SNARE Enterprise Agents Features

Size: px
Start display at page:

Download "SNARE Enterprise Agents Features"

Transcription

1 SNARE Enterprise Agents Features A Prophecy International Company

2 Agents Centralized log management and analysis is essential to assuring the integrity of critical logs and achieving compliance with a growing list of regulations. However, the requisite process of transmitting log data across public or even private networks can simultaneously work against these important objectives. The SNARE Agents provide users with the tools necessary to address this challenge. The SNARE Agent is the industry standard for logging security events and is used with most SIEM servers, services and MSSP s. They are easy to install, configure and manage and greatly enhance the three pillars of information security: Confidentiality, Integrity and Availability. The SNARE Agents are issued as a supported Enterprise Agent and as an unsupported limited Open Source download. When deciding which release of the Agent your organization should use, the following questions should be considered: Support - If you need a supported security platform, then you need to use the Enterprise Agent. The Open Source Agent is provided to the open source community, free of charge and as issued. The Enterprise Agents include maintenance, upgrades, bug fixes and support of the product and for you as a customer. 2. Complete and Factual - If your organization needs to know that every log will be captured and forwarded with integrity, then you need to use the Enterprise Agents. The Open Source Agent does not support TCP, caching, custom event logs, UTC or registry audits. 3. Sensitivity and Confidentiality If your organization works with sensitive data, then you need to use the SNARE Enterprise Agents, which include best practices and encryption protocols. The SNARE Agent features are summarized in the following table. Agent Features Enterprise Open Source Support Maintenance, Upgrades and Customer Support 2. Windows 2012 / Windows8 Platforms 3. Custom Windows Event Logs 4. Event Log Caching 5. Confirmed Log Message Delivery 6. Encryption 7. Monitor Registry Events 8. Dynamic DNS Support 9. External Device Monitoring, e.g. USB Devices InterSect Alliance..A Prophecy International Company Page 2

3 10. UTC for Time Zone Normalization 1 Agent Heartbeat 12. Multiple Destinations 13. Single MSI 14. Snare Agent Management Console 15. Monitor Policy Status 16. Service Tracking 17. Group Policy Support 18. Monitor Agent Configuration Changes 19. Event Throttling 20. Light on Resources 2 Regulation Compliance 22. Real Time Event Filtering 23. Easy to use Installer 24. UDP Option 25. Locale Date Information 26. Stability 27. Latency and Real Time 28. Multiple Syslog Headers Options 29. Remote Control Interface 30. Native OS Audit Control 3 Upgrading Following is a more detailed description of the SNARE Agent Features: Vendor Support The SNARE Enterprise Agents give you access to customer, product and technical support to ensure compliance. 2. Windows 2012 / Windows8 SNARE Enterprise Agents are supported on all Windows platforms, including W2012 and W8. 3. Custom Windows Event Logs The SNARE Enterprise Agents extend the reach of the open source SNARE Agents beyond the core Windows Event Logs. They enable the collection, filtering and transmission of non-standard and third party Windows Event Logs as well. InterSect Alliance..A Prophecy International Company Page 3

4 4. Event Log Caching Intermittent network outages pose a significant challenge to the integrity of centralized log management. One of the most feared IT Auditor questions has long been: What happens to the log events if there is a network disruption? This is particularly true of systems leveraging syslog for log aggregation. Event Log Caching significantly enhances the integrity of the overall log management system by storing undelivered messages in memory on the originating host in the event of a transmission failure. Common sources of transmission failures include: network stack malfunction on the host machine, network device failure or misconfiguration (e.g. router), destination server being offline or network outages. Once the SNARE Enterprise Agent is notified of any problems delivering messages to the destination server, by using TCP mode the event log cache is used to preserve subsequent messages as long as the destination server is unavailable. Once a new connection can be established with the server, the cached events are forwarded to their destination. This ensures that events are not lost. 5. Guaranteed Log Message Delivery System administrators and security professionals alike are under ever increasing pressure to ensure the completeness and integrity of logs. This is particularly challenging during the process of transmitting log messages from the originating host via syslog to a centralized log repository. Leveraging the features of Smart TCP, SNARE Enterprise Agents are notified of any problems encountered during transmission and take appropriate actions to preserve event log continuity and completeness, ensuring that events make it to the target destination and that there are no lost or missing logs. 6. Encryption One of the goals of security IT is to ensure the secure and protected transportation between the agent and the collector, preventing the compromising of your security information during transit. This entails the ability to encrypt messages between the originating host and the Server, be it SNARE or others. SNARE Enterprise Agent supports both TLS and SSL* encryption, allowing the agent to securely and confidentially send event logs to any TLS or SSL* capable collection device. The agent will negotiate the best encryption available. Once the messages have been accepted by the Server, they are decrypted and processed as normal messages. By utilizing the Centralized Configuration Management option, agent message encryption can be quickly rolled out across the network, enhancing log integrity and confidentiality throughout the organization. 7. Monitor Registry Events The SNARE Enterprise Agents include the ability to apply auditing to sections of the registry and report changes, thus ensuring that the auditing system is not compromised to provide a false sense of security. 8. Dynamic DNS Support If DNS names are used in the configuration of either the Advance Remote Control or Log Message Simulcast features, generally the host name is resolved only once as the agent starts up. With dynamic DNS support, the agent can be scheduled to automatically refresh the associated IP InterSect Alliance..A Prophecy International Company Page 4

5 address. This setting is crucial for installing new SNARE Servers or dynamically changing the destination server in the event of a network or site failure (i.e. disaster recovery) without having to reconfigure or restart a single agent. This feature provides uninterrupted real time 24x7 operation. 9. External Device Monitoring, e.g. USB Devices Tracking USB device connection/disconnection is difficult using only the Windows event log. Depending on the device in question, the events generated when active varies widely in the number and amount of detail. A mechanism registers the agent directly with the operating system so as to be notified on the arrival and detach events for all USB devices. USB auditing is supported on Windows XP, 2003, 2008 and UTC for Time Zone Normalization In organizations that cover multiple time zones, the SNARE Enterprise Agent can use UTC time zone normalization to ensure the correct sequencing of events, by standardizing across geographies and time zones. 1 Agent Heartbeat The SNARE Enterprise Agent can send out regular heartbeats, letting the collecting device know that the agent is operational at all times without having to make contact and therefore enabling quick response if a system is down or being compromised. 12. Multiple Destinations Log message simulcasting allows distribution of events to multiple destinations. Each Enterprise Agent is able to simultaneously direct event logs to multiple destination servers for redundancy, disaster-recovery, correlation and transitioning purposes. Deployed along with a hot-standby SNARE Server, perhaps deployed at an off-site disaster recovery site, SNARE Enterprise Agents provide an extremely cost-effective, high-availability log management system. When deployed along with a 3rd party correlation engine or SIEM tool, Log Message Simulcasting also facilitates a best-of-breed approach to both Log and Security Event Management. The best redundancy measures in a logging architecture, is to duplicate the events at the point of generation. This function is built into the SNARE Enterprise agents, and therefore allows for full redundancy in those situations where a continuous logging operation is required. 13. Single MSI The SNARE Enterprise Agent supports being used as a single smart MSI for all Windows platforms and releases, thus ensuring a simplified and error free distribution. 14. Snare Agent Management Console The SNARE Enterprise Agents can be managed, monitored and configured by the SNARE Agent Management Console. This Console is able to query all deployed SNARE Enterprise Agents for their current configuration settings. It can then automatically compare deployed agents with the master template and remotely apply and activate an updated configuration if necessary. 15. Monitor Policy Status The SNARE Enterprise Agent sends an audit event any time it attempts to make a change to the local security policy InterSect Alliance..A Prophecy International Company Page 5

6 16. Service Tracking The SNARE Enterprise Agent sends audit events on service operations such as starting, stopping, memory usage, configuration fingerprints and any errors or warnings triggered during operations. 17. Group Policy Support The SNARE Enterprise Agent checks the MS Policy location as the primary source for configuration settings. This means that Group Policy Objects (e.g. ADM files) can be used to configure the agent in an easy and widely supported way without the need for setting "Preferences", also known as tattooing. 18. Monitor Agent Configuration Changes The SNARE Enterprise Agent monitors activity in the operating system, but, "Who is watching the watcher?" This feature adds another layer of security to the SNARE Enterprise Agents, by allowing administrators to remotely monitor changes to the Agent s configuration. 19. Event Throttling The SNARE Enterprise Agents include an event throughput EPS control for environments where there is a limited, restricted or low band width. The EPS Rate Limit is a hard limit on the number of events sent by the agent per second to any destination server. This EPS rate limit applies only to sending the events, not capturing the events. The EPS rate limit settings help to reduce the load on slow network links or to reduce the impact on the destination servers during unexpected high event rates. 20. Light on Resources Small Deployment Footprint (< 5Mb) Minimal Host Resource Requirements (E.G. <5% of CPU) Minimal Host Memory Requirements (E.G. less than 20Mb 2 Regulation Compliance The SNARE Agents provide the ability to gather information to comply with NISPOM, PCI, SOX or other regulatory requirements. 22. Real Time Event Filtering Most operating system logging sub-systems can generate a flood of events. It is therefore important that the agents are able to filter those events which contribute to the organization s security requirements, or to trap only those that are required while ignoring others, greatly reducing network traffic as well as back end server and analysis resources measured in EPS. Tailoring the required events, whilst filtering or discarding the unwanted ones, can be undertaken by the SNARE Agents. The SNARE Agents include the ability to filter events by inclusion or exclusion, using standard or complex expressions to filter on content, event type, user, and/or success/failure of the event record. Multiple objective filtering expressions may exist at any one time. The SNARE Agents find, filter and forward events in real time as they are generated, and automatically send them to the SIEM server. SNARE also provides the ability to bypass any agent filtering in situations where all events are required, and/or the resource allocation of filtering is to be performed on the server. InterSect Alliance..A Prophecy International Company Page 6

7 23. Installer The SNARE Agents include an easy to use Installer which also provides a Silent install option. 24. UDP Option SNARE Agents can use the UDP protocol for fire and forget message delivery. 25. Locale Date Information If there are locations where the language is not English, the SNARE Agent uses a fixed date and time locale of US English to ensure the integrity of the log record. 26. Stability The event collection minimizes any interference with the host's operating system and applications, so that the service can be stable and independent. 27. Latency and Real Time The SNARE Agents operate in real time mode. This means that as the events are generated, they are automatically sent to the SIEM server without delay. This provides as real time alerting as possible, as well as making it increasingly difficult to compromise a system. Deleting the local log files will not remove the events which have already been sent to the remote SIEM Server. 28. Multiple Syslog Headers Options The SNARE Agents allow for a tailorable event log format, with native SNARE or multiple syslog headers options. Most event logs are simply 'flat' text files, in which a system or application appends event records. In this case, the only discriminators required to read any type of event log would be the location of the log file, and the record structure. This could easily be coded so that these parameters are tailorable by the user, and hence able to be adapted to a wide range of event logs. 29. Remote Control Interface When the audit/event logging configuration of the target system needs to be dynamically changed, SNARE provides the ability to remotely control the SNARE Agents. The extent of the remote control functionality includes the ability to manage the filtering objectives ' of the remote agents, along with the ability for the remote agent to reset the host's event logging system. The remote control functionality is able to control almost all facets of the agent's operation. The control over the agent's operation is provided with minimal if any impact on the host. If required, the SNARE Agents are also able to change the operating system's native audit settings to match the audit collection requirements. The Advanced Remote Control feature allows each agent to be remotely configured from a set of administrator IP addresses or the IP address associated with the backup SNARE Server. 30. Native OS Audit Control The event generation or event sub-system on most modern operating systems includes the ability to control how the event logs are generated, configured and produced. On some systems this can be quite complicated and confusing. Fortunately, the SNARE Agents are able to configure the native event sub-system, and if so desired, allow only specific events to be generated which are required or defined by the security policy. Also, the SNARE Agent can be configured so that it does InterSect Alliance..A Prophecy International Company Page 7

8 not, in any way, reconfigure the underlying operating system. 3 Upgrading The SNARE Agents provide an upgrade option to preserve existing configuration settings. *This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( InterSect Alliance..A Prophecy International Company Page 8

9 Summary Are the Confidentiality, Integrity and Availability of distributed system logs critical to you? Do you currently manage a large deployment of Open Source SNARE Agents? Are you looking for a costeffective, end-to-end log analysis and management system? If the answer to any of these questions is yes, then SNARE Enterprise Agents offer high-value capabilities that simply cannot be found in any other solution available today. Many thousands of organizations, including Fortune 500, government agencies, multinational businesses and highly sensitive sites around the world rely on SNARE every second of every day as the platform of choice for audit, collection, analysis, reporting, management and archival of event information., the Trusted, Low Risk, High Value Choice. For more information visit us at or contact us as follows: The Americas 1 (800) Toll Free or +1 (303) Denver Asia Pacific Adelaide Australia Europe and the UK +44 (797) or us at intersect@intersectalliance.com Intersect Alliance International Pty Ltd shall not be liable for errors contained herein or for direct, or indirect damages in connection with the use of this material. No part of this work may be reproduced or transmitted in any form or by any means except as expressly permitted by Intersect Alliance International Pty Ltd. The Intersect Alliance logo and Snare logo are registered trademarks of Intersect Alliance International Pty Ltd. Other trademarks and trade names are marks and names of their owners as may or may not be indicated. All trademarks are the property of their respective owners and are used here in an editorial context without intent of infringement. Specifications and content are subject to change without notice. InterSect Alliance..A Prophecy International Company Page 9

Agent vs Agentless Log Collection

Agent vs Agentless Log Collection Agent vs Agentless Log Collection Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect

More information

Reflector - User Information

Reflector - User Information Reflector - User Information Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect

More information

Snare v6 - Feature Summary

Snare v6 - Feature Summary Snare v6 - Feature Summary Introduction User Interface A comprehensive range of reports Powerful Query and Output options Elegant data presentation Robust collection, and intelligent caching Enabling content

More information

LDAP and LDAP Groups for Snare Central - User Information

LDAP and LDAP Groups for Snare Central - User Information LDAP and LDAP Groups for Snare Central - User Information Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7 Release Notes for Epilog for Windows v1.7 InterSect Alliance International Pty Ltd Page 1 of 16 About this document This document provides release notes for Snare Enterprise Epilog for Windows release.

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 24 About this document This document provides release notes for Snare Enterprise Epilog for Windows release

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 21 About this document This document provides release notes for Snare Enterprise Epilog for Windows release

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 About this document InterSect Alliance International Pty Ltd Page 1 of 29 This document provides release notes for Snare Enterprise Epilog for Windows release

More information

Guide to Snare for Windows for v4.2/4.3

Guide to Snare for Windows for v4.2/4.3 Guide to Snare for Windows for v4.2/4.3 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect

More information

Evaluator Group Inc. Executive Editor: Randy Kerns

Evaluator Group Inc. Executive Editor: Randy Kerns Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright

More information

Release Notes for Snare Enterprise Agent for MSSQL Release Notes for Snare Enterprise Agent for MSSQL v1.2/1.3

Release Notes for Snare Enterprise Agent for MSSQL Release Notes for Snare Enterprise Agent for MSSQL v1.2/1.3 Release Notes for Snare Enterprise Agent for v1.2/1.3 InterSect Alliance International Pty Ltd Page 1 of 19 About this document This document provides release notes for the Snare Enterprise Agent for version

More information

Release Notes for Snare Server v6 Release Notes for Snare Server v6

Release Notes for Snare Server v6 Release Notes for Snare Server v6 Release Notes for Snare Server v6 InterSect Alliance International Pty Ltd Page 1 of 18 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be

More information

Release Notes for Snare Windows Agent Release Notes for Snare Enterprise Agent Windows v4.2/4.3

Release Notes for Snare Windows Agent Release Notes for Snare Enterprise Agent Windows v4.2/4.3 Release Notes for Snare Enterprise Agent Windows v4.2/4.3 InterSect Alliance International Pty Ltd Page 1 of 32 About this document This document provides release notes for the Snare Enterprise Agent for

More information

VMware Logging Guide for Snare Server v7.0

VMware Logging Guide for Snare Server v7.0 VMware Logging Guide for Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct,

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12 APNIC DNSSEC Policy and Practice Statement DNSSEC Policy and Practice Statement Page 1 of 12 Table of Contents Overview 4 Document name and identification 4 Community and applicability 4 Specification

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

Virtualization with Arcserve Unified Data Protection

Virtualization with Arcserve Unified Data Protection Virtualization with Arcserve Unified Data Protection Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that server virtualization

More information

PowerBroker Auditing & Security Suite Version 5.6

PowerBroker Auditing & Security Suite Version 5.6 PowerBroker Auditing & Security Suite Version 5.6 New and Updated Features BeyondTrust PowerBroker Auditing & Security Suite performs centralized real-time change auditing for Active Directory, file systems,

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager Management Agent Release Notes for HP-UX Itanium 10g Release 2 (10.2.0.1) B28767-01 April 2006 These Release Notes identify differences between the delivered Oracle Enterprise

More information

CCH Central Suite. How do I update to Microsoft.NET Framework in preparation for the CCH Central Suite? KB Article 6547 (02 Jan 2018)

CCH Central Suite. How do I update to Microsoft.NET Framework in preparation for the CCH Central Suite? KB Article 6547 (02 Jan 2018) CCH Central Suite How do I update to Microsoft.NET Framework in preparation for the CCH Central Suite? KB Article 6547 (02 Jan 2018) Legal Notice Disclaimer CCH Software has made every effort to ensure

More information

Arcserve Solutions for Amazon Web Services (AWS)

Arcserve Solutions for Amazon Web Services (AWS) Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.

More information

Arcserve Unified Data Protection Virtualization Solution Brief

Arcserve Unified Data Protection Virtualization Solution Brief Arcserve Unified Data Protection Virtualization Solution Brief Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

High Availability and Disaster Recovery Solutions for Perforce

High Availability and Disaster Recovery Solutions for Perforce High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management

More information

Symantec NetBackup Appliance Fibre Channel Guide

Symantec NetBackup Appliance Fibre Channel Guide Symantec NetBackup Appliance Fibre Channel Guide Release 2.6.1.2 NetBackup 52xx and 5330 Symantec NetBackup Appliance Fibre Channel Guide Documentation version: 2.6.1.2 Legal Notice Copyright 2015 Symantec

More information

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution February 2016 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality

More information

Virtual Disaster Recovery

Virtual Disaster Recovery The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

Direct Upgrade Procedure for Cisco Unified Communications Manager Releases 6.1(2) 9.0(1) to 9.1(x)

Direct Upgrade Procedure for Cisco Unified Communications Manager Releases 6.1(2) 9.0(1) to 9.1(x) Direct Upgrade Procedure for Cisco Unified Communications Manager Releases 6.1(2) 9.0(1) to 9.1(x) First Published: May 17, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Arcserve Cloud Frequently Asked Questions

Arcserve Cloud Frequently Asked Questions ARCSERVE CLOUD FAQS Arcserve Cloud Frequently Asked Questions The Arcserve Cloud empowers SMBs and mid-sized organizations to complete their data protection strategy with a seamless means to achieve disaster

More information

ALERT LOGIC LOG MANAGER & LOG REVIEW

ALERT LOGIC LOG MANAGER & LOG REVIEW SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure

More information

by Cisco Intercloud Fabric and the Cisco

by Cisco Intercloud Fabric and the Cisco Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted

More information

Oracle Utilities Meter Data Management Integration to SAP for Meter Data Unification and Synchronization

Oracle Utilities Meter Data Management Integration to SAP for Meter Data Unification and Synchronization Oracle Utilities Meter Data Management Integration to SAP for Meter Data Unification and Synchronization Release 11.1 Media Pack Release Notes Oracle Utilities Meter Data Management v2.1.0.0 SAP for Meter

More information

March 2011

March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring the ESSO-LM Agent Release 11.1.1.5.0 21004-01 March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring

More information

APM Import Tool. Product Guide

APM Import Tool. Product Guide APM Import Tool Product Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only and is

More information

SIEM Solutions from McAfee

SIEM Solutions from McAfee SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an

More information

SECURE CLOUD BACKUP AND RECOVERY

SECURE CLOUD BACKUP AND RECOVERY SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and

More information

Intel Small Business Extended Access. Deployment Guide

Intel Small Business Extended Access. Deployment Guide Intel Small Business Extended Access Deployment Legal Notices and Disclaimers Disclaimers INTEL CORPORATION MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE

More information

Oracle Database Firewall. 1 Downloading the Latest Version of This Document. 2 Known Issues. Release Notes Release 5.

Oracle Database Firewall. 1 Downloading the Latest Version of This Document. 2 Known Issues. Release Notes Release 5. Oracle Database Firewall Release Notes Release 5.0 for Oracle Linux E18694-04 September 2011 These Release Notes contain important information that was not included in the Oracle Database Firewall Release

More information

Centrix WorkSpace Discovery Installation Guide. Version 1.0

Centrix WorkSpace Discovery Installation Guide. Version 1.0 Centrix WorkSpace Discovery Installation Guide Version 1.0 The latest software version and documentation for this product can be downloaded here: http://www.centrixsoftware.com/downloads/discovery If you

More information

BIG-IP System: Migrating Devices and Configurations Between Different Platforms. Version

BIG-IP System: Migrating Devices and Configurations Between Different Platforms. Version BIG-IP System: Migrating Devices and Configurations Between Different Platforms Version 13.0.0 Table of Contents Table of Contents Migration of Configurations Between Different Platforms...5 About Migrating

More information

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010.

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010. Upgrading to EventTracker v6.4 b50 8815 Centre Park Drive Publication Date: Feb 17, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users upgrade from

More information

WANSyncHA Microsoft Exchange Server. Operations Guide

WANSyncHA Microsoft Exchange Server. Operations Guide WANSyncHA Microsoft Exchange Server Operations Guide About This Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

BIG-IP System: Migrating Devices. Version

BIG-IP System: Migrating Devices. Version BIG-IP System: Migrating Devices Version 12.1.3 Table of Contents Table of Contents Migration of Devices Running Different Version Software... 5 About migrating devices running different software versions...

More information

Intel Active Management Technology Overview

Intel Active Management Technology Overview Chapter 5 Intel Active Management Technology Overview Management is doing things right; leadership is doing the right things. Peter Drucker (1909 2005) As we discussed in the last chapter, Intel Active

More information

HP S1500 SSL Appliance. Product overview. Key features. Data sheet

HP S1500 SSL Appliance. Product overview. Key features. Data sheet HP S1500 SSL Appliance Data sheet Product overview The HP S1500 SSL Appliance provides hardware-accelerated Secure Sockets Layer (SSL) offloading and bridging to enable high-performance intrusion prevention

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Geolocation and Application Delivery

Geolocation and Application Delivery F5 White Paper Geolocation and Application Delivery The data from geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising. by Lori MacVittie

More information

OnCommand Unified Manager 7.2: Best Practices Guide

OnCommand Unified Manager 7.2: Best Practices Guide Technical Report OnCommand Unified : Best Practices Guide Dhiman Chakraborty August 2017 TR-4621 Version 1.0 Abstract NetApp OnCommand Unified is the most comprehensive product for managing and monitoring

More information

Desktop DNA r11.1. PC DNA Management Challenges

Desktop DNA r11.1. PC DNA Management Challenges Data Sheet Unicenter Desktop DNA r11.1 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data).

More information

Tanium Integrity Monitor User Guide

Tanium Integrity Monitor User Guide Tanium Integrity Monitor User Guide Version 1.2.4 February 20, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010.

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010. Upgrading to EventTracker v6.4 b50 8815 Centre Park Drive Publication Date: Feb 17, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users upgrade from

More information

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

Veritas NetBackup Vault Operator's Guide

Veritas NetBackup Vault Operator's Guide Veritas NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 8.1.1 Veritas NetBackup Vault Operator's Guide Last updated: 2018-09-19 Document version: NetBackup 8.1 Legal Notice Copyright

More information

Managed Security Services - Event Collector Implementation, Configuration and Management

Managed Security Services - Event Collector Implementation, Configuration and Management Service Description Managed Security Services - Event Collector Implementation, Configuration and Management The services described herein are governed by the terms and conditions of the agreement specified

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,

More information

Oracle Java SE Advanced for ISVs

Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs is designed to enhance the Java based solutions that ISVs are providing to their enterprise customers. It brings together industry leading

More information

Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7

Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7 White Paper Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7 Testing for the real world is about emulating the entire network, not just individual switches and routers. This includes

More information

product overview CRASH

product overview CRASH product overview CRASH e back up everyone, everywhere PROe Software Continuous backup for business Use CrashPlan PROe for continuous, cross-platform backup that works everywhere, enabling users to easily

More information

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of

More information

Security Correlation Server Redundancy And Failover Guide

Security Correlation Server Redundancy And Failover Guide CorreLog Security Correlation Server Redundancy And Failover Guide This document provides a discussion of techniques to implement CorreLog Server redundancy and failover, for high-availability usage of

More information

Deep Security Integration with Sumo Logic

Deep Security Integration with Sumo Logic A Trend Micro White Paper I May 2016 Install, Integrate and Analyze» This paper is aimed at information security and solution architects looking to integrate the Trend Micro Deep Security with Sumo Logic.

More information

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Business Product Factsheet Brochure Managed Defense Public Cloud Services Conquer New Digital Frontiers with leading Public Cloud Platforms. Singtel Managed Public Cloud supports enterprises in

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft BizTalk Server Release 12.1.0.1.0 E28546-04 February 2014 This document provides a brief description about the Microsoft

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Network Security Protection Alternatives for the Cloud

Network Security Protection Alternatives for the Cloud A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances

More information

Understanding Layer 2 Encryption

Understanding Layer 2 Encryption Understanding Layer 2 Encryption TECHNICAL WHITEPAPER Benefits of Layer 2 Encryption Lowest cost of ownership Better bandwith efficiency (up to 50%) Minimal ongoing maintenance routing updates transparent

More information

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage O V E R V I E W Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage Modular Hitachi Storage Delivers Enterprise-level Benefits Hitachi Adaptable Modular Storage and Hitachi Workgroup

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

TIBCO LogLogic Universal Collector Release Notes

TIBCO LogLogic Universal Collector Release Notes TIBCO LogLogic Universal Collector Release Notes Software Release 2.3.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

McAfee Embedded Control for Retail

McAfee Embedded Control for Retail McAfee Embedded Control for Retail System integrity, change control, and policy compliance for retail point of sale systems McAfee Embedded Control for retail maintains the integrity of your point-of-sale

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,

More information

IBM Europe Announcement ZP , dated November 6, 2007

IBM Europe Announcement ZP , dated November 6, 2007 IBM Europe Announcement ZP07-0484, dated November 6, 2007 IBM WebSphere Front Office for Financial Markets V2.0 and IBM WebSphere MQ Low Latency Messaging V2.0 deliver high speed and high throughput market

More information

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

How Security Policy Orchestration Extends to Hybrid Cloud Platforms How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

Technical factsheet Cloud Backup

Technical factsheet Cloud Backup Technical factsheet The Cloud Network - fast, reliable, automatic, offsite, secure backup and disaster recovery to make your life easier! No more worrying about on-premised backup failure, or anyone missing

More information

Siebel Server Sync Guide. Siebel Innovation Pack 2015 May 2015

Siebel Server Sync Guide. Siebel Innovation Pack 2015 May 2015 Siebel Server Sync Guide Siebel Innovation Pack 2015 May 2015 Copyright 2005, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

White Paper. A System for  Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS

More information

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform By the F5 business development team for the Microsoft Global Alliance Version 1.0 Introduction As the use of mobile devices in the

More information

Virtualized Network Services SDN solution for service providers

Virtualized Network Services SDN solution for service providers Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers

More information

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview. Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications

More information