Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Archives for March 2016

SolarWinds Study Reveals Hybrid IT is the Reality

2016/03/29 by admin

MarketWire – News Room – March 29, 2016

SolarWinds Study Reveals Hybrid IT is the Reality for Majority of Businesses; Security Concerns, New Skillsets Top of Mind for IT Professionals

According to the SolarWinds IT Trends Report 2016, Only 9 Percent of IT Professionals Say Their Organizations Have Not Migrated Any Infrastructure to the Cloud, While 62 Percent Report Security Remains the Greatest Challenge and Three-Quarters Indicate Resources and New Skills Are Still Needed

AUSTIN, TX–(Marketwired – March 29, 2016) – SolarWinds, a leading provider of powerful and affordable IT management software, today released the findings of its IT Trends Report 2016: The Hybrid IT Evolution. The study features insights from IT practitioners, managers and directors proving that the vast majority of businesses have shifted away from on-premises-only infrastructure to hybrid IT environments, creating new concerns and pressures for IT professionals.

“The findings of this year’s study paint a clear picture: cloud adoption is nearly ubiquitous, but it’s not now and will not in the foreseeable future be suitable for all workloads, and even if it were, very few if any companies would convert all of their existing applications to run in the cloud,” said Joel Dolisy, CIO, SolarWinds. “The resulting dynamic — one set of critical on-premises services connected with another set of services in the cloud — is hybrid IT. And at the center of this evolution is the IT professional who needs to ensure always-on performance of applications, devices, networks and systems — regardless of location. They need to be empowered with the support to gain the skills and tools required to properly monitor and manage hybrid IT environments, which in turn will allow businesses to truly unlock the potential of the cloud.”

Download the Solarwinds IT Trends Report 2016: the Hybrid IT Evolution

Read the article

Contact us for more information at 866-431-8972 or via email at sales@symtrex.com

Filed Under: Advanced Persistent Threat, Cloud, compliance, CyberThreats, endpoint, industry, Network Monitoring, PCI, Security News, SolarWinds

Solarwinds honoured – Network & Security Product Excellence

2016/03/23 by admin

AUSTIN, TX –(Marketwired – March 23, 2016) – SolarWinds, a leading provider of powerful and affordable IT management software, today announced several industry accolades for its network and security management products from respected industry publications including, SC Magazine®, Cyber Defense Magazine, Network Computing® and CRN®.

“At SolarWinds, we are proud to provide IT professionals with robust products that equip them with deep visibility and reliable data to help tackle the monitoring and management challenges they are confronting in their environments,” said Nikki Jennings, group vice president, product strategy, SolarWinds. “Receiving these product awards is affirmation that we are listening to our users, taking the time to understand the problems they are facing, and dedicating our time to providing the products they need to solve all their IT problems.”

Network Management

  • SolarWinds® Network Configuration Manager won for “Best Risk/Policy Management Solution” in the 2015 SC Awards U.S.
  • SolarWinds Network Performance Monitor was a finalist for “Network Management Product of the Year” in the 2016 Network Computing UK Awards
  • SolarWinds was a finalist for “Company of the Year” in the 2016 Network Computing UK Awards

Security Management

  • SolarWinds Log & Event Manager won for “Best Product — Security Information Event Management (SIEM)” in the 2016 Cyber Defense Awards
  • SolarWinds was named the “Hot Company — Patch & Configuration Management” for SolarWinds Patch Manager in the 2016 Cyber Defense Awards
  • SolarWinds was named one of the “20 Coolest SIEM and Threat Detection Vendors” in CRN‘s 2016 Security 100
  • SolarWinds Log & Event Manager is a finalist for “Best SIEM Solution” in the 2016 SC Magazine Awards Europe; winners to be announced June 7

To find out more about Solarwinds give us a call at 866-431-8972, send us an email at sales@symtrex.com,

Filed Under: compliance, CyberThreats, industry, Log Management, Network Monitoring, Products, Security News, SolarWinds

LogRhythm – Harnessing your Inner SIEM

2016/03/21 by admin

ITWire – Ray Shaw March 21, 2016

Security information and event management (SIEM) is an approach to security management that provides a holistic view of an organization’s IT security.

The buzzword in 2015 was cyber threat intelligence (CTI) – everyone wanted useful data and analytical tools for next-gen cyber security to detect and respond to threats faster. The industry responded by providing a plethora of CTI products.

Matt Willems, a four-year, Labs Engineer, at LogRhythm has written a good overview of CTI and SIEM. Of course it is from a LogRhythm perspective.

He works closely with the Machine Data Intelligence team to collect consistent data for its Co-Pilot Program, develop new rule blocks for advanced correlation and builds parsing rules to support new devices. He also provides Incident Response support—analysing and interpreting data and delivering up-to-date content for the Knowledge Base to neutralize threats faster.

He starts by defining what cyber threat intelligence means and how to leverage successfully the information that is already in the SIEM ecosystem.

What is Cyber Threat Intelligence?

SC Magazine’s free Cyberthreat Intelligence e-book, (registration required) discusses CTI, the benefits of integrating into an organization’s defence strategy, as well as the different threat sharing initiatives and alliances.

Gartner defines CTI as evidence-based knowledge – including context, mechanisms, indicators, implications and actionable advice – about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.

“It can also be described as the process of detecting potential and actual threats using evidenced-based data, responding to them and defeating the attackers using forensic and logical data the attackers themselves leave behind,” according to SC Magazine’s Cyberthreat Intelligence e-book.

Without actionable data, there is no proactive defence. An effective CTI sets up the appropriate countermeasures automatically for drastically improved detection and response times.

Next-Gen Log Management to Facilitate CTI

CTI requires a log management tool [such as LogRhythm] to correlate the information to make the raw data collected actionable.

“The absolute minimum barrier to entry is a security information and event management (SIEM) or log management product of some sort. Then you at least have something to correlate the information that’s coming into your security ecosystem,” says Andrew Hay, CISO at DataGravity.

LogRhythm contextually structures every log message to store and understand what the data means.

Identify Nefarious Activity with a Distributed Set of Data

Every attack is different. All cyber-attacks have indicators of compromise (IOCs). Feeding IOCs into a SIEM provides full visibility into the network. With this information, a SIEM will correlate the logs from across the network to form a distributed set of data.

An effective CTI solution can identify various touch points as a potential hazard using the distributed data set. Instead of looking at the attack pattern as a whole, it should only need one command before automating a response and thwart an attack.

LogRhythm’s AI Engine has over 70 metadata fields that provide highly relevant data for analysis and correlation and over 900 preconfigured, out-of-the-box correlation rule sets. It can accurately define “normal” activities and automatically alarm for nefarious activities.

Make Data Actionable Out-of-the-Box

The goal of cyber threat intelligence is to draw actionable data from the thousands of log files and data streams to identify signs of nefarious behaviour. SIEMs can efficiently correlate log messages and set off alarms. Once these behaviours are detected an effective CTI product will automate your response based on the digital evidence before a breach takes place.

“It’s not just detecting a potential attack or compromise, it’s a question of what you’re going to do about it,” says Michael Orosz, director of Decision System Group, Information Sciences Institute, Viterbi School of Engineering, University of Southern California.

LogRhythm’s SmartResponse operationalizes data out-of-the-box to make it actionable. Once an alarm is set off, it enables an automated response or a semi-automated response with a sophisticated approval process.

Employ Honeypots for an Adaptive and Proactive Response

Honeypots are isolated systems such as web servers designed to look like part of the corporate network. These decoy systems are easy to exploit, to make them an attractive target for opportunist attackers.

Honeypots provide the actionable data necessary for cyber threat intelligence without compromising the network. By monitoring honeypot activity, an organization can learn about targeted threats and use this information to understand who they are being targeted by, what information their adversaries are seeking and how attack patterns will look within the network. This information enables proactive threat defence.

LogRhythm’s Honeypot Security Analytics Suite automatically tracks and analyzes an attacker’s actions to create a behaviour profile. If an observed attacker’s behaviour on the honeypot is mirrored by similar action within the environment, AI Engine automates a SmartResponse.

Cyber threat intelligence combines data left behind by attackers and innovative analytics to create the next-generation of cybersecurity intelligence.

 

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, industry, LogRhythm, Products, Security News

Comparing the Top Big Data Security Analytics Tools

2016/03/10 by admin

From Guest Contributor on TechTarget

Expert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization.

In the near future, big data security analytics will become as common as malware detection and vulnerability scanning. That’s because these platforms allow enterprises to capture data from multiple, varied data sources, integrate that data in near real time, analyze patterns and detect malicious activity, as well as monitor, report and conduct forensic investigations.

This article highlights some of the most important features of several of the leading big data security analytics tool vendors — Cybereason, Fortscale, Hexis Cyber Solutions, IBM, LogRhythm, RSA and Splunk — against the five essential factors essential for realizing the full benefits of these platforms. These factors, as described in detail in the last article in this series, include:

  • Unified data management
  • Support for multiple data types, including log, vulnerability and flow
  • Scalable data ingestion
  • Information security-specific analytic tools
  • Compliance reporting

Read the full Article ->

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Hexis, LogRhythm, Products, Security News

Would You know if your Network Was Breached

2016/03/09 by admin

Quickly identify and eliminate the most common IT Security Threats –

  • Spear Phishing
  • Escalation of Permissions
  • SQL Injection
  • Botnets
  • DDoS Attacks

Check out the new Threat Intelligence Feed from SolarWinds – Log and Event Manager

 

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, PCI, Products, SolarWinds

  • 1
  • 2
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Google Suspends Chinese Shopping App Amid Security Concerns
  • Verosint Launches Account Fraud Detection and Prevention Platform
  • Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement