Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

LogRhythm scores High

2015/11/10 by admin

LogRhythm scores high on the Gartner report - Critical Capabilities for Security Information and Event Management. (September 2015).

Gartner’s 2015 Critical Capabilities for Security Information and Event Management report enables IT security managers to align their needs with one of the three most common use cases. And LogRhythm Scores high on all three.

  • Compliance
  • Threat Management
  • SIEM

Compliance

Contact us to find out more

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Malware, Network Monitoring, Products, Security News

Looking for an SIEM?

2015/11/02 by admin

Reviewing the logs of your organization has long been a standard for organizations to analyze the activity of their networks. In recent years however, organizations are requiring more from their Security Information and Event Management tool. An SIEM Tool should have the following capabilities at a minimum:

  • Data aggregation
  • Correlation
  • Alerting
  • Dashboards
  • Compliance - Data Gathering and Reporting
  • Retention
  • Forensic analysis

According to one industry leader - SIEM products and services serve two purposes: providing centralized security logging and reporting for an organization, and aiding in the detection, analysis and mitigation of security incidents.

While the list of SIEM products is growing, a number of organizations are looking to independent third party analysis of these tools. If you are in the market for an SIEM or to replace your existing system, we invite you to review the following report.

Download Report

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Network Monitoring, PCI, Security News

LogRhythm Leader in SIEM - Magic Quadrant

2015/09/03 by admin

LogRhythm was acknowledged for the fourth time as a leader in the SIEM in the Magin Quadrant report by Gartner, sharing this title with four other SIEM Products. The security information and event management (SIEM) market is defined by the customer’s need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance.

According to the report: LogRhythm is an especially good fit for organizations that require an integrated combination of SIEM, endpoint and network monitoring capabilities, and those organizations that value ease of deployment and predefined function over a “build your own” approach to monitoring.

The strengths of the product included

  • LogRhythm combines SIEM capabilities with endpoint monitoring, network forensics and incident management capabilities to support security operations use cases.
  • Gartner receives consistent user feedback stating that LogRhythm’s solution is straightforward to deploy and maintain, and provides effective out-of-the-box use cases and reporting templates.
  • The average of LogRhythm reference customers satisfaction scores for scalability and performance, effectiveness of predefined rules, usefulness of predefined reports, ease of use and effectiveness of predefined queries, product quality and stability, and support experience support is higher than the average scores for all reference customers in those areas.
  • LogRhythm continues to be very visible in the competitive SIEM technology evaluations of Gartner clients.

To learn more about LogRhythm, or to setup a demonstration, give us a call at 866-431-8972 ext 221.

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, industry, Log Management, LogRhythm, Network Monitoring, Security News

Cyber Security - Putting into Perspective

2015/06/26 by admin

The news is full of stories of large well respected organizations (Target, Home Depot, Sony) and government agencies being victims of cyber crimes. Reporters than make statements like – well if these organizations can be victims, what does that mean to the small/midsized organizations.

So the truth is that no one is safe from cyber threats, to the cyber criminals organizations are just numbers (IP Addresses) and they are looking for those that have a weakness that can be exploited.

The challenge is to eliminate the weaknesses to the best of your ability. As I was writing this, I am reminded of the story of the Three Little Pigs and the Big Bad Wolf – funny how security can relate to a fable written in 1886. We all know the story - the first pig builds his house out of straw, which, unfortunately for the pig was not the best idea. The second pig builds his house out of sticks – again the news is not great for the pig. The third pig, takes his time and builds his house out of bricks, the wolf discovers that he cannot blow down the house, and has to revert to other tactics to get into the house. ( Denial of Service ).

He then attempts to trick the pig out of the house by asking to meet him at various places ( social engineering ), but the pig outsmarts him every time. Ultimately the wolf attempts to come down the chimney, where the pig captures the wolf.

In a very rudimentary way - this is how security works, first take your time and ensure that you have strong “perimeter defense” (an enterprise class firewall) , ensure that you have visibility on your “perimeter” so that you can see who is trying to get in, make sure that if they do get in that there is a way to limit their effectiveness be it antimalware (to quarantine viruses, malware, ransomware),or network access control (to stop data exfiltration).

Looking at these large, global entities, and putting into the perspective of the three little pigs – if the pig built an apartment complex, there are numerous ways to get in (windows/balconies), and even with an alarm, you are running from floor to floor to capture the wolf.

For those that of us that are not Target, Home Depot, etc, there are ways to protect yourself, as well as to attempt to identify who the cyber criminal is. I invite you to contact us to discuss your concerns, email at [email protected] or call at 866-431-8972.

Filed Under: Advanced Persistent Threat, antivirus, compliance, CyberThreats, endpoint, Log Management, Malware, Network Access Control, Network Monitoring, Products, Security News, SolarWinds, Sophos, Unified Threat Management

SolarWinds Automates Network Vulnerability Detection and Security Policy Enforcement

2015/06/11 by admin

Latest Version of SolarWinds Network Configuration Manager Leverages the National Vulnerability Database in a Security Content Automation Protocol (SCAP) Compliant Manner to Identify Device Vulnerabilities and Provide Automated Remediation Actions

AUSTIN, TX, Jun 10, 2015 (Marketwired via COMTEX) — SolarWinds SWI, +0.59% a leading provider of powerful and affordable IT performance management software, today announced enhancements to SolarWinds(R) Network Configuration Manager (NCM), its network device configuration and change management product for Cisco(R), Juniper(R), HP(R), Dell(R), and Brocade routers and switches and any other device with a command line interface. The latest version makes it easier to demonstrate security compliance by automatically performing vulnerability scanning on Cisco Adaptive Security Appliance (ASA)- and Internetwork Operating System (IOS(R))-based devices using Common Vulnerabilities and Exposures (CVE) published by the National Vulnerability Database (NVD). Additionally, SolarWinds NCM now provides automated remediation options and National Institute of Standards and Technology (NIST(R)) Federal Information Security Management Act (FISMA) and Defense Information Systems Agency (DISA(R)) Security Technical Implementation Guide (STIG) compliance reports out-of-the-box.

“IT pros have traditionally focused on configuration details and assumed that means that network routers, switches and firewalls are secure. But with security becoming an ever growing concern for IT pros, it is important to ensure that network devices themselves, and the software that they run on, do not contain weaknesses and that any new vulnerabilities are remediated quickly,” said Nikki Jennings, group vice president, products and markets, SolarWinds. “Security tools focused on the actual network devices are few and far between and often IT pros find themselves manually updating and patching device software, but SolarWinds NCM now automatically identifies vulnerabilities and assists in the remediation of issues providing IT pros with peace of mind.”

Read More ->

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Network Monitoring, Security News, SolarWinds

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement