Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/26/2007
04:53 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

SIM/Net Management Combo on Tap

eIQnetworks is about to release a new tool that integrates security and network management info

eIQnetworks on Monday will roll out a combination security information management (SIM)/network management platform that aims to bring the two worlds closer together, Dark Reading has learned.

The eIQnetworks new SecureVue software's arrival is timely: SIM technology is not only integrating more closely with traditional security tools, but it is also in the early stages of blending with traditional network operations tools, according to a new report by The 451 Group. (See Report: SIM Market to Heat Up and Blurring the Line Between SOC & NOC.)

While most organizations have no intention of combining their SOCs and NOCs, many are feeling pressure to get the two to communicate and share information better, often for compliance reasons. But integrating these traditionally separate worlds with their point solutions isn't easy -- it can be a costly, manually intensive task just to get to the bottom of a network event.

"There is too much time and money today spent in integrating these products," says Vijay Basani, co-founder and CEO of eIQnetworks. "Our goal is to define the incidents and necessary data to get to the bottom of an issue very quickly, with an overall cost benefit."

SecureVue encompasses SIEM, asset, configuration, performance, and vulnerability assessment functions, the company says. The SIEM features include real-time views of log management and forensics, and the asset and configuration components handle the typical management of hardware and software, as well as configurations for change control best practices. There is a performance analytics, and a vulnerability assessment piece centrally manages vulnerability scanners such as eEye Digital Security's Retina, ISS Scanner, and Nessus.

IPkey, a managed security services provider for small- to medium-sized businesses, has been beta-testing SecureVue and plans to purchase the tool. The company is looking at whether the multi-function product can replace its IPSwitch WhatsUp Professional network management tool, too.

Marcus Clarke, president of IPkey, says the possibility of consolidating the company's separate security and network management systems is attractive. "If we had a worm attack, for example, and we saw large amounts of bandwidth from a particular server of PC, we can't correlate those things automatically right now," he says. "SecureVue would let us do that."

Another benefit would be reducing the manpower it takes to run IPkey's redundant, co-location sites with two tools. "We have two separate physical facilities, so we double everything we do." And IPkey's technicians have to integrate any security and network issues "in their heads" now, he says, so the integration would save on manpower as well. IPkey runs eIQnetworks' Security Analyzer for monitoring security events.

"Correlation is a biggie for us," Clarke says. "That would give us the ability to develop some intelligence in our software and systems."

SecureVue is now shipping and runs on Windows and Linux. The central server component doesn't yet support Linux, but the regional and collection servers do. Pricing starts at $49,000.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • eIQnetworks Inc.
  • The 451 Group Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 8/10/2020
    Researcher Finds New Office Macro Attacks for MacOS
    Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
    Exploiting Google Cloud Platform With Ease
    Dark Reading Staff 8/6/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Changing Face of Threat Intelligence
    The Changing Face of Threat Intelligence
    This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-8720
    PUBLISHED: 2020-08-13
    Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
    CVE-2020-12300
    PUBLISHED: 2020-08-13
    Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
    CVE-2020-12301
    PUBLISHED: 2020-08-13
    Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
    CVE-2020-7307
    PUBLISHED: 2020-08-13
    Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
    CVE-2020-8679
    PUBLISHED: 2020-08-13
    Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.