
Information Security
- FeatureWhat's a Hot Pick?
- FeatureAt Your Service: August 2006 managed services security news
- FeatureSingle Sign-On Explained
- FeatureIt's a Dirty Job...
- FeatureUser authentication options: Using two factor authentication for security
- FeatureSecurity Event Management
- FeatureThree Pitfalls to Avoid
- FeatureWeb Application Break-In
- FeatureIDP/Network Access Control
- FeatureBuyers look for demonstrable success in innovative companies
- FeatureSecure Reads: Steganography and the art of covert communication
- FeatureAkonix Systems' Akonix A-Series Product Review
- FeatureInstant Messaging: Symantec IM Manager 8.0
- FeatureVendor Security Product News and Updates
- FeatureEditor's Desk: Consolidation is in
- FeatureLayer 8: Personal devices put enterprise data at risk
- FeaturePerspectives: Frame security as a business concept
- FeaturePing: Heidi Kujawa

iSTOCK/GETTY IMAGES
At Your Service: August 2006 managed services security news
MANAGED SECURITY SERVICES NEWS
Virtual-SOC; Security Event and Log Management
Internet Security Systems
Price: Security event and log management services start at $200 per network device
Internet Security Systems' (ISS) Virtual Security Operations Center (SOC) for managed security services is an online platform for monitoring and controlling security operations across both ISS and third-party security and networking devices.
Virtual SOC allows companies to have a centralized view of both on-premise and remotely managed network and security devices through a single interface.
ISS is also introducing security event and log management services, which allow organizations to aggregate, correlate, analyze and archive security events.
Security Risk Profiling Service
VeriSign
Price: Per asset, typically starting at around $50,000 per engagement
VeriSign's Security Risk Profiling Service provides a holistic view of threats, vulnerabilities, network access policies and business impacts, generating a dynamic risk score based on those factors.
Using simulation and modeling technology, the service helps customers understand the impact of emerging threats and potential network security policy changes, and to measure compliance.
The service leverages technology from Skybox Security to combine data from firewalls, routers and vulnerability management systems to deliver automated IT security modeling, simulation and visualization.
Start the conversation
0 comments