This article discusses some of the main defensive security solutions used
today and explains the reasons why employing a Log Management and
Intelligence solution is critical to complement these protection methods.
Let's first look at the most common defensive security solutions that have
been popular these past few years. This is not an exhaustive list of all
existing technologies, but rather a high-level view of some of the prevalent
These correspond to an approach called "Defense in Depth" that aims to put
successive rings of protection between the bad guys and the information to
protect, making successful attacks harder and harder.
There are other types of security solutions, such as proactive security
(Vulnerability Management and... (more)
The debate between data and information has been going on for quite some
time. When people say "knowledge is power", are they referring to data or
information? Is knowledge different still? And how about "intelligence" where
does that fit?
How can we go from data to information to knowledge to intelligence?
The answer is simple. By understanding the animated nature of data evolution
and transformation, and acting upon this understanding.
And this is brought to light by logs from your Information Systems.
Understand this and unleash the Power of Logs.
Figure 1 - Data to Informatio... (more)
Another hack attack hits the headlines http://tinyurl.com/yebvj8p
Big deal. This stuff happens every day now right? Wrong. Not on this scale
it doesn’t. The Kneber Bot has penetrated 75,000 systems, 2,500 companies
across in 196 countries. This is not a straightforward Trojan - a simple
smash and grab. This one’s a game changer.
Systems compromised by this botnet provide the attackers with not only user
credentials and confidential information, but remote access inside the
compromised network. Just some of the data stolen includes:
68,000 corporate log-in credentials Access to ... (more)
Trust is the fundamental business enabler.
It is absolutely necessary for clients to trust their Cloud Providers.
Without trust, business relationships cannot exist. Without
trust, existing relationships cannot blossom.
Trust becomes an issue as soon as there are potential conflicts of
As a client, do you think it's unfair that your Cloud Provider is also the
entity generating reports on actual usage for Pay-per-Use billing
calculations? Do you think it represents a conflict of interest?
How about when your Cloud provider also generates reports on his level of
Not all Log Management solutions are created equal... Trusting your logs.
Log Integrity is at the core of using logs for such purpose as building
Trust, providing non-repudiation and indisputable proof in business
relationships between Customers and Providers, but also to provide for
evidence admissible in a court of law. We saw that not all Log Management
solutions are created equal, and we saw some high-level requirements in terms
of log collection and log reporting. We need a solution that is simple to
deploy - we want an enabler, not a disabler - and a solution that allows a ... (more)