General discussion

Locked

The Madman's Pearls Of Wisdom

By f-3873986 ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

5 total posts (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Collapse -

Greets

by f-3873986 In reply to The Madman's Pearls Of Wi ...

Thanks for poking around. I am hoping that this little blog is going to become a useful vehicle and reference for chatting about subjects that I am fond of.

2?:
If questions are asked, I will try to respond, however, no promises are made, and all advice here is considered OPINION. Advice is free, so expect to gt exactly what you've paid for...

ME: I have been involved in IT for 20 years, have worked for some great companies, and some not so great companies. I've filled the role of Sales and Tech Support rep, Field and Bench Technician, Network/Email Admin, Infrastructure Analyst, Security Analyst, Project Manager, and IT Manager.

Chat with you later.
Mark

Collapse -

Desperately Seeking SIM

by f-3873986 In reply to The Madman's Pearls Of Wi ...

A note to any vendors that might be spidering the TR site: GIVE ME A SECURITY INFORMATION MANAGEMENT INTERFACE!!

I am looking for a product that can:
- Capture information from multiple sources (IDS/AV/FW, etc.)
- Provide metrics on compliance with policies
- Provide metrics on compliance with regulations
- Provide metrics on threats
- Provide metrics on vulnerabilities
- Interface with my asset inventory for relevance of metrics.
- Provide graphical representations (dashboards)
- Generate reports (customizable reports!)

Now for the WANTS list:
Real-time would be awesome. Near real-time (5 minutes MAXIMUM delay) will suffice for now.
Web interface for review, reporting, etc.
Out of band for management (no web access!)
Hardened OS appliance, zero or minimal maintenance. (firmware updates and patches ok)
Self defending/healing OS.
If it isn't too much to ask, event correlation is the next logical step, so develop your hearts out in that general direction.

Cheers!
Mark

Collapse -

Desperately Seeking SIM

by apotheon In reply to Desperately Seeking SIM

<p style="text-align: justify">This is a bit of a stretch, because I'm not sure what sort of solution (platform, integration, modularity, et cetera) you're looking for, but: Have you looked at Nitix? A Google search should land you at the virtual doorstep of Net Integration (I think that's the name of the company that markets Nitix). That bit about "self defending/healing OS" in particular made me think of Nitix.</p>

Collapse -

Desperately Seeking SIM

by jamie.hamlin In reply to Desperately Seeking SIM

<p>Hi,</p>
<p>Have a look at the CS-MARS product from Cisco.</p>
<p>It is basically a Linux appliance that will take inputs from any vendor product and can assist you to manage security vulnerabilities and virus outbreaks real-time.</p>
<p>I beleive that the next version of software will produce reports at the push of a button that demonstrate Sarbanes Oxley compliance.</p>
<p>Happy Hunting</p>

Collapse -

Home Security

by f-3873986 In reply to The Madman's Pearls Of Wi ...

Responding to a user post:  Heh heh. _ARE_ you paranoid if they are really after you?<br /><br />The answer is: If you highly value your bandwidth, reputation and data, lock down as much of your computing environment as possible. If you DON'T value your bandwidth, reputation, and data, don't secure anyhting on your network.<br /><br />Wireless networks circumvent the first line of defense that all wired networks put in place. PHYSICAL ACCESS CONTROL. If you can't get to my network, you can't get to my PC which houses my presonal, confidential or valuable data. You also can't as easily destroy my reputation by downloading kiddie porn or other crap while attached to the public network on a connection that I am responsible for. You will have a harder time stealing my identification, because securtiy is applied as needed, and layered as appropriate. (IE: Encryption on the WLAN, Firewall(s) at the primeter, Firewall(s) at the end-points, Routers and ACL's, MAC identification, logging, etc.)<br /><br />Just because it is a home network doesn't decrease its value. Home networks may at some point connect to business networks using VPN. They hold credit card information, personal records and all kinds of other treasures. Understand your risks, threats and vulnerabilities and take action accordingly.<br /><br />Cheers!<br />Mark

Back to After Hours Forum
5 total posts (Page 1 of 1)  

Related Discussions

Related Forums