www.fgks.org   »   [go: up one dir, main page]

First Looks

RedSeal Systems Network Advisor v4.0

A bird’s eye view into enterprise security configuration.
 

This is your SIM on steroids

Trying to dig up deeply hidden packets in huge amounts of data has always been among the most important tools in my analysis arsenal. But, then along came massive numbers of regulatory requirements and SIMs/SEMs became SIEMs with the focus moving to suites of reports to satisfy compliance audits.
 

Yes, Virginia, you can have a secure virtual environment

The emerging popularity of virtual computing has very few blemishes considering its youth. One of those, unfortunately, is security both of the underlying operating environment and of the individual virtual machines.
 

Lifecycle management of data: A special type of DLP

Identity Finder starts with a very simple premise: If you want to keep data from leaking, protect it where it lies. That way, if someone steals it, they get nothing. As simple as that sounds, it’s a bit harder to execute.
 

Access management from a different perspective

The appliance can be accessed through SSH, but only the customized Rohati commands are available, and there are no services turned on that are not TNS-specific. No daemons, which are not needed for the TNS to operate, are present either. This improves the security of the device itself. If you ...
 

The end of DNS attacks?

This month’s First Look is one of those products that really holds a unique and important place in the pantheon of information assurance tools
 

Another unified security gateway? Not quite.

Unified security gateway is a term we are hearing with increasing frequency. Some products that have traditionally referred to themselves as UTMs – unified threat managers – are changing their stripes. In some cases, this change is justified. In some cases, it’s marketing hype. The Finjan Vital Security Web Appliance ...
 

Good thing in a small package

Every now and then, I pluck a product out of our test queue because it intrigues me. This product is one of those.
 

Mac forensics on Macs? You bet! And it’s easy.

The idea of performing forensics on Macs may seem strange, but the Mac Marshal brings a uniqueness that we don’t see often. It is unique because the tool uses many of the native capabilities of the Mac to assist it in performing comprehensive forensic analysis of the OS X release ...
 

Two-factor authentication, or not two-factor?

The notion of true multifactor authentication is based on the concept of combining into a single authentication mechanism something you have, something you know and something you are. Combine two or more of these and you have multifactor authentication.