?
Solved

Monitoring security tools

Posted on 2010-09-01
3
Medium Priority
?
545 Views
Last Modified: 2012-06-27
Splunk event monitoring

Tripwire

CyberArk

Which one would you guys recommend and would are some other tools would you recommend instead.
Thanks.
0
Comment
Question by:Tiras25
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 79

Accepted Solution

by:
arnold earned 750 total points
ID: 33579437
You can use an IPS,snort.

It all depends on what it is you are securing and monitoring.

the three you mentioned are good and might fit your needs which are currently unkown.

0
 
LVL 3

Assisted Solution

by:karephre
karephre earned 750 total points
ID: 33581052
Do you want to detect(IDS tools) or prevent (IPS tool). IDS will give you a log of things that happen. IPS will change your network to to protect it.
0
 
LVL 17

Author Closing Comment

by:Tiras25
ID: 33581925
Good enough.
0

Featured Post

ATEN's HDBaseT Presentation at InfoComm 2017

Hear ATEN Product Manager YT Liang review HDBaseT technology, highlighting ATEN’s latest solutions as they relate to real-world applications during her presentation at the HDBaseT booth at InfoComm 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question