Web Page sponsored by Cassidian
25 Apr 14. Raytheon Company announced the latest developments found in their new SureView™ release, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.
With this release, commercial and federal organizations now have access to a Privileged User Monitoring and Auditing (PUMA) Policy Pack specifically designed to enable SureView to detect malicious acts and policy violations by privileged users that often go undetected. Additionally, this latest release includes SureView Spotlight™, a software development kit that allows integration with best-of-breed analytic solutions. Additional New features of SureView include:
* Host-based Network Traffic Monitoring and Collection: Because many network incidents can be attributable to simple negligence, SureView’s new network collector monitors and captures the actual network traffic. If connections or ports are found open, leaving them vulnerable to attack, an alert is sent that includes the user who left the connections open.
* Simplified Policy Creation: Now policies can be created with a simple right click and by leveraging Window’s event logs.
* New Collection Capability: Monitors and collects data published to Windows event log providing easy integration with other technologies such as third party Security Information and Event Management (SIEM) systems.
* Enterprise Application Suite Enhancements: This release supports large scale deployments with enhanced user, agent and group management. It also provides the ability to generate contextual reports with a simple “right click” and export data to a file that is printer friendly.
As a policy-based cyber audit solution, SureView monitors employees’ activities, including the accessing of classified networks, while safeguarding privacy and legally protected whistleblower communications. It provides irrefutable and unambiguous attribution of end-user activity, providing context to rapidly discern malicious activity from benign actions. SureView also integrates with best of breed SIEM tools.
29 Apr 14. A US House Armed Services subcommittee on Tuesday released legislation that would require Pentagon officials to conduct several sweeping reviews of military intelligence programs. HASC’s Intelligence, Emerging Threats and Capabilities subcommittee’s version of the lower chamber’s 2015 National Defense Authorization Act (NDAA) contains no dollar figure for how much it would authorize the military to spend on things like intel, special operations forces and cyber. Those funding levels will be decided next week by the full Armed Services Committee. But a review of the subcommittee’s bill shows it largely supports the Pentagon’s 2015 request in each area. The legislation, to be voted on by the panel Wednesday morning, contains a slew of provisions raising concerns about the Pentagon’s intelligence, special operations and cyber activities. Those typically are accompanied by requirements for reports and data on those matters. The legislation ‘fully’ supports the Pentagon’s requested cyber plans. But it calls for the department “to develop an assessment of cyber Command functions,” according to a HASC summary of the legislation. It also would “direct the secretary of defense to establish an executive agent to coordinate and oversee cyber training and test ranges, critical to operationalizing and improving our DoD cyber forces.” According to the summary, it calls for a number of reports on intel and special operations programs and activities. The bill would:
*Direct DoD to review and assess intelligence activities by U.S. Special Operations Forces and U.S. Special Operations Command as part of the committee’s robust oversight of intelligence activities.
*Direct the Undersecretary of Defense