{"id":1343,"date":"2004-10-19T00:00:00","date_gmt":"2004-10-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/19\/new-ways-of-measuring-security\/"},"modified":"2021-12-30T11:39:12","modified_gmt":"2021-12-30T11:39:12","slug":"new-ways-of-measuring-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/19\/new-ways-of-measuring-security\/","title":{"rendered":"New ways of measuring security"},"content":{"rendered":"<p>Information security managers at agencies and businesses have more options for protecting the organizations from cyberattacks and insider threats thanks to new wares from several security information management vendors.  Agency officials also can collect more comprehensive security data from a variety of sources as well as ensure that systems are compliant with various legislation and government regulations such as the Federal Information Security Management Act (FISMA).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Officials at Addamark Technologies Inc. are delving deeper into the security information management arena with a revamped product and a new name, SenSage Inc.<\/p>\n<p>Before refocusing, SenSage served as a repository for forensic analysis instead of gathering data in real-time like most security information management products, said Jim Pflaging, the company&#8217;s chief executive officer.  For instance, someone within an agency who has valid access might be performing suspicious activities, or the systems administrator with privileges to many systems might create bogus accounts.<\/p>\n<p>Meanwhile, officials at netForensics Inc. have released the nFX Open Security Platform, which supports the nFX framework, to help agency officials quickly identify and prioritize security issues to reduce threats and risks.  Enhancements to the platform include greater fault-tolerance capability, custom agent software development and policy compliance integration.<\/p>\n<p>New advanced threat visualization and analytics capabilities combine the visual tools with reporting and analytics so a security team can identify threats faster.<\/p>\n<p>http:\/\/www.fcw.com\/fcw\/articles\/2004\/1018\/web-secure-10-19-04.asp<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1343","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1343"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1343\/revisions"}],"predecessor-version":[{"id":3830,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1343\/revisions\/3830"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}