incident

Review: Tenable Security Center

Review: Tenable Security Center

The Tenable Security Center has massive capability wrapped in a single, easy-to-navigate interface. While the overall use of the application is fairly intuitive, once users explore more deeply, they may find that it becomes complex and intricate. This allows for great flexibility, but also requires some time of using the product and learning how to maximize its capability for the specific environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: TriGeo SIM

Review: TriGeo SIM

From the time it is plugged in, all the way through day-to-day management, TriGeo SIM is simple to use. The appliance comes with many rule sets already preconfigured for most security situations, while setting rules for specific environments is made easy by the Rule Builder. This tool uses different modules with rule parts that you just drag and drop into the right place and the rule is created. Filters also are easy to configure using the same process. The main console interface is simple and intuitive to navigate as well.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: SEM3210

Review: SEM3210

High Tower pre-configures all the equipment before it is shipped to the end-user, so when the appliance arrives there are just a few simple steps to complete before it is online and ready to go. We found this product to be quite simple to use, thanks to the intuitive user interface that includes an easy-to-read dashboard-type console. We were impressed by the clean look of all parts of the console. This product displays a lot of vital information in one place in a clear manner.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 11 2006 12:00AM Security
Review: Enterprise Security Analyzer

Review: Enterprise Security Analyzer

Although this program is simple to use, we found it took a little time to work with set-up and configuration. Set-up is guided by the main set-up wizard, which guides the user through installation and a bit of initial configuration. Once the main install is completed, there are follow-up steps of creating SSL certificates for IIS and possibly many other loose ends, depending on the environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 1 2006 12:00AM Security
Review: NetIQ Security Manager

Review: NetIQ Security Manager

In our experience, the implementation of this product is no walk in the park. The Security Manager is a small part of a much larger complete security solution by NetIQ. Deployment of this product is massive, with dozens of pre-install steps to be completed on each of the different machines necessary for full deployment. This includes configuration of a database server, a log database computer and a central computer.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 1 2006 12:00AM Security
Review: ProDiscover Incident Response

Review: ProDiscover Incident Response

ProDiscover IR is a complete IT forensic tool that can access computers over the network (with agents installed) to enable media analysis, image acquisition and network behaviour analysis.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: ProDiscover Incident Response

Review: ProDiscover Incident Response

This product is the big brother of its family, including all the forensic capabilities of other versions with the additional ability to conduct investigations over the network and compare live systems to known-good baselines to establish whether a machine has been compromised or tampered with.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Windows Forensics and Incident Recovery

Review: Windows Forensics and Incident Recovery

Every attack on a computer system leaves a trace behind, no matter what an attacker might to to cover their steps. Also, data can be hidden by an attacker to use later as a back door. Forensics in part looks at uncovering evidence of this activity.

René Millman Oct 28 2004 12:00AM Security
Companies losing nearly $2 million per malware incident

Companies losing nearly $2 million per malware incident

Disruption from internet worms, viruses or spyware is costing companies almost $2 million in revenue per incident, according to a report released Tuesday by market-research firm Aberdeen.
Marcia Savage Jul 6 2004 11:21PM Security
SECURITY LIBRARY: Incident Response - Investigating Computer Crime

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

Unlike other incident response books, this one has all the technical details.
Anton Chuvakin Jan 19 2004 11:24AM Security
The Anatomy of a Security Incident Response Team

The Anatomy of a Security Incident Response Team

As organizations continue to invest in dedicated information security resources, it is imperative that they also develop the capability to respond to security incidents.
Tom Scholtz Jan 15 2004 1:20PM Security

Log In

  |  Forgot your password?