Press "Enter" to skip to content

Posts published by “john”

Gartner Magic Quadrant for Endpoint Protection Platforms (2019,2018,2017,2016,2015)

john 0

Research firm Gartner defines the Endpoint Protection Platform (EPP) market as one with offerings that “provide a collection of security capabilities to protect PCs, smartphones and tablets,” which it said could include anti-malware, personal firewall, port and device control, and more. The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint…

IBM Guardium v11 GIM & S-TAP Download, Install, Validation and Verification

john 0

GIM & S-Tap Download 1.)     Download GIM to Assigned Database servers 1.)   https://www-945.ibm.com/support/fixcentral/ 2.) Select the current/correct Fix Pack. This implementation is Guardium v11 GIM, S-TAP, GIM AIX & S-TAP AIX GIM & S-Tap Installation 3.) Install only GIM Client on database server (.sh) Note: require root and executable permission a) Log onto LPAR b) Sudo to Root c) Upload…

IBM Guardium V11.0 Project Implementation Notes

john 0

Guardium Project Overview The project scope is to implement the IBM InfoSphere Guardium V11 VM appliances by utilizing the Guardium Installation Manager (GIM) to setup and monitor privileged user activities at ITProSec Toronto data center. During the course of the implementation we completed the following tasks: ü  How to install Guardium Collector and central manager? ü  How to deploy GIM,…

CyberArk Backup, Failover and Failback Process

john 0

CyberArk Privileged Session Management (PSM) is a popular central control point that helps to protect target systems that are accessed by privileged accounts users throughout your data center. It usually works in conjunction with the CyberArk market-leading Privileged Identity Management Suite, an enterprise and a policy based solution that enforces, manages and secures workflows and procedures for all shared and…

Some Popular Linux VPS Bench Scripts

john 0

Cloud service providers often define host tiers by the allocated resources, but the differences in the underlying hardware, architecture and performance tuning can result in varying capabilities even between similar configurations. The easiest way to measure the real differences between servers is to run a set of tests, i.e. a benchmark, to create simple to read values for comparisons. UnixBench…

IBM Guardium: Create an Alert / Policy / Classification

john 0

An alert is a message indicating that an exception or policy rule violation was detected. Alerts are triggered in two ways: A correlation alert is triggered by a query that looks back over a specified time period to determine if alert threshold has been met. The Guardium Anomaly Detection Engine runs correlation queries on a scheduled basis. By default, correlation alerts do…

Troubleshooting WordPress Installation or Configuration Issue

john 0

Redhat Openshift made a change from Openshift online 2 to online 3. Deadline is end of Sep 2017. My blog www.51sec.org which was hosted at Red Hat Openshift Online 2 environment for last a couple of years has been migrated from Redhat Openshift Platform to AWS Linux Free Tier a couple of days ago before deadline. At the beginning, migration…