Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY



Similar documents
RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

Release Notes ArcSight SmartConnector

ArcSight Supports a Wide Range of Security Relevant Products

Symantec Security Information Manager Version 4.7

HawkEye AP Log Adapter List Updated January 2014

HawkEye AP Log Adapter List Updated January 2016

CiscoWorks SIMS(Netforensics)

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

TECHNOLOGY INTEGRATION GUIDE

Supported Devices (Event Log Sources)

List of Supported Systems & Devices

TECHNOLOGY INTEGRATION GUIDE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

Reference Guide. Skybox View Revision: 11

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Secure Your Operations through NOC/SOC Integration

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

Select the right security information and event management solution to automate security and compliance operations.

McAfee SIEM Device Support

How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or

The Cyber Threat Landscape

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Detecting a Hacking Attempt

TIBCO LogLogic Unity Quick Reference Guide Concepts

Joshua Beeman University Information Security Officer October 17, 2011

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices

SENTINEL MANAGEMENT & MONITORING

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

Modular Network Security. Tyler Carter, McAfee Network Security

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Virtualization Journey Stages

IBM InfoSphere Guardium

Total Protection for Enterprise-Advanced

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

National Information Assurance Partnership

M A R K E T A N A L Y S I S

Research, recommend, and assist in implementing identity automation solution.

Supported Data & Log Sources

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Best Practices for Mitigating Advanced Persistent Threats

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

IBM Security QRadar Version Vulnerability Assessment Configuration Guide IBM

Next-Generation Firewalls: CEO, Miercom

SANS Top 20 Critical Controls for Effective Cyber Defense

A Survey of Intrusion Detection Systems

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

BeyondInsight Version 5.6 New and Updated Features

Supported Log File Formats

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

JUNIPER NETWORKS STRM TECHNICAL NOTE

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

Information Technology Policy

SourceFireNext-Generation IPS

Peter Dulay, CISSP Senior Architect, Security BU

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

PCI DSS. Get Compliant, Stay Compliant Seminar

Utility Modernization Cyber Security City of Glendale, California

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No

TCS Managed Security Services

State of the Market for Security Information Event Management and Log File Management Solutions

Configuration Audit & Control

Privileged - Super Users out of Control

English Requirement: You must be able to understand and be understood in English.

Managing Vulnerability Assessment

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Required Software Product List

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Tools. Intrusion Detection Systems. Information Assurance Tools Report. Sixth Edition September 25, Distribution Statement A E XC E L L E NC E

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Symantec Protection Suite SMB Family: Comparison Matrices and Migration. Presentation Identifier Goes Here 1

MANAGED SERVICES. Remote Monitoring. Contact US: millenniuminc.com

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Chapter 9 Firewalls and Intrusion Prevention Systems

Full version is >>> HERE <<<

Market Guide for Network Sandboxing

Chapter 1 The Principles of Auditing 1

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Splunk and the SANS Top 20 Critical Security Controls. Mapping Splunk Software to the SANS Top 20 CSC Version 4.1

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

BYOD: Leveraging Technology Solutions to Alleviate Security and Privacy Concerns

IBM Security QRadar SIEM Version MR1. Log Sources User Guide

SNOW LICENSE MANAGER (7.X)... 3

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

VMware Integrated Partner Solutions for Networking and Security

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

Payment Card Industry (PCI) Data Security Standard

Extreme Networks Security Vulnerability Assessment Configuration Guide

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Citadel Security Software Inc.

What s new with Operations Management & Partner MPs

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

McAfee Data Loss Prevention Endpoint

Juniper Secure Analytics

John Smith Prattville, AL

Transcription:

Connectors Overview Our library of out-of-the-box Connectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source types, from network and security devices to databases and enterprise applications. ANTI-VIRUS/ANTI-SPAM F-Secure Anti-Virus Kaspersky Anti-Virus McAfee VirusScan Enterprise Sophos Sybari Antigen for Microsoft Exchange Symantec Endpoint Protection Manager (SEPM) DB SEP 12 Symantec Mail Security for Microsoft Exchange Trend Micro (TM) OfficeScan (Control Manager and TM Control Manager Database [DB]) Multiple DB (Control Manager) APPLICATIONS IBM WebSphere it-cube agilesi SAP Oracle WebLogic Server (BEA) SAP enterprise resource planning (ERP) Microsoft SharePoint Server DBD DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY Trustwave Application Security DbProtect IBM InfoSphere Guardium Imperva SecureSphere Oracle (Secerno DataWall) McAfee Sentrigo HedgeHog (Enterprise and vpatch) APPLICATION SECURITY Arxan GuardIT Bit9 Parity CA Layer 7 SecureSpan/CloudSpan Gateway McAfee Application Control (Solidcore) RSA Silver Tail Systems Forensics CLOUD Box CloudPassage Halo FlexConnector for REST Zscaler Nanolog Streaming Service (NSS) CONTENT SECURITY Aladdin esafe Gateway Barracuda (NetContinuum Web Firewall) McAfee Email and Web Security Appliance McAfee Web Gateway Proofpoint Enterprise Protection and Enterprise Privacy Puresight Content Filter Secure Computing Webwasher Trend Micro Control Manager Trend Micro InterScan Messaging Security (Control Manager) Trend Micro InterScan Web Security (Control Manager) DATA LEAK PREVENTION (DLP) Fidelis XPS GTB Inspector McAfee Host Data Loss Prevention Endpoints (HDLP) Symantec DLP (Vontu) Verdasys Digital Guardian FOLLOW US: @GenDyn_CCS General Dynamics Commercial Cyber Services www.gdit.com/commercialcyber For information contact us at: GDCCS_sales@gdit.com

DATA SECURITY CyberArk Inter-Business Vault CyberArk Sensitive Document Vault HP Atalla Network Security Processor (NSP) Ingrian Vormetric Data Security Manager Vormetric Data Firewall JBoss Security Auditing File 7.1 DATABASE IBM DB2 IBM DB2 UDB Audit File, version 10 IBM DB2 UDB Audit File, Multiple Instance Microsoft SQL Oracle Audit DB Oracle Audit Vault Oracle Audit Syslog, version 11gR2 Oracle Audit XML11gR2 Sybase Adaptive Server Enterprise CLINICAL/HEALTHCARE APPLICATIONS FairWarning FIREWALL Check Point FW-1 Cisco PIX Firewall Cisco PIX/ASA Syslog, version 8.5, 8.6 F5 BIG-IP Application Security Manager Juniper Networks (Altor Networks Virtual Firewall) Juniper Network Security Manager (NetScreen) Juniper Network Security Manager Syslog, version 2011.4 Juniper Networks Firewall and VPN Lucent Managed Firewall McAfee Desktop Firewall Secure Computing Gauntlet Firewall/VPN INTRUSION DETECTION SYSTEM AND INTRUSION PREVENTION SYSTEM - HOST BASED IBM BlackICE Server Protection (IBM Security SiteProtector System) NFR Security HID Symantec Critical System Protection Database Tripwire Manager Tripwire Enterprise IDS/IPS NETWORK-BASED Broadweb NetKeeper Bro IDS Bro IDS NG File Cisco IPS Sensor Cisco Secure IDS Cisco WIPS SNMP CounterSnipe Enterasys Dragon HP TippingPoint Security Management System (SMS) IBM RealSecure Server Sensor IBM RealSecure Workgroup Manager IBM Proventia IPS Appliance (SiteProtector) Juniper Networks IDP (NetScreen) McAfee Network Security Manager (Intru Shield) NFR Central Management Server NFR Security NID NitroSecurity IPS PacketAlarm IDS Radware DefensePro Snort Sourcefire Intrusion Sensor Sourcefire Defense Center management console Sourcefire Defense Center estreamer, version 5.0.2, 5.1 Sourcefire Real-time Network Awareness (RNA) Sensor Top Layer Attack Mitigator HONEYPOT HoneyD 2

IDM, IAM, AND IDENTITY SECURITY ActivCard AAA Server DB RSA Aveksa BeyondTrust PowerBroker Cisco Secure Access Control Server (ACS) CyberArk Privileged Identity Management (PIM) Suite CyberArk Privileged Session Management (PSM) Suite FoxT ServerControl IBM Tivoli Access Manager Juniper Steel-Belted Radius (SBR) Lieberman Software Enterprise Random Password Manager (ERPM) Microsoft Active Directory Microsoft Forefront Microsoft Forefront DB Microsoft Network Policy Server Novell Nsure Audit ObserveIT Enterprise Oracle Sun ONE Directory Server VMware PacketMotion PacketSentry Ping Identity PingFederate Quest ChangeAuditor DB RSA Authentication Manager RSA Access Manager (ClearTrust) Secure Computing SafeWord PremierAccess Securonix SpectorSoft Spector 360 Export Service Thycotic Secret Server INTEGRATED SECURITY Barracuda Spam Firewall Cisco ASA 5500 Fortinet FortiGate HP TippingPoint Next-Generation Firewall (NGFW) Palo Alto Networks PAN-OS Secure Computing Sidewinder SonicWALL Stonesoft StoneGate IT OPERATIONS HP Operations Manager (OM and OMi) HP OpenView Operations (OVO) LOG CONSOLIDATION AND ANALYSIS Cisco Security Monitoring, Analysis, and Response System (MARS) Enterprise IT Security SF-RiskSaver LOGbinder SP Quest InTrust (fka Aelita Event Manager [AEM]) Qualys QualysGuard File, version 7.1 MAIL FILTERING Cisco IronPort Email Security Appliance McAfee Email Gateway (Secure Computing IronMail) McAfee Security for Email Servers (GroupShield) MessageGate Symantec Messaging Gateway (Mail Security 8200 Series) MAINFRAME CA Top Secret Enterprise IT Security SF-Sherlock Enterprise IT Security SF-NoEvasion IBM OS/390 (NVAS) IBM OS/390 (SDSF) Helpsystems PowerTech Interact Type80 SMA_RT for RACF Type80 SMA_RT for CA Top Secret IBM AS/400 Mail server IBM Lotus Notes Domino Enterprise Server Microsoft Exchange Microsoft Exchange PowerShell Microsoft Forefront for Exchange Server Microsoft Forefront Protection Server Management Console DB 3

MALWARE DETECTION AhnLab Malware Defense System (MDS) Damballa CSP Damballa Failsafe FireEye Malware Protection System (MPS) FireEye Mandiant Intelligent Response Guidance EnCase HBGary Active Defense Lastline Enterprise Proofpoint NetCitadel ThreatOptics TaaSera TaaS NetAnalyzer Triumfant Resolution Manager NETWORK ACCESS CONTROL ForeScout CounterACT Mirage Networks CounterPoint Portnox Portnox NETWORK BEHAVIOR ANOMALY Arbor Networks Peakflow Lancope StealthWatch Mazu Profiler Qosmos DeepFlow Security NETWORK FORENSICS Narus nsystem NIKSUN NetDetector RSA NetWitness AccessData CIRT NETWORK MANAGEMENT CiscoWorks Cisco Wireless LAN Controller Syslog HP Network Node Manager i SNMP Lumeta Enterprise Situational Intelligence (ESI) Lumeta IPsonar NETWORK MONITORING ISC DHCP ISC BIND Microsoft Operations Manager DB (MOM) Microsoft System Center Operations Manager (SCOM) DB Microsoft System Center Configuration Manager DB Microsoft DHCP Microsoft DNS Microsoft WINS NETWORK TRAFFIC ANALYSIS Cisco NetFlow/Flexible NetFlow NetScout ngenius FireEye npulse Hammerhead QoSient Argus InMon sflow Blue Coat Solera Networks DeepSee TCPdump NETWORK TRAFFIC MANAGEMENT Cisco Distributed Director for Cisco 4500 Bro IDS OPERATING SYSTEMS IBM AIX Operating System HP OpenVMS HP-UX Operating System HP-UX Syslog, version 11i v3 Microsoft Windows 7/NT /2000/2003/XP/2008 Server/Vista Microsoft Windows Event Log unified, SQL Server 2012 for SQL Server audit Red Hat Linux Snare for Microsoft Windows Solaris Basic Security module (BSM) UNIX SaberNet NTSyslog HP NonStop servers (XYPRO Merged Audit) 4

PACKET CAPTURE Ixia Anue Net Tool Optimizer Physical systems/security RedCloud (PlaSec) POLICY MANAGEMENT McAfee Policy Auditor NetIQ Security Manager Solsoft Policy Server ROUTER Cisco Router Juniper Router (JUNOS) HP H3C Comware Platform STORAGE NetApp filer (FAS) EMC Celerra SECURITY MANAGEMENT Enterasys Dragon Server IBM SiteProtector isight ThreatScape API Lookingglass ScoutVision McAfee epolicy Orchestrator (epo) McAfee Network Security Manager DB McAfee Rogue System Detection (via epo) Microsoft Audit Collection Services Network Vulnerability Advisor Symantec Enterprise Security Manager (ESM) SWITCH Cisco Catalyst Cisco CSS 11500 Series Content Services Switches Cisco NX-OS Foundry Networks BigIron HP Ethernet switch HP Networking Syslog VIRTUALIZATION CounterTack Event Horizon VMware ESX/ESXi Server VMware Virtual Center VPN Check Point VPN-1 Cisco VPN Concentrator Citrix Access Gateway Juniper/NetScreen (Neoteris) SSL VPN Nortel Contivity Extranet Switch VULNERABILITY ASSESSMENT eeye REM Security Management Console eeye Retina Network Security Scanner Harris STAT Scanner IBM Internet Scanner McAfee Vulnerability Manager (FoundScan) ncircle IP360 Device Profiler ncircle IP360 Threat Monitor Nmap Open Vulnerability and Assessment Language (OVAL) Standard QualysGuard Rapid 7 Nexpose Tenable Nessus SAINT Vulnerability Scanner WEB FILTERING Cisco IronPort Web Security Appliance Websense Web Security Suite WEB SERVER Apache Microsoft Internet Information Services (IIS) Sun ONE WIRELESS AirDefense Guard AirMagnet Enterprise AirTight SpectraGuard Aruba WLAN Mobility Controller Cisco Mobility Services Engine 5