RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
CN Objectives of the course To build and maintain a UNIX-based Network Systems & Servers Install Linux, fine tune the system, enable required server,
University of Florida Incident Tracking and Reporting Kathy Bergsma
NetPass and Northwestern By Julian Y. Koh As told by Robert Vance NUIT-Telecom & Network Services.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Computer Security and Penetration Testing
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
1 Soft Phone Installation and Registration Step by Step Instructions By Prof. Valencia Community College.
by Evolve IP Managed Services
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
1 Host – Based Intrusion Detection “Working of Tripwire”
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
The Leading Anti-Virus and Content Security Solution Provider MicroWorld.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Cyber Patriot Training
2006 vs Domain% of Exam 1.0 Personal Computer Components 21% 2.0 Laptop and Portable Devices 11% 3.0 Operating Systems 21% 4.0 Printers.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
York Secure Scan vs Microsoft Windows Our story and how we dealt with it.
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
September 29, 2009Computer Security Awareness Day1 Fermilab.
Honeypot and Intrusion Detection System
Presented by: Eric Rosenberg – Student Manager Client Support Behzad Barzideh – Network Manager Stony Brook Remote Support For Students.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
NuolSec VIspace Vientiane, Laos.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Protecting Students on the School Computer Network Enfield High School.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Wireless Intrusion Prevention System
Synchronized Security Revolutionizing Advanced Threat Protection
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
McAfee Antivirus Support By PCCare247 PCCare247 – Caring For Your PCs 24x7.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
McAfee Antivirus Support By Techdotcomp nd Ave, Seattle, WA 98122, USA Phone: Based on Seattle, WA.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
Open source IP Address Management Software Review
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
Al Lilianstrom CD/LSC/SOS/ESG  Blocked?  Operating Systems  Baselines  Detection  TiSSUE  Compliance  Windows  OS/X  Questions.
Xerox Analyst Training
Print Management Solution in Legal
The Apache Directory Project - Toolchain for Developers
Lessons Learned in Managing IT Risk
Print Management Solution in Legal
Call Toll Free No Avira Refund Support Australia Number Avira Antivirus is the leading antivirus software which will help you to remove malicious.
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) practice-questions.html.
2018 Real Cisco Dumps IT-Dumps
Information Security Session October 24, 2005
IP Addresses & Ports IP Addresses – identify a device on a network
IT Management, Simplified
Presentation transcript:

RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006

What is Rings Developed at the University of Kansas Open Source! Deals with: –Registration –Security –System Management –Staff Management

What is RINGS Integration with Remedy Trouble Ticket System Billing System for Voice and Cable Services

Registration ANSR DHCP (Advanced Network Services Registry) Web Based Process Activation (Rings Security Analyzer) Network Based Security Measures

ANSR DHCP Open Source! LDAP Based Java Core OS Detection

Rings Web Authentication Activation Policy Information and Quiz Receipt

For Windows Platforms OS Detection Windows Update Configuration Windows Patch Levels Anti-Virus Software Install (setup for Sophos) Virus Free Scan IP Address Detection Configure and Enable Windows Firewall

Mac and Linux OS Check Anti-Virus Software Install IP Address Detection

Network Security Measures Nessus Scans IDS IPS Rings Security Event Processor

Rings Management Administrative Tools Deactivation and Reactivation Cable Television and Voice Services

Deactivations and Reactivations Automated (Triggered) Partially Automated (requested) Non Registered Devices (requested) Notifications

Resources University of Kentucky Resnet NTS website RINGS Source Forge ANSR Source Forge RINGS presentations