Back to Results
First PageMeta Content
Cyberwarfare / Security controls / Consensus audit guidelines / McAfee / Imperva / Information security / Application firewall / Qualys / SecureWorks / Computer network security / Computer security / Computing


S p o n s o r e d W hi t e p a pe rs To get your free vendor-sponsored whitepaper, visit sans.org/tools.php AlienVault USM: A Security Operations Center for the SMB
Add to Reading List

Document Date: 2014-09-23 06:14:52


Open Document

File Size: 1,51 MB

Share Result on Facebook

City

Devices / Isolation / Protection / Reconstitution / Integrity / Channels / Testing / Screening / Attributes / Washington / D.C. / Lowell / Authorization / Software Updates / Rest / Worcester / Service / Boston / Events / Failures / Certificates / Monitoring / Records / Amherst / Programs / Analysis / Capacity / Management / Partitioning / Dartmouth / /

Company

ForeScout / Virtual ASA / Fortinet / Motorola / Novell Enterprise / Strategic Cyber LLC / Palo Alto Networks / GCHQ / Trend Micro / RogueWave Software / Akamai / Dell SecureWorks F-Response Enterprise / Intel Security/McAfee FreeSpace Enterprise / Dell / Tripwire Enterprise / IBM / Tripwire Solutions / Resource Hardening Hardware / Bradford Networks / Oracle / Homeland Security Continuous Diagnostics / Cisco / ArcSight / Solarwinds Tripwire Enterprise / UMASS / Security Compliance Corporation / Safenet / SonicWall / HP / Salesforce / VMWare / Sourcefire / TIBCO / Check Point ASA / Microsoft / Symantec Security Compliance Corporation / SANS / /

Event

FDA Phase / /

Facility

University of Massachusetts / University of Tulsa Degree Programs / /

IndustryTerm

Wireless Access Control CSC9 Data Recovery / transportation / vendor products / Wireless LAN Intrusion Prevention System / information transferring networks / financial services / hardware devices / wireless client systems / rigorous configuration management / authorized devices / Web Application Testing / Wireless Access Control PRIMARY / automated using tools / Wireless Access / open Internet / Web Application Firewalls SOLUTION / Web Application Firewall / network infrastructure devices / authorized software / internet gateways / unauthorized and unmanaged devices / Wireless Access Control The processes / Web App Firewall / in-house developed and acquired software / incident response infrastructure / wireless local area networks / vulnerable services / unauthorized and unmanaged software / /

OperatingSystem

Integrity / /

Organization

SMB Defend Your Organization / SANS Community / Department of Homeland Security Continuous Diagnostics and Mitigation / University of Tulsa / African Union / Security Operations Center / Security Intelligence / University of Massachusetts / Security Center / Dakota State University / Naval Postgraduate School / Council on CyberSecurity / Federal government / Virginia Tech / United Nations / Sailpoint System Center / /

Person

James Tarala / Cyber Simulators / Larry Wilson / Jane Holl Lute / John Pescatore / /

Position

vCenter Configuration Manager / Watch McAfee Vulnerability Manager / Assistant Secretary-General / Security Identity Manager / President / Director of Emerging Security Trends / senior company executive and Board director / Privileged Password Manager / General / Lumeta Access Auditor / Logger / President and Chief Executive Officer / McAfee Vulnerability Manager/McAfee Policy Auditor / Open Source Encryption Manager Services / Data Protection Manager / Critical Watch Endpoint Manager / McAfee Enterprise Security Manager / Deputy Secretary and chief operating officer for the Department / Guidance Software Tivoli Storage Manager / Access Auditor / McAfee Vulnerability Manager / Manager / SecureWorks Application Security Manager / Access Manager / Secretary General / HyTrust Privilege Guard / Log and Event Manager / Qualys Corporate Software Inspector / Courion Enterprise Reporter / Skybox Security Firewall Security Manager / Code Advisor / FireMon Network Configuration Manager / RSA Security Privileged identity Manager / Manager for Web / /

Product

McAfee / Critical Security Controls / Assessment / MI-3 / UK ICO Protecting Data SQL Injection / access / Fortinet McAfee / Assessment SOLUTION / CSC17 / red / Management / /

ProgrammingLanguage

SQL / php / L / R / C / /

ProvinceOrState

Virginia / Massachusetts / /

RadioStation

AM-1 / AM-2 / AM-3 / Core / /

Technology

Disk Encryption / Mobile Devices / Encryption / Wireless Access / DLP / Public Key Infrastructure / SSL / Firewall / Data Mining / Caching / local area networks / Wireless LAN / /

URL

counciloncybersecurity.org / ualys.com / www.counciloncybersecurity.org / .com / /

SocialTag