Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Raytheon enhances malicious insider threat and privileged user abuse detection with new SureView release
by Staff Writers
Dulles VA (SPX) Apr 29, 2014


File image.

Raytheon has made improvements to its SureView suite, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.

With this release, commercial and federal organizations now have access to a Privileged User Monitoring and Auditing (PUMA) Policy Pack specifically designed to enable SureView to detect malicious acts and policy violations by privileged users that often go undetected. Additionally, this latest release includes SureView Spotlight, a software development kit that allows integration with best-of-breed analytic solutions.

"For more than a decade, customers have relied on SureView to detect and stop malicious activity inside their networks. SureView is a proven solution specifically built to address human behavior and provide the insight necessary to recognize both malicious and non-malicious insider threats," said Ed Hammersla, managing director of Raytheon Cyber Products at Raytheon Intelligence, Information and Services.

"The latest enhancements to SureView are the result of customer inputs and lessons learned from long-term deployment. In fact, the PUMA Policy Pack was developed to meet requirements specifically articulated by our customers to mitigate the privileged user threat."

Additional New features of SureView include:

+ Host-based Network Traffic Monitoring and Collection: Because many network incidents can be attributable to simple negligence, SureView's new network collector monitors and captures the actual network traffic. If connections or ports are found open, leaving them vulnerable to attack, an alert is sent that includes the user who left the connections open.

+ Simplified Policy Creation: Now policies can be created with a simple right click and by leveraging Window's event logs.

+ New Collection Capability: Monitors and collects data published to Windows event log providing easy integration with other technologies such as third party Security Information and Event Management (SIEM) systems.

+ Enterprise Application Suite Enhancements: This release supports large scale deployments with enhanced user, agent and group management. It also provides the ability to generate contextual reports with a simple "right click" and export data to a file that is printer friendly.

.


Related Links
Raytheon
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Microsoft grapples with Internet Explorer security flaw
Washington (AFP) April 28, 2014
Microsoft was scrambling Sunday to repair a security hole in its widely used Internet Explorer web browser, saying it had detected attempts to exploit the flaw. The US software giant said that the coding problem affected versions six through 11 of its flagship browser, noting it was aware of "limited, targeted attacks" taking advantage of the newly discovered flaw. Microsoft says that a ... read more


CYBER WARS
Raytheon touts ballistic missile defense weapon

Russia warns Ukraine against missile technologies proliferation

Japan orders to shoot down any new N Korea ballistic missile launches

US to send two more missile defence ships to Japan: Hagel

CYBER WARS
Raytheon advancing cruise missile capabilities

International customer signs agreement with USG for Raytheon's TOW missiles

US Navy deploys Standard Missile-3 Block IB for first time

LockMarts GMLRS Warhead Logs Successful Flight-Test Series

CYBER WARS
Lockheed Martin Marks Milestone in Development of Unmanned Technologies

Lockheed Martin Demonstrates Enhanced Ground Control System and Software for Small Unmanned Aircraft

US Military hopes AI autopilot can replace flight crews

Air Force taps Engility Holdings for remotely piloted aircraft support

CYBER WARS
Radio terminals for MUOS satellite communications have testing facility

High Gain Amplifiers for Commercial and Military Radar Released by Pasternack

Tactical radios tested with MUOS waveform

Harris supplying more communications terminals to Navy

CYBER WARS
Nexter, Chemring in deal over ammunition manufacturers

A-T Solutions continues counter-IED work

Lockheed Martin Team's Joint Light Tactical Vehicle Tops 100,000 Testing Miles During EMD Phase

Patria vehicles getting Saab communications electronics

CYBER WARS
EU firms help power China's military rise

Deloitte says defense industry profits dipped in 2013

MENA military spending to reach $920 bn by 2020: study

Saudis seek FMS support deal

CYBER WARS
Ukraine on 'combat alert' as rebels gain ground

Geopolitical Drift

Danish NATO warplanes land in Estonia amid Ukraine crisis

Chinese dissident freed after nine years: reports

CYBER WARS
Nanomaterial Outsmarts Ions

Fluorescent-based tool reveals how medical nanoparticles biodegrade in real time

World's thinnest nanowires created by Vanderbilt grad student

How to create nanowires only three atoms wide with an electron beam




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.