-
Applications for delivery. You never face problem with this set of technologies, as the management is always willing to spend money on applications which make them money. All kind of applications which are essentials for business operations are always bought first.
-
Preventative Tools. This set of technologies, e.g., a great Firewall, or UTM device, are also not resisted much by the management of the organisations. Because they understand that these tools are must for KEEPING the bad guys off.
-
Monitoring Tools. This set of technologies are most often resisted by the management, because they don't understand the importance of monitoring tools, as much as they should. I am sure that you know that we need monitoring tools because these tell us what gets past the preventative tools.
What are Network Security Monitoring tools?
-
Network-based threat detection
-
Proactive network queries for security data and/or “hunting” for suspicious behavior
-
Integration with one or more threat feeds
-
Create and automate security alerts
-
NMAP to discover systems and the services running on them.
-
OpenVAS to discover vulnerabilities associated with the systems on your network.
-
Next, you'll need intrusion detection system software like Snort (NIDS/IPS and host-based IDS), log analysis and event correlation tools like SIEM to trigger alarms that require more investigation. OSSIM is a great Tools for this purpose.
-
Finally, you'll use netflow analysis and packet capture tools, e.g., Wireshark, etc for in-depth analysis of the relevant traffic once an incident investigation starts. You'll also need access to the raw log data for specific incidents.
This Article Was Written & published by Meena R, Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India.
Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...
She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms.
34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook.
If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:
Click Here to follow her: Cybersecurity PRISM