Security Event Management: Real-time Alerts and Instant Remediation

0

You may come across a situation, where there was a virus attack on you IT network. In another situation some of the corporate users may be accessing the streaming sites which drain the Internet bandwidth.  First it should get notified instantly, Firewall Analyzer does this promptly.  Will the alerts alone be sufficient to mitigate the effects of the attack or rectify the cause of the bandwidth drain? No. You need to take swift and automatic action to tackle the situation. If you depend on manual remediation measures, which are inherently slow, the virus will spread and will bring the whole network to a grinding halt or the business will get crippled as the bandwidth is not available for critical business acti…

Guest Post: How ‘Credit Union of Denver’ secures its network and provides business continuity to their customers…cost-effectively!

0

By Benjamin Shumaker, Vice President of IT/ISO at Credit Union of Denver

Benjamin Shumaker, VP of IT/ISO at Credit Union of Denver

ManageEngine EventLog Analyzer and ManageEngine Firewall Analyzer offers a huge set of features, strong configuration capabilities and outstanding auditing ability that allows our Information Technology group to have the necessary tools regulators expect.

Both Firewall and Event Log Analyzer are the best cost effective tools for getting the most for your money that I was able to find.  Its uses in our enterprise are endless.

Using Firewall Analyzer for conducting forensic analysis of a Trojan attack

Firewall Analyzer saved us hours of research during a discovered Trojan attack. After researching the Trojan it was discovered t…

Non-intrusive & Real-time Monitoring of Corporate Users Internet Activity – Part IV

0

In continuation to our earlier postsNon-intrusive & Real-time Monitoring of Corporate Users’ Internet Activity Part – I,Part – II, and Part – III,we will now show you how to monitor corporate users’ Internet activity with Firewall Analyzer - Custom Report.

Use Case 3: Custom Report

With Firewall Analyzer you can create a custom report to get the web sites (URLs) visited by network users. The custom report generated will be available under ‘My Reports’.

This report displays the details of the web sites accessed by an enterprise user like, URLs, URL Categories, Number of visits (Hits), Date & Time of visit, Duration of visit, Total bytes consumed, Resource, So

Non-intrusive & Real-time Monitoring of Corporate Users Internet Activity – Part III

0

In continuation to our earlier post Non-intrusive & Real-time Monitoring of Corporate Users’ Internet Activity Part – I and Part – II, we will now show you how to monitor corporate users’ Internet activity with Firewall Analyzer – Advanced Search.

Use Case 2: Advanced Search

Get the corporate users’ internet activity reports faster.  View of top Internet users in your network with advanced search and save it as a report

Step 1:

Click the Advanced Search link in the Sub tab. The Advanced Search screen opens up.

Select Advance Search

Step 2:

In the Advanced Search screen, select a particular device for log search. Select Aggregated Logs Database in the Select From field. In the criteria, s

Non-intrusive & Real-time Monitoring of Corporate Users Internet Activity – Part II

0

In continuation to our earlier post Monitoring Corporate Users’ Internet Activity, we will now show you how to monitor corporate users’ Internet activity with Firewall Analyzer Quick Reports.

Use Case 1: Quick Reports from Dashboard

Get a quick view of top Internet users in your network with a few clicks from the Dashboard

Step 1:

Click the Quick Reports link of the Firewall device in the Traffic Statistics tab

Quick Report from Dashboard

Step 2:

Click the Top Conversation link in the left side. You will see a list of corporate users along with details on total bytes consumed, host/source, destination, protocol groups, hits, bytes sent, and bytes received.

Top bandwidth users

Step 3:

To view Internet activity for a particular user, enter the user n

Non-intrusive & Real-time Monitoring of Corporate Users Internet Activity – Part I

1

Like unrestricted privileges to administrative users in a network (PUMA), uncontrolled web access in companies has its own set of problems. Irresponsible Internet usage tends to reduce employee productivity increases security risks, and the prime bandwidth necessary for business consumption becomes scarce. 

The Social Enterprise

In this era of cloud computing and social media, access to Internet for business usage is the order of the day. Companies make use of social tools like Facebook, Twitter, LinkedIn to stay in touch with their customers, to quickly market their products, to stay informed about best practices, etc. But then, surveys by various agencies indicate that YouTube alone drains

EventLog Analyzer – a perfect log management tool

0

Until recent years, enterprise IT infrastructure comprised of a few basic network devices. IT managers used simple tools to collect generated logs and analyzed them manually to generate log reports. IT heads and administrators viewed log management more as a means to monitor devices than as an aid for securing the network.


With ever-increasing security threats over the recent years, log management has evolved as an integral part of organization’s security. However, the simple log management tools and procedures are not sufficient anymore for the following reasons.

?

• Today’s new breed of advanced technologie

DNS Network Hacking on UK sites

0

It is one of the most popular technology news sites in UK and worldwide, The Register. The first news I read was “The Register Hacked”, posted by a fellow user Chris Woollard but. Later, it came to light that it was not the site but the DNS (Domain Name Server) which got hacked. Along with it, the sites Coca Cola, UPS, Telegraph Newspaper had been cracked and displayed a black page stating “TurkguvenLigi” and Sept4, “happy World Hackers day-Have funJ hack you”

Here’s the broad outline of what happened. DNS is the master address list database system for the Web. With it, instead of writing out an Internet Protocol (IP) address like “http://209.85.135.99/,