Press "Enter" to skip to content

Posts published in “Security”

Installation and Configuration of Sophos Enterprise Console 5.1 in your Networks – 2. Configuration

0

Continue with previous post “Installation and Configuration of Sophos Enterprise Console 5.1 in your Networks – 1. Installation” Steps:  After the installation of the Sophos Enterprise Console you had logged off. Now you logged in and the Console starts automatically. This Windows will appear:

Installation and Configuration of Sophos Enterprise Console 5.1 in your Networks – 1. Installation

0

This post is a detail documentation how to install Sophos Enterprise Console 5.1 in your networks. Pre-Requirements: copy the Sophos Enterprise Console to the Server (ProdInstall\Sophos\Sophos Console\sec_5.1.exe) check if you are able to connect to the infrastructure server like this: http://IP Server:8085 A webpage like this should be shown to you:

OWASP Top 10 (2010, 2013, 2017)

0

The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security.  The OWASP Top 10 Web Application Security Risks was created  in 2010, 2013 and  2017 to provide guidance to developers and security professionals on the most critical vulnerabilities that are commonly found in web applications, which are also easy to…

Gartner Magic Quadrant for Endpoint Protection Platforms (2018,2017,2016,2015)

0

Research firm Gartner defines the Endpoint Protection Platform (EPP) market as one with offerings that “provide a collection of security capabilities to protect PCs, smartphones and tablets,” which it said could include anti-malware, personal firewall, port and device control, and more. The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint…

Cisco IOS Internet Key Exchange version 1 (IKEv1) Vulnerability and Fix

0

Cisco IKEv1 is still popular in VPN configuration. Most of my vpn configuration is based on IKE v1 although there are more demands for v2.  I had a post “Cisco Router IKE v2 Site to Site IPSec VPN Configuration” to quickly show what the difference is between v1 and v2, and how to do v2 configuration.  Recently some vulnerabilities scan…

NSS Labs NGFW Security Value Map Report (2017, 2016, 2014, 2013, 2012, 2011)

0

  It is good to compare with Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010) or Gartner Magic Quadrant for UTM (2017, 2016, 2015, 2014, 2013, 2012, 2010,…) End users are finding that NGFWs are no longer as limiting in their performance or capability trade-offs as they once were. NSS Labs discovered that many enterprises are choosing…

Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010)

0

Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versions for the data center. Customers should also have the option to…

Gartner Magic Quadrant for Unified Threat Management (2017, 2016, 2015, 2014, 2013, 2012, 2010,…)

1

Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) Not much changes from 2016. 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls)

Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (2017, 2015, 2013, 2012, 2010 …)

1

According to Gartner, “The network intrusion prevention system market has undergone dynamicevolution, increasingly being absorbed by next-generation firewall placements. NextgenerationIPSs are available for the best protection, but the IPS market is being pressured by the uptake ofadvanced threat defense solutions. This Magic Quadrant focuses on the market for stand-alone IDPS appliances; however, IDPS capabilities are also delivered as functionality in…