Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/26/2007
04:53 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

SIM/Net Management Combo on Tap

eIQnetworks is about to release a new tool that integrates security and network management info

eIQnetworks on Monday will roll out a combination security information management (SIM)/network management platform that aims to bring the two worlds closer together, Dark Reading has learned.

The eIQnetworks new SecureVue software's arrival is timely: SIM technology is not only integrating more closely with traditional security tools, but it is also in the early stages of blending with traditional network operations tools, according to a new report by The 451 Group. (See Report: SIM Market to Heat Up and Blurring the Line Between SOC & NOC.)

While most organizations have no intention of combining their SOCs and NOCs, many are feeling pressure to get the two to communicate and share information better, often for compliance reasons. But integrating these traditionally separate worlds with their point solutions isn't easy -- it can be a costly, manually intensive task just to get to the bottom of a network event.

"There is too much time and money today spent in integrating these products," says Vijay Basani, co-founder and CEO of eIQnetworks. "Our goal is to define the incidents and necessary data to get to the bottom of an issue very quickly, with an overall cost benefit."

SecureVue encompasses SIEM, asset, configuration, performance, and vulnerability assessment functions, the company says. The SIEM features include real-time views of log management and forensics, and the asset and configuration components handle the typical management of hardware and software, as well as configurations for change control best practices. There is a performance analytics, and a vulnerability assessment piece centrally manages vulnerability scanners such as eEye Digital Security's Retina, ISS Scanner, and Nessus.

IPkey, a managed security services provider for small- to medium-sized businesses, has been beta-testing SecureVue and plans to purchase the tool. The company is looking at whether the multi-function product can replace its IPSwitch WhatsUp Professional network management tool, too.

Marcus Clarke, president of IPkey, says the possibility of consolidating the company's separate security and network management systems is attractive. "If we had a worm attack, for example, and we saw large amounts of bandwidth from a particular server of PC, we can't correlate those things automatically right now," he says. "SecureVue would let us do that."

Another benefit would be reducing the manpower it takes to run IPkey's redundant, co-location sites with two tools. "We have two separate physical facilities, so we double everything we do." And IPkey's technicians have to integrate any security and network issues "in their heads" now, he says, so the integration would save on manpower as well. IPkey runs eIQnetworks' Security Analyzer for monitoring security events.

"Correlation is a biggie for us," Clarke says. "That would give us the ability to develop some intelligence in our software and systems."

SecureVue is now shipping and runs on Windows and Linux. The central server component doesn't yet support Linux, but the regional and collection servers do. Pricing starts at $49,000.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • eIQnetworks Inc.
  • The 451 Group Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Oldest First  |  Newest First  |  Threaded View
    7 Tips for Infosec Pros Considering A Lateral Career Move
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
    For Mismanaged SOCs, The Price Is Not Right
    Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    IT 2020: A Look Ahead
    Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
    Flash Poll
    How Enterprises are Attacking the Cybersecurity Problem
    How Enterprises are Attacking the Cybersecurity Problem
    Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2015-3154
    PUBLISHED: 2020-01-27
    CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
    CVE-2019-17190
    PUBLISHED: 2020-01-27
    A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
    CVE-2014-8161
    PUBLISHED: 2020-01-27
    PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
    CVE-2014-9481
    PUBLISHED: 2020-01-27
    The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
    CVE-2015-0241
    PUBLISHED: 2020-01-27
    The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...