Hazem's Hydra Hub حازم عنزاوي

Hazim Anzawi | Ananza | عنانزة الإعلامية

July 22, 2014 3:40 pm

What is SOAP?

98235-how-to-use-a-web-service.jpg

XML SOAP is a language that allows a program running in one operating system to communicate with another program in another operating system over the internet.

A group of vendors from Microsoft, IBM, Lotus and others, created an XML-basedprotocol that lets you activate applications or objects within an application across the Internet. SOAP codifies the practice of using XML and HTTP to invoke…

View On WordPress

2:49 pm

2page-img1-4.jpg

Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organization’s information technology (IT) security. SIEM combines SIM (security information management) and SEM (security event management) functions into one security management system. The acronym is pronounced “sim” with a silent e.

The underlying principle of a SIEM system is that relevant data about an enterprise’s security is produced in multiple locations and being able to look at all the data from a single point of view makes it easier to spot trends and see patterns that are out of the ordinary.

SIEM.jpg

SIEM systems collect logs and other security-related documentation for analysis. Most SIEM systems work by deploying multiple collection agents in a hierarchical manner to gather security-related events from end-user devices, servers, network equipment — and even specialized security equipment like firewalls, antivirus or intrusion prevention systems. The collectors forward events to a centralized management console, which performs inspections and flags anomalies. To allow the system to identify anomalous events, it’s important that the SIEM administrator first creates a profile of the system under normal event conditions.

At the most basic level, a SIEM system can be rules-based or employ a statistical correlation engine to establish relationships between event log entries. In some systems, pre-processing may happen at edge collectors, with only certain events being passed through to a centralized management node. In this way, the volume of information being communicated and stored can be reduced. The danger of this approach, however, is that relevant events may be filtered out too soon.

SIEM systems are typically expensive to deploy and complex to operate and manage. While Payment Card Industry Data Security Standard (PCI DSS) compliance has traditionally driven SIEM adoption in large enterprises, concerns over advanced persistent threats (APTs) have led smaller organizations to look at the benefits a SIEM managed security service provider (MSSP) can offer.

What is SIEM? Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organization’s information technology (IT) security.
2:40 pm

Palo Alto Integrates Next-Generation Firewall With VMware NSX

Palo Alto Integrates Next-Generation Firewall With VMware NSX

allwyn21-500x306.png

New firewall appliance combines Palo Alto’s Panorama central management platform with ESXi VMs by plugging into the NSX virtual network controller.

When VMware launched NSXearlier this year, it promised a network controller — extensible using published APIs — that allows higher level network services such as firewalls, load balancers and application accelerators to plug in at any point in a…

View On WordPress

1:34 pm

Who is FireEye

FireEye-IT-Security-Revolution.jpg

FireEye, ranked the fastest growing communications/networking company in North America on Deloitte’s 2013 Technology Fast 500™, is transforming the IT security landscape to combat today’s advanced cyber attacks and we want you to be part of our team.
FireEye’s disruption in the IT security industry has been all over media outlets such as in BusinessWeek, Bloomberg TV, The Wall Street Journal, Fox…

View On WordPress

12:07 pm

momo33me:

Photos of the BBC protest in belfast. 21 July 2014

(via bloodxtalon5)

July 21, 2014 10:17 pm 8:52 pm July 19, 2014 11:45 pm July 17, 2014 2:34 pm 1:42 pm
Whale frolics in the waters

An adult Southern Right Whale frolics in the waters off Warriewood Beach in Sydney, Australia, Thursday, July 17, 2014.

Whale frolics in the waters

An adult Southern Right Whale frolics in the waters off Warriewood Beach in Sydney, Australia, Thursday, July 17, 2014.