Splunk Enterprise is the platform for machine data. It's the easy, fast and resilient way to collect, analyze and secure the massive streams of machine data generated by IT systems and technology infrastructure.
Troubleshoot problems and investigate security incidents in minutes (not hours or days). Monitor your end-to-end infrastructure to avoid service degradation or outages. Gain real-time visibility and critical insights into customer experience, transactions and behavior. Make your data accessible, usable and valuable to everyone.
In the process of launching SecureSphere 10.0, Imperva also unveiled ThreatRadar Community Defense. An interesting concept, it utilises crowd-sourced threat information that gathers live attack data from WAFs deployed around the world and distributes this data in near real-time.
The Community Defense system is combined with the existing ThreadRadar service to provide a better insight into attacker identity. It allows for a more complete protection against hackers, automated clients and zero-day attacks.
BeyondTrust have just released the results of its Virtual Insecurity survey, revealing that organisations are relying heavily on virtualization vendors for security if for any security at all.
Key takeaways from the survey included:
The recent disclosure that thousands of Internet-facing SAP NetWeaver implementations are vulnerable to severe compromises will no doubt send some admins scurrying to their security team.
But the release of this information raises a question - is it preferable to fix each vulnerability or secure the environment? We definitely lean to the latter, but see much of the former (and also are sympathetic to some of the reasons why this occurs). In this instance with the SAP NetWeaver vulnerability one of the frustrating things if trying to fix the vulnerability is that without access to the code you are completely dependent on a fix being provided by the vendor. And this is similar for just about any off the shelf web applications. (It also applies to databases - think the Oracle vulnerabilities).