Change Guardian

Last month Juniper quietly released patches for two newly-discovered remote vulnerabilities. The announcement included some curious information including notification of the presence of “unauthorized code” in its ScreenOS. As researchers investigated this, they discovered some very sophisticated changes to the ScreenOS code that would likely require deep inside knowledge and a state-level actor…

Feb 12, 2016
9:00 am
Reads:
620
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
825
Score:
Unrated

This coming Tuesday, January 12 is a big day – old versions of Internet Explorer will no longer be supported. This change will help the NetIQ team accelerate the development of new features since we no longer have to account for old, incompatible browser quirks, and will also generally increase the safety of our…

Jan 12, 2016
2:03 pm
Reads:
719
Score:
Unrated

NetIQ is pleased to announce the upcoming availability of Change Guardian 4.2 to all customers worldwide. Change Guardian makes it easy to monitor access to sensitive data and identify unwanted activity including how sensitive data was changed, and presents all the contextual information an analyst needs to make a decision about what to do in…

+ read more

Jan 11, 2016
9:47 am
Reads:
908
Score:
Unrated

Following on from part 1 of the Sentinel Activities for Aegis, part 2 brings with it some specifics for Change Guardian, enhanced activity outputs and improved error handling for JSON serialization. As mentioned in part 1 ( here ) , the Change Guardian Product backend is based on Sentinel so the first bundle of activities, login,…

+ read more

Martin Cotter
Dec 16, 2015
11:03 am
Reads:
1,210
Score:
Unrated

Over a year ago now I did a post on integrating Aegis and Sentinel (available here) using Sentinel WebServices and out of the box Aegis Activities. As integration methods go, webservices are great but you do need to be able to manipulate the results so that they are usable using out of box manipulation activities…

+ read more

Martin Cotter
Dec 4, 2015
11:43 am
Reads:
1,264
Score:
Unrated

How do you know if your trusted employees are stealing sensitive data?  Companies have to allow them access to do their jobs (Utilize USB Drives, Touch File Shares etc), but need to monitor their actions. With Change Guardian and Sentinel we can detect this and give real time alerts.  In today’s example we are watching for someone…

+ read more

Nick Carstensen
Apr 3, 2015
10:35 am
Reads:
2,510
Score:
5

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
2,668
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow