Blog Entries

03. 09. 2019 Massimo Giaimo Information Security Operations Center, NetEye, Security

NetEye SIEM: The Attacker’s Point of View

In our ethical hacking activities there are three different phases in which we clash with the themes of SIEM: PLANNING – The phase prior to the activity where we define the scope of engagement, be it for a Vulnerability Assessment, a Penetration Test or simulating a real attack CHALLENGE – The activity, corresponding to Vulnerability…

Read More
24. 07. 2019 Luca Buonocunto EriZone & OTRS, NetEye, Security

5 Bullet Points for Information Security Incident Management

Modern society has continued its increasing use of digital solutions, and today large amounts of sensitive data are stored digitally.  As the value and sensitivity of this information increases, the number of potential threats will increase accordingly. Verizon Enterprise’s RISK team recently published a report in cooperation with the United States Secret Service (USSS), the…

Read More
02. 07. 2019 Damiano Chini NetEye, Security

Proxy Authentication with Grafana 6.2

Until now, authentication of NetEye users on Grafana was achieved by means of session cookies, which were provided by the Grafana server when authenticating in Icinga Web 2. However, with the upgrade of Grafana from version 5.2 to version 6.2, we can no longer employ this authentication procedure because Grafana has discontinued the use of…

Read More
21. 03. 2019 Franco Federico NetEye, Security

Field Anonymization with NetEye 4 for GDPR

The regulations of the GDPR in many cases require that some user data is not always present, and / and or that they are anonymized.  So I would like to show you now how NetEye 4 responds to this new requirement. NetEye 4 is composed of various modules. In the NetEye 4 Log Manager, we have Elastic…

Read More
11. 03. 2019 Stefano Bruno NetEye, Security

Segregated Multitenancy Monitoring: The Satellite and the Essential Role of the CA-Proxy

In many circumstances, monitoring systems need to be extended to locations where we have no direct control. We can think for instance of a company that provides monitoring services to various customers: each with its own firewalls and each with its own security rules. The deployment of firewall rules from the central monitoring node to…

Read More
14. 05. 2018 NetEye Blog Admin NetEye, Security

IT Security Conference 2018 – Get your VIP tickets

Our rapidly changing digital world is demanding new monitoring strategies  for managing your IT infrastructure and adapting business transformations in real time. IoT, mobility and Hybrid Clouds offer opportunities as well as potential risks and challenges. How can you succeed in shifting your security posture from reactive to active, and your IT service monitoring from…

Read More
29. 01. 2018 Roberto Palmarin NetEye, Security

From Software Inventory to Vulnerabilities!

Now that your company has invested time and resources in gathering information about your entire installed base of software and equipment, how can we analyze and measure its level of security protection?  Can we identify the vulnerabilities in your company’s software?  Can we create a scoring function that measures security and how it changes over…

Read More

Archive