In our special Integration of Networking and Security School, SearchSecurity.com -- in cooperation with SearchNetworking.com -- offers an in-depth look at how the integration of security-related and networking-related team, products and processes is affecting enterprise network security.
SearchSecurity.com is always looking for ideas for future lessons in our Integration of Networking and Security School. Contact us if you have feedback on this school or ideas for future content.
Table of contents:
About the author: Char Sample has close to 20 years of experience in Internet security, and she has been involved with integrating various security technologies in both the public and private sectors.
Learn valuable techniques for sifting through logs to find legitimate security events you need to analyze and respond to before they negatively affect your organization’s bottom line.
John Burke is a Principal Research Analyst with Nemertes Research, where he conducts primary research, develops cost models, delivers strategic seminars, advises clients, and writes thought-leadership pieces across a wide variety of topics. John's main focus of research are cloud computing, virtualization, application delivery networking, SOA, and SaaS. His other areas of expertise are information stewardship (including information protection, information lifecycle management, business continuity planning, compliance, and data quality management) and storage technologies.
In this Security School lesson, expert Lisa Phifer explores new strategies, policies, practices and tools that can be used to rein in unruly endpoints.
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology.
While network security professional need to be familiar with firewall rulesets, IPS/IDS and NBADs how do these technologies align with an enteprise’s business needs? This SearchSecurity School will explain key network security practices and technologies and how they can be mapped to business needs. Specifically our expert will explain how to make a pitch for enhancing network security in business terms, how to help network security teams prioritize time/effort/budget as well as the most effective network security technologies that can prevent network intrusions and make sense to the C-suite.About the author:
Jennifer Jabbusch is CISO with Carolina Advanced Digital Inc.
In this lesson, learn how to organize an application log management program for the tasks in a multi-regulation environment while avoiding duplication of effort.
About the author:
Diana Kelley is Diana Kelley is a partner with consulting firm SecurityCurve.
In this lesson, learn what the main threats are to the application layer, and how to leverage existing tools to help protect against these threats.
About the author:
Cory Scott is the regional director for consulting services at Matasano Security.
Evolving threats -- like new malware and untracked sensitive data -- coupled with a difficult economy make protecting the endpoint more important than ever. In this lesson, learn strategies to create a strong endpoint security program on a shoestring budget.
SIM products are useful enterprise security tools, but all too often, users end up with more log files than they know what to do with. Learn how to get only the essential and relevant data from your security information management systems. This lesson reviews the best tools and explains how focused SIM data can help with compliance, access control, and much more.
About the author:
Adrian Lane is a senior security strategist with independent consulting firm, Securosis, LLC.
Contaminated network endpoints are a top concern within 75% of organizations, according to a recent SearchSecurity.com survey of nearly 900 IT professionals. It's a problem that is increasingly becoming one that networking and security teams must solve together.
In this lesson, network security luminary Joel Snyder outlines the latest endpoint security options, the elements essential to every endpoint security strategy and advice for when it's time to select a new endpoint security product.
Whether you're considering NAC for the first time or are deep into a company-wide deployment, this lesson will show you how to use NAC policies and tools to develop a endpoint protection security strategy and complaince.
About the author:
Mike Chapple, CISSP, is an IT security pro with the University of Notre Dame.
Also featuring special guest instructor Joel Snyder of Opus One.
A recent TechTarget survey of nearly 1,000 IT pros shows that network/security integration is a top priority for most organizations. One of the most important steps toward integration is the effort to correlate and analyze data outputs from SIMs, network performance management and anomaly detection tools. The goal is to understand and react to bandwidth and application performance issues but also sound the alarm when data flows show anomalous behavior.
In this Integration of Networking and Security School lesson, we'll discuss how this can be done, the benefits and the potential pitfalls to this approach.
Over 80% of corporate network traffic is generated from remote offices, according to research firm Gartner. Here, noted network security expert David Strom will focus on securing the remote data and remote network devices in locations beyond the corporate headquarters.
In this lesson, Strom will provide an overview of the remote office security management landscape, step-by-step advice for setting up a managed unified threat management remote firewall/ VPN and real-world advice from security practitioners on remote office security.
According to a recent SearchSecurity.com survey of nearly 900 IT professionals, 80% of networking and security pros are concerned about application layer gateways.
In this lesson, application security expert Michael Cobb offers an overview of how the network can be used to secure the application layer, information on the latest Layer 7 firewalls and switches and advice on the balancing act of appropriately securing the network versus instilling sound application development practices.
To cut costs and increase efficiency, many enterprises are combining disparate communications systems, including email, IM, video conferencing, desk and mobile telephony and voice messaging. In this lesson, learn how to properly secure this new and evolving enterprise commuications environment.
About the author:
Andrew Hutchison is an information security specialist with T-Systems International and an adjunct professor of computer science at the University of Cape Town in South Africa.
This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
About the author: Mike Rothman is president and principal analyst of Securosis, an independent information security research firm.