Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Why Enterprise Snare Agents

2014/10/30 by admin

In 2001, the developers of the Snare Product Suite, developed a system to capture the event data as required by Trusted Computer Systems Evaluation Criteria or C2. While the C2 is considered one of the lowest acceptable levels of security, the C2 System must be able to:

  • provide system level audit trail
  • audit the use of identification and authentication mechanisms
  • audit file access (open, close, read, write, create) and program initiation
  •   audit file/object deletion
  • audit administrative actions

The Snare Product Suite started with the Linux agent, specifically for use within the defense industry, and later the suite was expanded to the Windows and Solaris agent. The agents, which were originally provided through the Open Source community became hugely popular for organizations that were attempting to meet C2 Audit Levels.
Of course back in 2001, logging event data was much more simplistic than it has evolved to today, and now there are multiple regulatory reasons to implement an SIEM, SIM, SEM or Event log management solution. The debate seems to rest with should an organization use agents or not to forward the event log data to a collector.

See complete post on our snare.solutions website

Filed Under: Advanced Persistent Threat, compliance, Log Management, Snare, Snare Agents

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Google Suspends Chinese Shopping App Amid Security Concerns
  • Verosint Launches Account Fraud Detection and Prevention Platform
  • Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement