16529: Mainframe Security Should You Worry? Call the Doctor, Not the Undertaker!
|
|
|
- Shanna Summers
- 10 years ago
- Views:
Transcription
1 16529: Mainframe Security Should You Worry? Call the Doctor, Not the Undertaker! Charles Mills Director of Advanced Projects CorreLog, Inc. About the Speaker Charles is the Director of Advanced Projects for CorreLog, Inc. He is responsible for the CorreLog Agent for z/os. He was the founder and CTO of a company that developed a mainframe/pc file transfer program. As such, he was responsible for both mainframe and non-mainframe technology and developers.
2 Agenda Preface: Two Worlds of IT security Real-time Alerts: Make your mainframe more secure by taking advantage of the security tools you probably already have Why, What, How Brief Introduction to SIEM Systems Preface: Two Worlds of IT Security
3 Security in the Mainframe World Security in the Network World Routers Firewalls Linux Windows Web Server Unix SIEM Security Operations Center
4 The Two Meanings of Syslog z/os SYSLOG: a data set residing in the primary job entry subsystem's spool space used by application and system programmers to record communications about problem programs and system functions. MVS Planning: Operations That is not what the rest of the IT industry means by Syslog Syslog The Network Security Meaning The BSD syslog Protocol IETF RFC 3164 and follow-ons RFC 5424, 5425, 5426 and 6587 Almost free-format text (ASCII) messages <34>Oct 11 22:14:15 mymachine su: 'su root' failed for lonvick on /dev/pts/8 <34> is encoded facility (security) and severity (critical) Transmitted via UDP or TCP/IP with optional SSL/TLS encryption Generated by routers, firewalls, UNIX systems, etc. No native Syslog capability: Windows and z/os
5 What s a SIEM? Security Information and Event Management Collects Syslog messages Filtering Correlation: pattern recognition; establishing relationships among messages and events IP Location Real-time Alerts Log management: cost-effective forensic (tamper-proof or tamper-evident) storage, indexing, analysis, search and reporting User and Application Monitoring Compliance reporting You probably spent or are spending $$$,$$$ on a SIEM Real-Time Alerts: Let your mainframe take advantage of network security tools
6 Mainframe in the Network Security World Routers Firewalls Linux Windows Web Server Unix SIEM Security Operations Center Why Integrate z/os into your SIEM? Compliance: PCI DSS, HIPAA, GLBA, SOX, IRS Pub You need to include the box with 70% of the data CISOs and Auditors are discovering the mainframe z/os is not invulnerable You already own a SIEM why not use it to help protect z/os? Add z/os to the correlation mix
7 Aren t Mainframes Inherently Secure? The mainframe is the most securable platform Mark Wilson, RSM Partners, SHARE 2014 Insider threats are the leading cause of data breaches in the last 12 months Understand The State Of Data Security And Privacy: 2013 To 2014, Forrester Research Source: Wikimedia Yes, z/os Can be Breached! Logica, service bureau in Sweden, March to September 2012 Data including bank data, government agencies, credit cards multiple LPARs Access via FTP and TN3270, possibly initially using accounts stolen from breached Web server Installed backdoor to allow easy ongoing access Downloaded RACF databases, used PC hacker password cracking tool * to decrypt 30,000 passwords Gottfrid Svartholm Warg, co-founder of The Pirate Bay, and an accomplice convicted June 2013 Source: Wikimedia * John The Ripper you can Google it includes explicit support for RACF password decryption
8 Hackers against Society Breach of CSC mainframe, April to August, 2012 Downloaded and also may have modified information in the driver s license registry and an international database of wanted persons Same mainframe also served Danish Tax Authority, the citizen ID number registry and other public agencies October, 2014 Warg convicted and sentenced to three-and-onehalf years in prison in Denmark for the hack Your Mainframe is not a Silo You may have separate mainframe and network security teams, but hackers do not Breaches are systemic, not platform-specific Warg and his accomplices moved freely among PC, Web, z/os, UNIX and Hercules Protect your mainframe by correlating the indicators
9 Correlation is Power More failed TSO logons than normal may not be significant But what if correlated with more intrusion detection system hits than normal, more firewall hits than normal, more Web logon failures than normal? That is what SIEM systems do think how powerful to add your mainframe into the mix Call the Doctor, not the Undertaker Traditional mainframe approach is nightly reports But you want to find out about a breach now, not tomorrow morning The Network Security World has real-time tools why not utilize them? When was the last time a batch report sent you a text? Leverage the SIEM software you probably already own for real-time alerts Separation of duties: move the mainframe log files off of the mainframe PCI DSS, IRS Pub. 1075, SOX all require secure, archived log of accesses why use gigabytes of mainframe DASD?
10 z/os Events Available Real-time Everything RACF, ACF2 and Top Secret Failures only, or audit successes too File integrity: who modified SYS1.PARMLIB? PDS, QSAM, VSAM and UNIX files written Renames and Scratches Start and end of TSO sessions Optionally started tasks, batch jobs, ABENDs, etc. TCP/IP, TN3270 and FTP sessions and failures Everything needed from DB2 for PCI DSS Audited CICS Transactions Partner events: NewEra, Vanguard, Console messages, IMS, All real-time no periodic FTP What IP Address Edited SYS1.PARMLIB? <69>Mar 26 05:18:00 mvssysb TCP/IP: Subtype: Telnet SNA init - TermNm: TCPB RemtIP: <29>Mar 26 05:18:22 mvssysb SMF: Start - Work: TSO - JobID: TSU Group: RESTRICT - UserID: SYS013B - TermNm: TCPB2931 <118>Mar 26 05:22:09 mvssysb DFSMS: Action: Add/Replace - JobNm: RU018A - Step: $TSUSER - Proc: $TSUSER - DSN: SYS1.PARMLIB - Vol: LS Flag: Replace - Mem: IEAAPF00 - UserID: SYS013B - POE: TCPB Group: RESTRICT
11 RACF Events <35>Nov 27 19:44:00 SYSB RACF: RESOURCE ACCESS: Insufficient Auth - UserID: RU018B - Group: RESTRICT - Reas: AUDIT option - Job: RU018BTR - Res: SYS1.PROD.PROCLIBT - Req: READ - Allow: NONE - Vol: SYS001 - Type: DATASET - Prof: SYS1.PROD.PROCLIBT - Owner: DATASET - Name: ROBERT SMITH - POE: INTRDR <35>May 14 11:11:46 SYSB RACF: INIT/LOGON: Invalid Password - UserID: QAMLB2 - Group: TSOHOLD - Auth: 00 - Reas: VERIFY failure - Term: TCPA Name: MARIE BERGERON - POE: TCPA2959 TCP/IP and FTP Events <69>Mar 26 17:32:46 mvssysb TCP/IP: Subtype: FTP server complete - Stack: TCPIP - Op: Retrieve - FileType: SEQ - RemtDataIP: ::ffff: UserID: RX239JB - DStype: HFS - Start: :32: Dur: Bytes: SessID: FTPD DSN: /u/rx239jb/source/fields.c - Security: {Mech: None - CtlProt: None - DataProt: None - Login: Password} <69>Mar 25 18:53:21 mvssysb TCP/IP: Subtype: FTP server logon fail - Stack: TCPIP - AS: FTPD1 - UserID: DV174A - RemtIP: ::ffff: LogonUserID: DV174A - Reas: Password invalid - SessID: FTPD Security: {Mech: None - CtlProt: None - DataProt: Undefined - Login: Password}
12 Operational Events <29>Mar 04 04:42:01 mvssysb SMF: End - Work: STC - Sysname: SYSB - JobNm: MITDB41T - JobID: STC Step#: 1 - Group: DFLTSTC - UID: LSCSTC - RC: U DB2 Events <110>Mar 24 15:29:00 mvssysb DB2: Subsys: DA1L - IFCID: Audit administrative authorities - UserID: RU018B - AuthID: RU018B - CorrID: RU018BD3 - Auth: SYSADM - Priv: SELECT - ObjType: Table or view - Cmd: SELECT * FROM SYSIBM.SYSTABLES - SrcQual: SYSIBM - Src: SYSTABLES <110>Mar 24 15:44:20 mvssysb DB2: Subsys: DA1L - IFCID: Authorization failures - UserID: RU018A - AuthID: RU018A - CorrID: RU018ADS - Priv: SELECT - ObjType: Table or view - SrcQual: CORE Src: NEWPHONE - Node: JES2SYSB - Group: RESTRICT - POE: INTRDR - Sql: SELECT * FROM CORE1010.NEWPHONE
13 Introduction to SIEMs Correlation
14 Real-Time Text Alerts Compliance Scorecards
15 Types of SIEMs Conventional Software/Appliance/Virtual Appliance Running on Linux, UNIX or Windows HP ArcSight ESM IBM Security QRadar LogRhythm AlienVault (Open Source) McAfee (Intel Security) NitroView CorreLog Correlation Server Splunk do not call themselves a SIEM but customers use as a SIEM, and Gartner positions as a SIEM SIEM in the Cloud: MSSP Managed Security Service Provider Some are hybrids with on-site concentrator appliance Dell SecureWorks IBM Managed Security Services Verizon NTT Solutionary
16 The CorreLog SIEM Agent for z/os CorreLog SIEM Agent for z/os UDP, TCP/IP or ICSFencrypted TCP/IP Any SIEM or MSSP z/os No intermediate formatting box SIEM Agnostic HP ArcSight CEF Certified IBM Security QRadar Ready for Security Intelligence Intel Security (McAfee Nitro) Partner NTT Solutionary Partner Dell SecureWorks LogRhythm Splunk
17 z/os Events in HP ArcSight ESM z/os Events in Splunk
18 CorreLog Visualizer for z/os z/os Group z/os Departmental SIEM SIEM Security Operations Center Mainframe Events in z/os Visualizer
19 Point-and-Click Drill-Down to Detail CorreLog z/os Agent + Visualizer Compatible with will front end any enterprise SIEM Point-and-click window into z/os events Security, TSO, started tasks, ABENDs, FTP, DB2 Real-time: up-to-the-second, timely data Log analysis Big SIEM features like correlation, reports, text alerts, etc.
20 In conclusion We have covered The two worlds of IT security Why and How to get real-time event alerts by making your mainframe part of your overall enterprise security posture A brief introduction to SIEMs Thank you! Questions?
21 For more information SHARE in Seattle March 1 to 6, : z/os Log Analysis Product Shoot-Out Tuesday 1:45 PM-2:45 PM 16529: Mainframe Security Should You Worry? Call the Doctor, Not the Undertaker! Thursday, 1:45 PM-2:45 PM SHARE Technology Exchange, Booth 609 Legal Trademarks CorreLog is a registered trademark, and dbdefender is a trademark, of CorreLog, Inc. The following terms are trademarks of the IBM Corporation in the United States or other countries or both: DB2, IBM, MVS, Q1, QRadar, RACF, System z, Tivoli, z/os, zsecure, zseries ACF2 and Top Secret are registered trademarks of CA Inc. ArcSight is a trademark of Hewlett-Packard Development Company, L.P. Gartner is a registered trademark of Gartner, Inc. LogRhythm is a trademark of LogRhythm, Inc. McAfee is a registered trademark of McAfee, Inc. PCI Security Standards Council is a trademark of The PCI Security Standards Council LLC. Splunk is a registered trademark of Splunk, Inc. UNIX is a registered trademark of The Open Group. Vanguard Integrity Professionals is a trademark of Vanguard Integrity Professionals Windows is a registered trademark of Microsoft Corporation. Other company, product, or service names may be trademarks or service marks of others. No association with CorreLog, Inc. is implied. We acknowledge the PCI DSS Requirements and Security Assessment Procedures, Version 2.0, Copyright 2010 PCI Security Standards Council LLC.
NY/TB RUG: The Mainframe isn t Dead: Call the Doctor not the Undertaker with Real-time Enterprise Alert Correlation
NY/TB RUG: The Mainframe isn t Dead: Call the Doctor not the Undertaker with Real-time Enterprise Alert Correlation Charles Mills Director of Special Projects CorreLog, Inc. [email protected]
Bridge the Gap: How to Use an Enterprise Product You Already Own to Enhance z/os Security
Bridge the Gap: How to Use an Enterprise Product You Already Own to Enhance z/os Security Peter Mills Vice President Development & Support CorreLog, Inc. [email protected] Agenda Preface: Two Worlds
PCI DSS, z/os and Keeping You from Becoming a News Headline
PCI DSS, z/os and Keeping You from Becoming a News Headline Charles Mills CorreLog, Inc. March 13, 2012 Session #11089 Copyright and Trademarks Copyright 2012 CorreLog, Inc. Trademarks CorreLog is a registered
CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014
CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014 Agenda 1. About CorreLog 2. Log Management vs. SIEM 3. The
Database Activity Monitoring (DAM) is defined by Gartner as tools that can be used to support the
www.correlog.com Real-Time z/os DB2 Database Activity Monitoring from the CorreLog Agent with dbdefender Database Activity Monitoring (DAM) is defined by Gartner as tools that can be used to support the
8 Guidelines for Monitoring Mainframe Security Controls per PCI DSS Requirements
8 Guidelines for Monitoring Mainframe Security Controls per PCI DSS Requirements Payment Card Industry Security Standards Council on data security requirement #5: Protect all systems against malware and
Enforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
Enterprise Security CPA for IBM MF
Enterprise Security CPA for IBM MF CPA What is it? The CPA (Cross Platform Audit) is a comprehensive log management and critical data monitoring platform for the IBM mainframe. It allows you to collect
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
How to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 [email protected] Scott Myers (408) 973-8374 [email protected] 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
21 Things You Didn t Used to Know About RACF
21 Things You Didn t Used to Know About RACF (A Technical Update for IT Auditors) Stuart Henderson The Henderson Group (301) 229-7187 1 Here Are 21 Things Auditors Should Know About RACF One Person s Opinion,
Mark Wilson [email protected] Session Details: The Introduction
Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask! Mark Wilson [email protected] Session Details: The Introduction Agenda Introduction
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Secret Server Splunk Integration Guide
Secret Server Splunk Integration Guide Table of Contents Meeting Information Security Compliance Mandates: Secret Server and Splunk SIEM Integration and Configuration... 1 The Secret Server Approach to
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
New Security Options in DB2 for z/os Release 9 and 10
New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and
Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013
Everything You Always Wanted to Know About Log Management But Were Afraid to Ask August 21, 2013 Logging and Log Management Logging and Log Management The authoritative Guide to Understanding the Concepts
Top Ten Security Vulnerabilities in z/os Security
Top Ten Security Vulnerabilities in z/os Security John Hilman Vanguard Professional Services 1 The Issues Is your mainframe critical to your enterprise? Is it central to your Disaster Recover Plan Does
CA Top Secret r15 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Enforcive / Enterprise Security
TM Enforcive / Enterprise Security End to End Security and Compliance Management for the IBM i Enterprise Enforcive / Enterprise Security is the single most comprehensive and easy to use security and compliance
Consolidating security across platforms with IBM System z
IBM Software Thought Leadership White Paper September 2010 Consolidating security across platforms with IBM System z Protect your business-critical information by leveraging the mainframe as a security
Securely Yours LLC Top Security Topics for 2013. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC Top Security Topics for 2013 Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
Find the intruders using correlation and context Ofer Shezaf
Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find
An Oracle White Paper January 2011. Oracle Database Firewall
An Oracle White Paper January 2011 Oracle Database Firewall Introduction... 1 Oracle Database Firewall Overview... 2 Oracle Database Firewall... 2 White List for Positive Security Enforcement... 3 Black
Event Log Monitoring and the PCI DSS
Event Log Monitoring and the PCI DSS Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies www.nntws.com Striking a Balance Between
Exporting IBM i Data to Syslog
Exporting IBM i Data to Syslog A White Paper from Safestone Technologies By Nick Blattner, System Engineer www.safestone.com Contents Overview... 2 Safestone... 2 SIEM consoles... 2 Parts and Pieces...
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures
Whitesheet Navigate Your Way to Compliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is an American federal law that requires organizations that handle personal health information
Someone may be manipulating information in your organization. - and you may never know about it!
for iseries, version 3.5 Complete Security Suite for iseries (AS/400) TCP/IP and SNA Connectivity Someone may be manipulating information in your organization - and you may never know about it! If your
z/os Security - FTP Logon Failures
Page 1 of 5 CLEVER Solutions Empowering Global Enterprise z/os Security: FTP Logon Failures Dear Cathy, Does your business have a laissez faire attitude toward z/os security? Most companies do because
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
An Often Overlooked Security Hole in Enterprise Extender and Mainframe Networks By Stu Henderson and Peter Hager
An Often Overlooked Security Hole in Enterprise Extender and Mainframe Networks By Stu Henderson and Peter Hager I Introduction and Background on VTAM Networks This article describes a common mainframe
Lauraʹs Corner The CLEVER Solution: Working with Encrypted Data
Page 1 of 5 CLEVER Solutions Empowering Global Enterprise Case Study: Working with Encrypted Data Most IT organizations moving to cloud based, Big Data, and/or highly virtualized service management infrastructures
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
With Cloud Defender, Alert Logic combines products to deliver outcome-based security
With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,
An Oracle White Paper January 2012. Oracle Database Firewall
An Oracle White Paper January 2012 Oracle Database Firewall Introduction... 2 Oracle Database Firewall Overview... 3 Oracle Database Firewall... 3 White List for Positive Security Enforcement... 4 Black
Privileged Identity Management for the HP Ecosystem
Privileged Identity Management for the HP Ecosystem Contents HP Service Manager Software (formerly Peregrine)...3 HP Integrated Lights-Out Automated Credential Management....................... 4 HP ArcSight
HP NonStop Server Security and HP ArcSight SIEM
HP NonStop Customer Technical Talk HP NonStop Server Security and HP ArcSight SIEM 04/12/2012 HP NonStop Karen Copeland HP Enterprise Security Morgan DeRodeff XYPRO Barry Forbes NonStop Enterprise Division
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
IBM Tivoli Monitoring for Network Performance
Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
IBM Tivoli Compliance Insight Manager
Facilitate security audits and monitor privileged users through a robust security compliance dashboard IBM Highlights Efficiently collect, store, investigate and retrieve logs through automated log management
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
Tivoli Security Information and Event Manager V1.0
Tivoli Security Information and Event Manager V1.0 Summary Security information and event management (SIEM) is a primary concern of the CIOs and CISOs in many enterprises. They need to centralize security-relevant
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
CSP & PCI DSS Compliance on HP NonStop systems
CSP & PCI DSS Compliance on HP NonStop systems July 23, 2014 For more information about Computer Security Products Inc., contact us at: 200 Matheson Blvd. West Suite 200 Mississauga, Ontario, Canada L5R
HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates [email protected]
HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates [email protected] Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Securing your IT infrastructure with SOC/NOC collaboration
Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring
NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach
Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable
Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable April 2015 1 List of Exhibits Chart Slide Number Executive Summary
ACKNOWLEDGEMENTS. I would like to thank Professor Stockman for all the help and guidance during my
ACKNOWLEDGEMENTS I would like to thank Professor Stockman for all the help and guidance during my projects and during my tenure at the University of Cincinnati. I would also like to thank Professor Kumpf
Agenda. z/os Ethical Hacking Vulnerability Scanning & Pen Testing. Mark Wilson RSM Partners. Session Number: 12275. l Disclaimer.
z/os Ethical Hacking Vulnerability Scanning & Pen Testing Mark Wilson RSM Partners Session Number: 12275 Agenda l Disclaimer l Introduction l Objectives l Mainframe Hacking Fact or Fiction? l Penetration
HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps
WHITE PAPER HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps Summary Summary Compliance with PCI, HIPAA, FISMA, EU, and other regulations is as critical in virtualized
Gothenburg 2015. Mainframe and Continuous Integration. Jan Marek Jan.Marek@ca. com. CA Technologies. Session S610
Jan Marek Jan.Marek@ca. com CA Technologies Session S610 Mainframe and Continuous Integration Agenda Introduce continuous integration concept What problem we were facing Overview of the solution Examples
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Vanguard. Two Factor Authentication Solutions
Vanguard Two Factor Authentication Solutions Legal Notice Copyright 2016 Vanguard Integrity Professionals, Inc. All Rights Reserved. You have a limited license to view these materials for your organization
Secret Server Syslog Integration Guide
Secret Server Syslog Integration Guide Table of Contents Meeting Information Security Compliance Mandates: Secret Server and Syslog Integration... 1 The Secret Server Approach to Privileged Account Management:...
CICS Transactions Measurement with no Pain
CICS Transactions Measurement with no Pain Prepared by Luiz Eduardo Gazola 4bears - Optimize Software, Brazil December 6 10, 2010 Orlando, Florida USA This paper presents a new approach for measuring CICS
Brian Albrecht, MIS, CISSP Senior Knowledge Engineer LogRhythm, Inc. [email protected]
Brian Albrecht, MIS, CISSP Senior Knowledge Engineer LogRhythm, Inc. [email protected] Case Study Disgruntled Employee Data Breach Council of Community Health Clinics (CCC), hacked by former
Compiler Forecast: Cloudy with. Cloud Computing for your z/os compilers
Compiler Forecast: Cloudy with a Chance of Savings Cloud Computing for your z/os compilers Speaker Bio Charles Mills is the Chief Development Officer of Cloud Compiling, LLC Mills was the founder of FiresignComputer
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Everything you wanted to know about mainframe security, pen testing and vulnerability scanning.. But were too afraid to ask!
Everything you wanted to know about mainframe Delivering the best in z services, software, hardware and training. security, pen testing and vulnerability scanning.. But were too afraid to ask! World Class,
Introduction to Mainframe (z/os) Network Management
Introduction to Mainframe (z/os) Network Management Monday, August 10, 1:45-2:45 Session 17736 Dean Butler ([email protected]) Agenda What is network management? Why manage the network on z/os? z/os
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Splunk/Ironstream and z/os IT Ops
Copyright 2015 Splunk Inc. Splunk/Ironstream and z/os IT Ops John Reda VP Customer Experience Syncsort Incorporated Disclaimer During the course of this presentaion, we may make forward looking statements
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
Log Management and SIEM Evaluation Checklist
Log Management and SIEM Evaluation Checklist Authors: Frank Bijkersma ( [email protected] ) Vinod Shankar ([email protected]) Published on www.infosecnirvana.com, www.frankbijkersma.com Date:
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 13, Dec. 6, 2010 Auditing Security Audit an independent review and examination
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
z/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
U.S. Department of Education 1998 Electronic Access Conferences
U.S. Department of Education 1998 Electronic Access Conferences 11/9/98 Session 43-1 Session 43 Mainframe Connectivity to Title IV Wide Area Network Session 43-2 Session 43 Mike Cline - NCS Development
Monitoring Microsoft SQL Server Audit Logs with EventTracker The Importance of Consolidation, Correlation, and Detection Enterprise Security Series
Monitoring Microsoft SQL Server Audit Logs with EventTracker The Importance of Consolidation, Correlation, and Detection Enterprise Security Series White Paper Publication Date: Feb 28, 2014 EventTracker
IBM InfoSphere Guardium
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached
TN3270 Security Enhancements
TN3270 Security Enhancements SecureWay Communication Server for OS/390 Copyright IBM Corporation, 1999 1 Support in OS/390 V2.R6 Copyright IBM Corporation, 1999 2 Secure Sockets Layer - What is it? Application
Monitoring Windows Workstations Seven Important Events
Monitoring Windows Workstations Seven Important Events White Paper 8815 Centre Park Drive Publication Date: October 1, 2009 Columbia MD 21045 877.333.1433 ABSTRACT Monitoring event logs from workstations
Analyzing Logs For Security Information Event Management
ZOHO Corp. Analyzing Logs For Security Information Event Management Whitepaper Notice: ManageEngine shall have no liability for errors, omissions or inadequacies in the information contained herein or
GFI Product Manual. Administrator Guide
GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
GFI Product Manual. Administrator Guide
GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
CS z/os Network Security Configuration Assistant GUI
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Network Security Configuration Assistant GUI 1 Security configuration agenda CS z/os configuration GUI overview Network
