- IF-MAP Research Projects and Open Source Software
|
|
|
- Clarence Horton
- 10 years ago
- Views:
Transcription
1 - IF-MAP Research Projects and Open Source Software Josef von Helden Trust@FHH Research Group Hochschule Hannover University of Applied Sciences and Arts June 26, 2013 Trust@FHH J. von Helden (Trust@FHH) Trust@FHH / 25
2 Team Prof. Dr. Josef von Helden 1 (2,3?) research associates 2 (-4) student research assistant Research Field Trusted Computing Network & Mobile Security Research Projects TNC@FHH, IRON, ironcontrol tnac, ESUKOM, VisITMeta, (SIMU) Website: (new URL!) J. von Helden (Trust@FHH) Trust@FHH / 25
3 Agenda 1 Research Projects At A Glance ESUKOM VisITMeta (SIMU) 2 Latest News On iron* Open Source Software General information ifmapj irond irondetect ironvas irondemo VisITMeta ironcontrol 3 Live Demo J. von Helden (Trust@FHH) Trust@FHH / 25
4 Research Projects At A Glance J. von Helden (Trust@FHH) Trust@FHH / 25
5 ESUKOM General information Started 10/ ended 09/2012 Consortium 2 research institutions (FHH, Fraunhofer SIT) 3 german companies + several international associate partners Funded by German Federal Ministry of Education and Research J. von Helden (Trust@FHH) Trust@FHH / 25
6 Project Goals... to develop a real-time security solution for enterprise networks that works based upon the correlation of metadata. Motivation Growing adoption of mobil devices (smartphones) Smartphones are special: always-on, apps, sensors, constrained resources... Impact on enterprise security? Idea Develop a network-based security system for monitoring smartphones Gain benefits from collaboration of already deployed security tools IF-MAP as technological basis for sharing security related metadata J. von Helden (Trust@FHH) Trust@FHH / 25
7 ESUKOM architecture J. von Helden / 25
8 Correlation Engine - Abstract Model J. von Helden (Trust@FHH) Trust@FHH / 25
9 Correlation Engine - irondetect Overview IF-MAP 2.0 client Context-related Pattern Matching and Anomaly Detection Decision making based on simple policies: if (a and b and c) do x Approach ESUKOM tools publish vendor-specific metadata for smartphones - so called features irondetect holds appropriate subscriptions (one for each smartphone that gains network access), continously polls for updates of features J. von Helden (Trust@FHH) Trust@FHH / 25
10 Vendor-specific Metadata I Why not using standard metadata? Context-related detection is based on context-parameters (time, location, other-devices,...) Context-parameters are needed on a per feature basis (i.e. per metadata) Standard metadata should not be extended by vendor-specific attributes Approach ESUKOM specific metadata for features Abuse of identity identifiers to model feature hierarchies J. von Helden (Trust@FHH) Trust@FHH / 25
11 Vendor-specific Metadata II device "device_name" device-category identity "cat_a" subcategory-of subcategory-of identity "cat_a.cat_b:0" feature "f1" identity "cat_a.cat_b:1" subcategory-of identity "cat_a.cat_b.cat_c" feature "f1" feature "f1" feature "f1" feature "f2" feature "f3" J. von Helden / 25
12 VisITMeta VisITMeta Started 04/ ends 03/2015 Funded by German Federal Ministry of Education and Research Focused on visualization of IF-MAP metadata Based on the experiences gained with irongui Will provide features like: View of history Animation of changes within the metadata Support for large graphs with methods for easy navigation J. von Helden (Trust@FHH) Trust@FHH / 25
13 SIMU SIMU SIEM for SMEs expected to be started 10/2013 (duration: 2 years) Funded by German Federal Ministry of Education and Research Consortium: same as ESUKOM Project goals: easy integration in IT infrastructures of SMEs easy traceability of security relevant network events low costs for deployment, operating, maintenance J. von Helden (Trust@FHH) Trust@FHH / 25
14 SIMU architecture J. von Helden / 25
15 Latest News On iron* Open Source Software J. von Helden / 25
16 General information Move to Github Software by is now available at Github ( Future software will only be made available via Github All projects now use the same build process (Maven) J. von Helden / 25
17 ifmapj About Lightweight IF-MAP client library written in Java Works on a wide range of platforms, including Android Latest progress Version released with experimental IF-MAP 2.1 support J. von Helden (Trust@FHH) Trust@FHH / 25
18 irond About Open-source IF-MAP 2.0 server Written in Java Latest Progress Release is TNC Certified as being IF-MAP 2.0 compliant Release has experimental support for IF-MAP 2.1 Prototype of MAP Content Authorization implementation will be available soon (as a branch) J. von Helden (Trust@FHH) Trust@FHH / 25
19 irondetect About IF-MAP 2.0 client Written in Java, uses ifmapj Features Correlates on IF-MAP metadata Supports both signature matching and anomaly detection Uses vendor specific metadata Is controlled via user-defined policies J. von Helden / 25
20 ironvas About IF-MAP 2.0 client Integrates vulnerability scanner OpenVAS into a MAP environment Provides Publisher and Subscriber functionality Written in Java and Scala, uses ifmapj Subscriber ironvas subscribes to request-for-investigation metadata Creates scan config, targets and tasks for new devices in OpenVAS via OMP Publisher ironvas publishes vulnerability reports from OpenVAS to a MAPS Each vulnerability is published as event metadata element, with entries like CVE information, significance,... J. von Helden (Trust@FHH) Trust@FHH / 25
21 irondemo About Set of scripts to build a demo environment (from scratch) with all iron software components Also available via Github Comes with some example scenarios (Will be updated and extended) Was used to create the following live demo J. von Helden (Trust@FHH) Trust@FHH / 25
22 VisITMeta Latest progress Will be released as a prototype in June/July Prototype supports recording a history of metadata on a MAPS Also supports separation between recording and visualizing via a REST-like interface Uses highlighting to show changes in the data J. von Helden (Trust@FHH) Trust@FHH / 25
23 ironcontrol About IF-MAP 2.0 client for the Android platform Written in Java, uses ifmapj administering / controlling IF-MAP from your smartphone graphs Features connect to different MAP server publish, search, subscribe (incl. storing lists) saving poll results notification (vibration / sound) on poll results J. von Helden (Trust@FHH) Trust@FHH / 25
24 Live Demo J. von Helden / 25
25 Role Component via Script Access Point Android Feature Collector ironcontrol DHCP OpenVAS PDP Correlation Engine MAPS irondhcp ironvas irond Figure: Demo environment J. von Helden / 25
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System Prof. Dr. Kai-Oliver Detken 1, Dr. Dirk Scheuermann 2, Bastian Hellmann 3 1 DECOIT GmbH, Fahrenheitstraße 9, 28359 Bremen,
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
SIEM approach for a higher level of IT security in enterprise networks
The 8 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 24-26 September 2015, Warsaw, Poland SIEM approach for a higher level
A viable SIEM approach for Android
IDAACS 2015, 24.-26.09.15 A viable SIEM approach for Android Kai-Oliver Detken Evren Eren Markus Schölzel DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen https://www.decoit.de [email protected] Outline Introduction
Security Orchestration with IF-MAP
Security Orchestration with IF-MAP Gary Holland, Lumeta/IMRI 2 November 2011 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Trusted Network Connect Explanation of IF-MAP
A viable SIEM approach for Android
The 8 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 24-26 September 2015, Warsaw, Poland A viable SIEM approach for Android
How To Create An Integrated Visualization For A Network Security System (For A Free Download)
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources Bastian Hellmann Trust@HsH Research Group University of Applied Sciences and Arts in Hanover July 13th 2015 GraMSec
TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group
TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?
IF-MAP Overview. Jan Ursi Technical Director EMEA. 2009 Infoblox Inc. All Rights Reserved.
IF-MAP Overview Jan Ursi Technical Director EMEA IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol standard published (free) by the Trusted Computing Group Available
Network Access Control (NAC) and Network Security Standards
Network Control (NAC) and Network Security Standards Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #1 Agenda Goals of NAC Standards What
IF-MAP Use Cases: Real-Time CMDB, and More
IF-MAP Use Cases: Real-Time CMDB, and More Richard Kagan EVP / General Manager Orchestration Systems Business Unit IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol
How To Develop An Open Play Context Framework For Android (For Android)
Dynamix: An Open Plug-and-Play Context Framework for Android Darren Carlson and Andreas Schrader Ambient Computing Group / Institute of Telematics University of Lübeck, Germany www.ambient.uni-luebeck.de
OPC UA App development for Android
OPC UA App development for Android Ismo Leszczynski Master s Thesis presentation 13.11.2015 Contents 1. Introduction 2. Targets 3. OPC Unified Architecture 4. Android Operating System 5. App development
Integrating Mobile apps with your Enterprise
Integrating Mobile apps with your Enterprise Jonathan Marshall [email protected] @jmarshall1 Agenda Mobile apps and the enterprise Integrating mobile apps with Enterprise Applications Mobile apps and
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Thank you for joining today s technical webinar
Overview of Primavera Unifier & Contract Management Don McNatty, PSP Jonathan McNatty, PSP August 28, 2013 2013 Technical Webinar Series Thank you for joining today s technical webinar Mute all call in
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
SharePoint Training DVD Videos
SharePoint Training DVD Videos SharePoint 2013 Administration Intended for: Prerequisites: Hours: Enterprise Content Managers / Administrators Planners / Project managers None 16 hours of video + 18 hours
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
Fundamentals of LoadRunner 9.0 (2 Days)
Fundamentals of LoadRunner 9.0 (2 Days) Quality assurance engineers New users of LoadRunner who need to load test their applications and/or executives who will be involved in any part of load testing.
ESUKOM: Smartphone Security for Enterprise
ESUKOM: Smartphone Security for Enterprise Networks Ingo Bente 1 Josef von Helden 1 Bastian Hellmann 1 Joerg Vieweg 1 Kai-Oliver Detken 2 1 Trust@FHH Research Group Fachhochschule Hannover Ricklinger Stadtweg
Industrie 4.0 Engineering of IoT Applications for Indus trial Production
Industrie 4.0 Engineering of IoT Applications for Indus trial Production Internet of Things e Big Data Summit Milano, 11 June 2015 Dr.-Ing. Thomas Usländer Fraunhofer IOSB, Germany Josef von Fraunhofer
Collaborative Open Market to Place Objects at your Service
Collaborative Open Market to Place Objects at your Service D6.2.1 Developer SDK First Version D6.2.2 Developer IDE First Version D6.3.1 Cross-platform GUI for end-user Fist Version Project Acronym Project
Bringing Continuous Security to the Global Enterprise
Bringing Continuous to the Global Enterprise Asset Discovery Network Web App Compliance Monitoring Threat Protection The Most Advanced Platform 3+ Billion IP Scans/Audits a Year 1+ Trillion Events The
Adding ObserveIT video audit logs to your SIEM
PRODUCT FACT SHEET Adding ObserveIT video audit logs to your SIEM At a Glance Adding ObserveIT s user activity video logs and user activity text logs to your SIEM or Log Analysis platform gives you all
Mobile App Infrastructure for Cross-Platform Deployment (N11-38)
Mobile App Infrastructure for Cross-Platform Deployment (N11-38) Contents Introduction... 2 Background... 2 Goals and objectives... 3 Technical approaches and frameworks... 4 Key outcomes... 5 Project
SAP RAPID DEPLOYMENT FOR APPLICATION LIFECYCLE MANAGEMENT WAVE TEST MANAGEMENT INFORMATION SHEET FOR SERVICE DELIVERY
SAP RAPID DEPLOYMENT FOR APPLICATION LIFECYCLE MANAGEMENT WAVE TEST MANAGEMENT INFORMATION SHEET FOR SERVICE DELIVERY In the context of application lifecycle management testing is a significant phase to
MOC 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions
MOC 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Course Overview This course provides students with the knowledge and skills to work with the server-side and client-side object models,
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions
DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions Summary Duration Vendor Audience 5 Days Microsoft Developer Published Level Technology 21 November 2013 300 Microsoft SharePoint
Securing Digital Processes
Securing Digital Processes Carsten Rudolph Carsten Rudolph and Nicolai Kuntze Fraunhofer-Institut for Secure Information Technology Rheinstrasse 75, 64295 Darmstadt, Germany E-Mail: [email protected]
Contextual Security with IF-MAP
, pp.427-438 http://dx.doi.org/10.14257/ijsia.2014.8.5.37 Contextual Security with IF-MAP Abdelmajid Lakbabi, Ghizlane Orhanou and Said El Hajji, Laboratory of Mathematics, Computing and Applications,
PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS
www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,
SOFTWARE TESTING TRAINING COURSES CONTENTS
SOFTWARE TESTING TRAINING COURSES CONTENTS 1 Unit I Description Objectves Duration Contents Software Testing Fundamentals and Best Practices This training course will give basic understanding on software
Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
Comparing Application Security Tools
Comparing Application Security Tools Defcon 15-8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction
Oracle WebLogic Server: Remote Monitoring and Management
October 13, 2015 Oracle WebLogic Server: Remote Monitoring and Management Raastech, Inc. 2201 Cooperative Way, Suite 600 Herndon, VA 20171 +1-703-884-2223 [email protected] About Us Ahmed Aboulnaga @Ahmed_Aboulnaga
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
Domus, the connected home
Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,
Cloud & Datacenter Monitoring with System Center Operations Manager
Page 1 of 5 Overview This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations. Using hands-on labs, students learn the following: How to architect
UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern
UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern Dez 19, 2011 Outline Introduction Related Work Mikrokopter
WebEOC Product Suite Comparison
WebEC Product Suite Comparison WebEC is a robust incident management tool with offerings available to support organizations of every size. Use the chart below to compare availability of user functions,
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
50 shades of Siebel mobile
50 shades of Siebel mobile Markus Schneeweis ec4u expert consulting AG 1 Agenda Start Part 1 The disruption Part 2 What means mobile? Part 3 Siebel Mobile clash of the generations? Part 4 Our offer 7 Key
In the case of the online marketing of Jaro Development Corporation, it
Chapter 2 THEORETICAL FRAMEWORK 2.1 Introduction Information System is processing of information received and transmitted to produce an efficient and effective process. One of the most typical information
Meister Going Beyond Maven
Meister Going Beyond Maven A technical whitepaper comparing OpenMake Meister and Apache Maven OpenMake Software 312.440.9545 800.359.8049 Winners of the 2009 Jolt Award Introduction There are many similarities
Using Smartphones to Detect Car Accidents and Provide Situational Awareness to First Responders
Using Smartphones to Detect Car Accidents and Provide Situational Awareness to First Responders Christopher Thompson [email protected] Institute for Software Integrated Systems Vanderbilt University
Microsoft s Team Foundation Server (TFS) Canute Magalhaes Richland County (IT) SYSTEMS ANALYST / PROJECT LEAD 1
Microsoft s Team Foundation Server (TFS) Canute Magalhaes Richland County (IT) SYSTEMS ANALYST / PROJECT LEAD 1 Topics for this Presentation Why Richland County IT - Business Systems Division uses Team
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Building Web-based Infrastructures for Smart Meters
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
Collaborating with External Users
Collaborating with External Users Peter Carson March 10, 2015 Gold Sponsor Silver Sponsors Peter Carson President, Envision IT SharePoint MVP Virtual Technical Specialist, Microsoft Canada [email protected]
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
VoIP Fraud and Misuse
DFN Tagung 15.10.2013 VoIP Fraud and Misuse Detection and Mitigation Prof. Dr.-Ing. Erwin P. Rathgeb Dirk Hoffstadt, M.Sc. Networking Technology Group Institute for Experimental Mathematics & Institute
Extreme Networks: A SOLUTION WHITE PAPER
Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview
QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)
1 Fortinet - FCNSA Fortinet Certified Network Security Administrator QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.) A. Firewall
Open Source SCA The Apache Tuscany Project
Open Source SCA The Apache Tuscany Project Jean-Sebastien Delfino IBM Burlingame Lab Jean-Sebastien Delfino Open Source SCA The Apache Tuscany Project Page 1 Agenda Tuscany, SCA, SDO and DAS Tuscany in
Management of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
strongswan TNC Activities Update
strongswan TNC Activities Update TCG Members Meeting June 2013 Dublin Prof. Andreas Steffen Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil [email protected]
Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität
Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Dr. Jens Heider Head of Department Testlab Mobile Security Amt für Wirtschaft und Stadtentwicklung,
PCI Vulnerability Validation Report
Friday, March 9, 013 PCI Vulnerability Validation Report Introduction This report shows the results of a vulnerability validation tests conducted by CORE Impact Professional Professional in support of
Trusted Network Connect (TNC)
Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel
To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS
W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the
ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: [email protected],
Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle
Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle Safe Harbor Statement The following is intended to outline our general
MOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager
MOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager Course Overview This course provides students with the knowledge and skills to deploy and configure System Center 2012
NEC s UC for Enterprise (UCE) in conjunction with the
Lab Testing Summary Report May 2011 Report SR110219 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: NEC UCE system transfers seamlessly between a variety of endpoints
Licensing Guide BES12. Version 12.1
Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open
Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents
Deploying Management and Security Agents to Mobile Devices John Engels Principal Product Manager Symantec Scott Jareo Field Enablement Engineering Symantec Agenda 1 Symantec MDM Agent Options 2 Mobile
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
Amazon Kinesis and Apache Storm
Amazon Kinesis and Apache Storm Building a Real-Time Sliding-Window Dashboard over Streaming Data Rahul Bhartia October 2014 Contents Contents Abstract Introduction Reference Architecture Amazon Kinesis
What is new for HP LoadRunner and Performance Center 11.52
What is new for HP LoadRunner and Performance Center 11.52 Version 11.52 Silvia Siqueira and Shane Evans How long do you wait for your mobile app to respond? Application performance is essential for business
ExtraHop and AppDynamics Deployment Guide
ExtraHop and AppDynamics Deployment Guide This guide describes how to use ExtraHop and AppDynamics to provide real-time, per-user transaction tracing across the entire application delivery chain. ExtraHop
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Grab Your Tablet, Because You re Gonna Build A Mobile Apex App in One Hour!
Grab Your Tablet, Because You re Gonna Build A Mobile Apex App in One Hour! Table of Contents Overview 1 Native or Web-Based App? 1 jquery Mobile 2 Benefits 2 Advantages 2 Disadvantages 3 Oracle Application
Compare versions with Maximizer CRM 12: Summer 2013
Compare versions with Maximizer CRM 12: Summer Group and Enterprise Editions The Summer release of 12 continues to build on the theme of enhanced performance, usability and productivity while maintaining
Leveraging Best Practices for SolarWinds IP Address Manager
Leveraging Best Practices for SolarWinds IP Address Manager Share: Leveraging Best Practices for SolarWinds IPAM SolarWinds IP Address Manager (IPAM) is a comprehensive IP address management solution that
4 SCS Deployment Infrastructure on Cloud Infrastructures
4 SCS Deployment Infrastructure on Cloud Infrastructures We defined the deployment process as a set of inter-related activities to make a piece of software ready to use. To get an overview of what this
Case Study : 3 different hadoop cluster deployments
Case Study : 3 different hadoop cluster deployments Lee moon soo [email protected] HDFS as a Storage Last 4 years, our HDFS clusters, stored Customer 1500 TB+ data safely served 375,000 TB+ data to customer
Server Virtualization with Windows Server Hyper-V and System Center
Course 20409B: Server Virtualization with Windows Server Hyper-V and System Center Course Details Course Outline Module 1: Evaluating the Environment for Virtualization This module provides an overview
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS
SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS Akash Chandrashekar Senior Solution Architect, Red Hat Lee Kinser Solution Architect, Red Hat Jack Daniel Technical Product Manager, Tenable
MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE
MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE OWASP AppSec USA 2011 Conference (@appsecusa / hashtag: #appsecusa) Srini Penchikala (@srinip) 09.23.11 GOALS AND SCOPE Goals: Messaging security
