Audit

NetIQ’s Sentinel product is a SIEM solution that provides the ability to capture events from any number of event sources, and of any type, into a system that normalizes the data, finds meaning in a barrage of nonsense (needle in a haystack), and includes incidents management based on custom workflows as defined by each customer….

+ read more

By: ab
Jan 21, 2015
11:50 am
Reads:
891
Score:
5

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
55,291
Score:
Unrated

Here is a quick step-by-step guide on how to use the Sentinel MySQL collector to point to Access Governance Suite (AGS) 6 for audit events. I am running Windows and mySQL for AGS server, but the procedure can be easily adapted to Linux, Oracle or MS-SQL.     FIG 1: Using graphical tool to access…

+ read more

NetIQ
By: NetIQ
Mar 14, 2012
8:49 am
Reads:
1,995
Score:
Unrated

A month or more of high profile security breaches have reinforced the importance of data protection as a CIO agenda item. Naturally, if a security vendor like RSA can succumb to an attack, all organisations have to ask themselves: Is their IT security fit for purpose? Coincidentally, the RSA and the other incidents happened around…

+ read more

jdierks
By: jdierks
May 31, 2011
1:22 pm
Reads:
3,904
Score:
Unrated

This little tool offers a direct way to get the category a webpage is in. The lookup is done online against the SurfControl for BorderManager 6.1 Online DB of WebSense.

By: rthilo
Dec 2, 2010
11:35 am
Reads:
1,145
Score:
Unrated

Every time I make a large purchase, my father’s words of wisdom ring in my ears – “Erin, it’s your money, now spend it wisely.” This statement was usually followed up by the old adage, “Money doesn’t grow on trees.” With these two bits of wisdom in mind, I’ve always taken my shopping seriously. I…

+ read more

erinkavery
May 26, 2010
11:19 am
Reads:
1,550
Score:
Unrated

Prime Care Technologies, a trusted service provider for Fortune 1000 and Healthcare companies, recently set out to consolidate and standardize their approach to security and administration. In pursuit of achieving and maintaining HIPAA compliance, streamlining their operations, and securely servicing their customers, Prime Care Technologies turned to NetIQ to help them secure, manage and automate…

+ read more

erinkavery
Apr 16, 2010
10:00 am
Reads:
1,722
Score:
Unrated

I recently read a Gartner article, Hiring, Wiring and Firing: Protecting Your Organization from Errant System Administrators and it got me thinking about a topic that I’ve often talked about on this blog – administrative privileges – but haven’t discussed in a while. Jay Heiser, Ant Allen, and Andrew Walls make great recommendations in this…

+ read more

erinkavery
Mar 30, 2010
1:05 pm
Reads:
1,809
Score:
Unrated

Identity management was a complex issue to begin with and this complexity is only increasing with the advent of cloud computing. To deal with it, those responsible for managing identities and those creating technologies for identity management have had to continuously innovate. The latest innovation we are seeing is in the area of intelligent workload…

+ read more

DiptoChakravarty
Mar 15, 2010
1:03 pm
Reads:
1,358
Score:
Unrated

It’s that time of year; the auditors are out and organizations across the globe are assessing their security posture.  To be compliant or not to be compliant… that is the question that auditors and security teams alike are out to answer.  In the past, Active Directory has often been overlooked when a security and compliance…

+ read more

erinkavery
Jan 28, 2010
1:24 pm
Reads:
2,678
Score:
Unrated