inc., Cary ABSTRACT The latest releases
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
A Guide To Evaluating a Bug Tracking System
A Guide To Evaluating a Bug Tracking System White Paper By Stephen Blair, MetaQuest Software Published: October, 2004 Abstract Evaluating a bug tracking system requires that you understand how specific
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
Moving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
