========================================================================
CTO SOURCE                                     
http://www.infoworld.com
========================================================================
Tuesday, November 2, 2004

TOP STORIES
========================================================================
* Surveying the threatscape
* Big picture security
* In search of security event standards
* e-Security delivers the big security picture
* Network Intelligence device gobbles up log files

ADVERTISEMENT
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
The Mid-Atlantic Technology Conference and Exhibition
December 1 & 2, 2004, The Baltimore Convention Center
For readiness...For Growth...For the Region.
The MTCE is currently accepting exhibitors. The MTCE All
Hazards Forum will provide the opportunity to meet regional,
federal, state and local government officials and planners,
homeland security practitioners, industry leaders and
innovators, and policy influencers working with homeland
security and emergency management. For more information,
http://newsletter.infoworld.com/t?ctl=9B3B71:2B910B2 or contact Diana Edelman,
301-493-5500, [EMAIL PROTECTED]
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

Surveying the threatscape
========================================================================
Posted October 29, 2004, 3:00 p.m. Pacific Time

IT is awash in data from firewalls, server logs, anti-virus software,
app security appliances, and intrustion protection systems. Security
event management systems aggregate and correlate that data, offering
deep reports and dashboard views that help identify real threats.

For the full story:
http://newsletter.infoworld.com/t?ctl=9B3B6B:2B910B2

Big picture security
========================================================================
Posted October 29, 2004, 3:00 p.m. Pacific Time

There was a time when cutting-edge network security meant a firewall on
your perimeter and anti-virus software on the desktop. No longer. With
the advent of polymorphic Internet worms, application-layer attacks,
Trojan horses, adware, spyware, and wireless hacks, the network security
picture is more complicated than ever.

For the full story:
http://newsletter.infoworld.com/t?ctl=9B3B62:2B910B2

In search of security event standards
========================================================================
Posted October 29, 2004, 3:00 p.m. Pacific Time

Integrating SEM (security event management) technology with existing
security and system management infrastructure can be a hair-raising
experience. Security point products such as IDSes, anti-virus gateways,
and vulnerability scanners tend to use proprietary formats for
reporting, recording network events, and issuing alerts. And the
standard formats that do exist -- such as SNMP and syslog files -- are
limited in what they can convey.

For the full story:
http://newsletter.infoworld.com/t?ctl=9B3B5D:2B910B2

e-Security delivers the big security picture
========================================================================
Posted September 17, 2004, 3:00 p.m. Pacific Time

One of the first things you notice when you start working with IDSes is
that they produce a lot of data. In fact, this flood of data can be so
overwhelming that the usefulness of products such as Snort can become
questionable. Yes, you can eventually tune them so that they filter out
some of the noise, but that can require an investment in staff hours
nearly as vast as the deluge of data itself. And that's only one source.
Add to this the streams of data from your firewalls, the log files from
your servers, and reports from vulnerability management products and
other network devices, and your management picture goes from being
difficult to basically hopeless.

For the full story:
http://newsletter.infoworld.com/t?ctl=9B3B60:2B910B2

Network Intelligence device gobbles up log files
========================================================================
Posted July 09, 2004, 3:00 p.m. Pacific Time

Log files alternate between extremely valuable and extremely irritating,
depending on the task at hand, but the real effort involves analyzing
the data.

For the full story:
http://newsletter.infoworld.com/t?ctl=9B3B69:2B910B2

========================================================================
Now the InfoWorld Test Center reports to you
It's like having your own multimillion dollar IT
test facility, with lab reports in your inbox each
Monday. The weekly "Test Center Report" newsletter
delivers product and technology evaluations, trend
analysis, and advice from the legendary InfoWorld
Test Center. It will save you lots of time - and maybe
money, too. But it's free, fast, and easy to subscribe.
Sign up now at
http://newsletter.infoworld.com/t?ctl=9B3B64:2B910B2

ADVERTISE
========================================================================
For information on advertising, contact [EMAIL PROTECTED]

UNSUBSCRIBE/MANAGE NEWSLETTERS
========================================================================
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=9B3B66:2B910B2

To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew
or correct a problem with any InfoWorld subscription, go to
http://newsletter.infoworld.com/t?ctl=9B3B6F:2B910B2

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=9B3B6D:2B910B2

Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco,
CA 94107



This message was sent to: [EMAIL PROTECTED]

Reply via email to