Security Manager

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
350
Score:
Unrated

Hi all, Unix Agent 7.4 Hotfix 7018104 (p74p12) is released. This patch updates the Secure Configuration Manager UNIX Agent 7.4 with the following scripts which are used to enable security checks…

Nov 7, 2016
4:16 pm
Reads:
463
Score:
Unrated

The IP2Location 2011.1r1 feed plug-in is released. New feed plug-in and replaces the Generic IP Geolocation Service Collector. Allows you to convert IP Location Database files downloaded from ip2location.com to a Sentinel map file.

May 11, 2016
4:30 pm
Reads:
1,131
Score:
Unrated

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
3,034
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
1,718
Score:
Unrated

We encountered a very rare event where the Event Partition Data (index of raw event data) failed to be written to the secondary storage. While the compressed raw data was still intact and written to the secondary storage, it could not be queried as the index of its content was missing. The resolution required several…

+ read more

ScorpionSting
Oct 9, 2014
2:41 pm
Reads:
1,890
Score:
Unrated

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
15,399
Score:
Unrated

The main objective of this article is to give a step by step procedure to configure the command control access for the network devices like router and switch using NPUM.

ashishmrt
By: ashishmrt
Jan 14, 2014
8:37 am
Reads:
2,717
Score:
1
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow