Re: NEW Topic: Network Mapping Intrusion Detection style

From: Ron Gula (rgula_at_tenablesecurity.com)
Date: 01/07/04

  • Next message: Joel Snyder: "Target based IDS review and discussion in Information Security"
    Date: Wed, 07 Jan 2004 15:11:20 -0500
    To: <focus-ids@securityfocus.com>
    
    

    At 07:39 PM 1/6/2004 -0700, Teicher, Mark (Mark) wrote:
    >Has anyone seen products that can produce a network map based on
    >vulnerabilities, host information and types of intrusions?
    >
    >NAI/SNI Ballista had a rudimentay 3-d mapping tool, but not enough to
    >produce a nice slick diagram for an organization.
    >
    >Qualys has a nice free mapping tool, but not enough to produce a
    >detailed diagram
    >
    >Anyone other vendor ??
    >
    >/m

    Lightning Console produces network maps based on distributed
    vulnerability scanning. You can then project actively detected
    vulnerabilities, passively detected vulnerabilities and/or IDS
    events from Snort, Dragon, ISS, .etc onto the map. These maps
    are also in PNG format and viewable from any web browser.

    Ron Gula, CTO
    Tenable Network Security
    http://www.tenablesecurity.com

    ---------------------------------------------------------------------------
    ---------------------------------------------------------------------------


  • Next message: Joel Snyder: "Target based IDS review and discussion in Information Security"