Noviembre 2018
 << < > >>


¿Quién está en línea?

Miembro: 0
Visitante: 1

rss Sindicación



Deals Increase With Need For More Network Security

Security Onion tutorial: Analyze network traffic using Security Onion

By the end of 2014 that number is expected to swell to 35 percent. But researching and developing new security features is expensive, so rather than building organically most vendors of network security will opt for acquisitions of small and medium-sized network security companies, said Frost and Sullivan analyst Ramirez. According to Gartner, large network equipment providers and Internet Technology companies will also be looking for acquisitions to add network security to their portfolios as a way of keeping up with Cisco Systems in the infrastructure market. Deutsche Bank analyst Brian Modoff wrote in a recent research report that the roughly $6 billion security equipment market was still very fragmented and in flux, creating an opportunity for IT vendors. Cisco has the largest share in the network security market with around 30 percent, followed by Israel's Check Point Software Technologies and Juniper Networks. California-based Palo Alto Networks, which is poised to go public this year, is growing rapidly. Consolidation may be hampered, however, by the cost of acquisitions paid for by cash held overseas. "What makes me hesitant is the amount of cash companies have outside the U.S.," said Zeus Kerravala, founder of ZK Research.
For the original version including any supplementary images or video, visit

Tenables mandate is to protect its clients 24/7, so we realize that our solutions capabilities need to be as dynamic as the current threat landscape Tenables advanced analytics have allowed us to extend SecurityCenter as both a solution for security assessments and one for data center maintenance and operations. We are looking forward to the security apps in 4.7, said Russell Butturini, Senior Enterprise Security Architect at Healthways, a global disease management and well-being provider and ranked #8 on Information Week 500. These analytics are directly accessible from within the SecurityCenter console and offer extensive visibility for multiple teams network, security, operations, and compliance. The apps dramatically cut time and resources required to identify and respond to vulnerabilities, advanced threats, and compliance violations without the need to write complex scripts or rely on 3rd party tools. Key capabilities of SecurityCenter 4.7 include: New and simpler framework for creating and updating dashboards, dynamic asset lists, and reports. Extended mobile device coverage to track mobile device types, users, and vulnerabilities through active, passive scanning and MDM integration. Remediation report summarizing vulnerabilities, most effective remediation, as well as time to remediate. Support for SCAP 1.2.
For the original version including any supplementary images or video, visit

Tenable Launches Security ?App Store? for SecurityCenter 4.7

View Press Release

By using Security Onion , a free and open source collection of network monitoring tools from Doug Burks. In this SearchSecurity screencast , Keith Barker, a Certified Information Systems Security Professional (CISSP) and trainer for CBT Nuggets LLC, provides a Security Onion tutorial, demonstrating how even the most budget-conscious organizations can analyze network traffic using the likes of Squil, Snorby and ELSA. First, Keith reviews how to set up Security Onion so it can receive all network traffic. Once in place, he uses Squil to delve into his own network packet data, including source ports, destination ports, IP addresses and other details. Squil can also be used to do reverse DNS lookups, track down information regarding the owners of IP address blocks and gain more insight into conversations happening on the network. Keith then runs through the capabilities of Snorby, a Web application that operates with some of the most popular intrusion detection systems. Snorby can provide a high-level overview of network security events based on severity, and provide information on any signatures that were triggered.
For the original version including any supplementary images or video, visit

Admin · 34 vistas · Escribir un comentario

Vínculo permanente hacia el artículo completo


Este artículo no tiene Comentario por el momento .....

Escribir un comentario

Estatuto de los nuevos comentarios: Publicado

Se mostrará tu URL

Por favor introduce el código contenido en las imágenes.

Texto del comentario

   (Salvar el nombre, el mail y la URL en los cookies)