Press "Enter" to skip to content

Posts published by “john”

Gartner CASB (Cloud Access Security Brokers) Magic Quadrant (2019,2018,2017)

0
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px 'Helvetica Neue'; color: #454545}
Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders concerned about their organizations’ cloud use should investigate CASBs.

2019

In Gartner’s third annual Magic Quadrant for Cloud Access Security Brokers (CASB), Microsoft, McAfee, Netskope, Symantec (Broadcom), and Bitglass were named a Leader based on its completeness of vision and ability to execute in the CASB market.

Configure CyberArk PVWA and PSM for SQL Server Management Studio Version 17

0

Using CyberArk PVWA and PSM to manage SQL Server Management Studio connection is one of use cases in the project. Unfortunately, there was not much detailed documentation how we can get this job done. I have searched CyberArk document site and found following two KBs are very helpful: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Optional-Setting-up-PSM-for-Databases-and-Virtualization.htm https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Optional-Setting-up-PSM-for-Databases-and-Virtualization.htm#_Ref292008898 Eventually I have gone through those documents and guessed some steps to get this configuration working. I am trying to summarize those steps here for…

Gartner Magic Quadrant for Endpoint Protection Platforms (2019,2018,2017,2016,2015)

0

Research firm Gartner defines the Endpoint Protection Platform (EPP) market as one with offerings that "provide a collection of security capabilities to protect PCs, smartphones and tablets," which it said could include anti-malware, personal firewall, port and device control, and more.

The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint protection should investigate the quality of protection capabilities, the depth and breadth of features, and the ease of administration. The enterprise endpoint protection platform (EPP) is an integrated solution that has the following capabilities: anti-malware, personal firewall, port and device control. EPP solutions will also often include: vulnerability assessment, application control and application sandboxing, enterprise mobility management (EMM), typically in a parallel nonintegrated product, memory protection, behavioral monitoring of application code, endpoint detection and remediation technology full-disk and file encryption, also known as mobile data protection, endpoint data loss prevention (DLP).

2019

IBM Guardium v11 GIM & S-TAP Download, Install, Validation and Verification

0

GIM & S-Tap Download 1.)     Download GIM to Assigned Database servers 1.)   https://www-945.ibm.com/support/fixcentral/ 2.) Select the current/correct Fix Pack. This implementation is Guardium v11 GIM, S-TAP, GIM AIX & S-TAP AIX GIM & S-Tap Installation 3.) Install only GIM Client on database server (.sh) Note: require root and executable permission a) Log onto LPAR b) Sudo to Root c) Upload guard-bundle-GIM-9.0.0_r73521_v90_1-aix-6.1-aix-powerpc.gim.sh to temp dir d) chmod +x guard-bundle-GIM-9.0.0_r73521_v90_1-aix-6.1-aix-powerpc.gim.sh e) Install script using following command, ./guard-bundle-GIM-9.0.0_r73521_v90_1-aix-6.1-aix-powerpc.gim.sh…

IBM Guardium V11.0 Project Implementation Notes

0

Guardium Project Overview

The project scope is to implement the IBM InfoSphere Guardium V11 VM appliances by utilizing the Guardium Installation Manager (GIM) to setup and monitor privileged user activities at ITProSec Toronto data center. During the course of the implementation we completed the following tasks:

ü  How to install Guardium
Collector and central manager?
ü  How to deploy GIM, STAPS etc.
for deployment
ü  How to create Policies,
reports etc. for monitoring
ü  Any IBM Guardium links,
tuning steps, troubleshooting steps
ü  Identified and reviewed Guardium POC implementation
and related policies, activities and reports run on the database servers in the
project scope

CyberArk Backup, Failover and Failback Process

0

CyberArk Privileged Session Management (PSM) is a popular central control point that helps to protect target systems that are accessed by privileged accounts users throughout your data center. It usually works in conjunction with the CyberArk market-leading Privileged Identity Management Suite, an enterprise and a policy based solution that enforces, manages and secures workflows and procedures for all shared and privileged accounts in data centers.

PAM Solution High Availability Design Sample

You cannot copy content from 51sec.org.