Sorry! The analysts paper could not be found.
Featuring 107 Papers as of October, 2013
- SANS Security Analytics Survey Dave Shackleford
- Application Security: Tools for Getting Management Support and Funding John Pescatore
-
Scaling Analytics to Meet Real-Time Threats in Large Enterprises:
A Deep Dive into LogRhythm's Security Analytics Platform Dave Shackleford- Sponsored By: LogRhythm
- Webcasts: Under Pressure: Scaling Analytics to Meet Real-Time Threats
-
How DDoS Detection and Mitigation Can Fight Advanced Targeted Attacks
John Pescatore
- Sponsored By: Arbor Networks
- Webcasts: How to Fight the Real DDoS Threat
-
Simplifying Cloud Access Without Sacrificing Corporate Control: A Review of McAfees Integrated Web and Identity Solutions
Dave Shackleford
- Sponsored By: McAfee
- Webcasts: Managing Identities in the Cloud Without Sacrificing Corporate Control: A Review of McAfee
-
The SANS Survey of Digital Forensics and Incident Response
Paul Henry, Jacob Williams and Benjamin Wright
- Sponsored By: Bit9 Cellebrite FireEye Guidance Software
- Webcasts: Digital Forensics in Modern Times: A SANS Survey
-
The SANS 2013 Help Desk Security and Privacy Survey
Barbara Filkins
- Sponsored By: RSA
- Webcasts: Securing Help Desks: A SANS Survey
-
Network and Endpoint Security "Get Hitched" for Better Visibility and Response
Jerry Shenk
- Sponsored By: Bit9
- Webcasts: Network and Endpoint Security "Get Hitched" for Better Visibility and Response
-
Reducing Risk Through Prevention: Implementing Critical Security Controls 1-4
James Tarala
- Sponsored By: Tripwire
- Webcasts: Leveraging the First Four Critical Security Controls for Holistic Improvements
-
SANS 2013 Critical Security Controls Survey: Moving From Awareness to Action
John Pescatore
- Sponsored By: FireEye IBM Symantec Tenable Network Security EiQ
- Webcasts: Critical Security Controls Survey
-
Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age
Gal Shpantzer
- Sponsored By: Trusted Computing Group
- Webcasts: Implementing Hardware Roots of Trust
-
2013 SANS Mobile Application Security Survey
Kevin Johnson and James Jardine
- Sponsored By: Box SAP Veracode
- Webcasts: Analyst Webcast: Mobile Application Security Survey Results
-
Need for Speed: Streamlining Response and Reaction to Attacks
J. Michael Butler
- Sponsored By: McAfee
- Webcasts: Analyst Webcast: Meeting the Need for Speed (and Resiliency) in Security Management Systems
- Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2 Dave Shackleford
-
Next-Generation Datacenters = Next-Generation Security
Dave Shackleford
- Sponsored By: McAfee
- Webcasts: Analyst Webcast: Datacenter Virtualization from a Security Perspective
-
The Critical Security Controls: What's NAC Got to Do with IT?
G. Mark Hardy
- Sponsored By: ForeScout
- Webcasts: Analyst Webcast: NAC Applied to the Critical Security Controls
-
Implementing the Critical Security Controls
Jim D. Hietala
- Sponsored By: Tripwire
- Webcasts: Analyst Webcast: Secure Configuration in Action (and How to Apply It)
-
Results of the SANS SCADA Security Survey
Matthew E. Luallen
- Sponsored By: ABB Industrial Defender Splunk
- Webcasts: Analyst Webcast: Results of the SANS SCADA Security Survey
- SANS Survey on Application Security Programs and Practices Jim Bird and Frank Kim
- Security Intelligence in Action: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform Dave Shackleford
-
What Is Your Mobile Content Policy? A Checklist for Content Risk Mitigation
Barbara Filkins
- Sponsored By: SAP
- Webcasts: Analyst Webcast: Secure Content Management in a Mobile Age
-
SANS Institute Product Review: Self-Service Provisioning Made Simple: A Review of Oracle Identity Manager 11g R2
Dave Shackleford
- Sponsored By: Oracle
- SANS Survey on Mobility/BYOD Security Policies and Practices Kevin Johnson and Tony DeLaGrange
- Beyond Continuous Monitoring: Threat Modeling for Real-time Response G. Mark Hardy
-
Own Your Network with Continuous Monitoring
Jerry Shenk
- Sponsored By: Tripwire
- Webcasts: Special Webcast: Own Your Own Network: Continuous Monitoring
- Securing Data Center Servers: A Review of McAfee Data Center Security Suite Products Jim D. Hietala
-
Secure Configuration Management Demystified
Dave Shackleford
- Sponsored By: Tripwire
- Webcasts: Analyst Webcast: Secure Configuration Management Demystified
-
Streamline Risk Management by Automating the SANS 20 Critical Security Controls
James Tarala
- Sponsored By: Bit9 FireEye Sensage
- Webcasts: Analyst Webcast: Streamline Risk Management With the SANS 20 Critical Security Controls
-
When Breaches Happen: Top Five Questions to Prepare For
Dave Shackleford
- Sponsored By: Solera Networks
- Webcasts: Analyst Webcast: When Breaches Happen: 5 Questions to Prepare For
-
SANS Eighth Annual 2012 Log and Event Management Survey Results: Sorting Through the Noise
Jerry Shenk
- Sponsored By: HP Enterprise Security Products LogLogic LogRhythm SenSage Splunk Tripwire Trustwave
- Webcasts: Analyst Webcast - May 01, 2012: Sorting Through the Noise: SANS 8th Log and Event Management Survey, Part I, Analyst Webcast - May 03, 2012: Sorting Through the Noise: SANS 8th Log and Event Management Survey, Part II
-
Reducing Federal Systems Risk with the SANS 20 Critical Controls
G. Mark Hardy
- Sponsored By: Tripwire Patriot Technologies
- Webcasts: Analyst Webcast Reducing Systems Risk with the SANS 20 Critical Controls
-
SANS Institute Product Review: Demystifying External Authorization: Oracle Entitlements Server Product Review
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Analyst Webcast: Demystifying External Authorization: Oracle Entitlements Server Review
- SANS Mobility/BYOD Security Survey Kevin Johnson
-
Privileged Password Sharing: "root" of All Evil
J. Michael Butler
- Sponsored By: Quest Software
- Webcasts: Analyst Webcast: Privileged Password Sharing: Root of All Evil
-
Oracle Audit Vault
Tanya Baccam
- Sponsored By: Oracle
-
NetIQ Sentinel 7 Review
Jerry Shenk
- Sponsored By: NetIQ
-
Needle in a Haystack? Getting to Attribution in Control Systems
Matthew E. Luallen
- Sponsored By: LogRhythm Splunk Tripwire
- Webcasts: Analyst Webcast: Needle in a Haystack? Getting to Attribution in Control Systems
-
Oracle Data Masking
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Tool Talk Webcast: Secure Development and Test Environments with Oracle Data Masking
-
Oracle Advanced Security
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Tool Talk Webcast: Transparent Data Encryption for Oracle Databases
-
Your Pad or Mine? Enabling Secure Personal and Mobile Device Use On Your Network
Mark Kadrich
- Sponsored By: ForeScout
- Webcasts: Analyst Webcast: "Your Pad or Mine?" Enabling Personal and Mobile Device Use On the Network
- Critical Control System Vulnerabilities Demonstrated - And What to Do About Them Matthew E. Luallen
-
SANS Institute Review: Oracle Database Vault
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Tool Talk Webcast: Oracle Database Vault: Increasing Application and Data Security
-
APT Dot Gov: Protecting Federal Systems from Advanced Threats
G. Mark Hardy
- Sponsored By: F5 Networks
- Webcasts: Analyst Webcast: Protecting Federal Systems from Persistent, Layered Threats
-
Adding Enterprise Access Management to Identity Management
J. Michael Butler
- Sponsored By: FoxT
-
SANS Institute Review: Oracle Database Firewall (Part I of an Oracle Security Product Review Series)
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Tool Talk Webcast: Oracle Database Firewall: Your First Line of Defense
-
Integrating Security into Development, No Pain Required
Dave Shackleford
- Sponsored By: IBM
- Webcasts: Analyst Webcast: Integrating Security into Development, No Pain Required
- Cloudy with a Chance of Better Health Care: Security and Compliance Fundamentals for Protecting e-Health Data Barbara Filkins
-
Optimized Network Monitoring for Real-World Threats
Dave Shackleford
- Sponsored By: VSS Monitoring
- Webcasts: Analyst Webcast: Optimized Network Monitoring for Real-World Threats
- Controlling Access, Authentication and Data on the End Point: A Review of DigitalPersona Pro 5.1 for Enterprises Jim D. Hietala
- Security of Applications: It Takes a Village Dave Shackleford
-
Continuous Monitoring: What It Is, Why It Is Needed, and How to Use It
E. Eugene Schultz, Ph.D.
- Sponsored By: Tripwire
- Webcasts: Analyst Webcast: Continuous Monitoring: What it is, Why it's needed, and How to Use it
- Network Security: Theory Versus Practice James Tarala
- SANS Seventh Annual Log Management Survey Report Jerry Shenk
-
Extending Role Based Access Control
J. Michael Butler
- Sponsored By: FoxT
- Webcasts: Analyst Webcast: Extensible Role-based Access Controls (XRBAC)
-
Implementing the 20 Critical Controls with Security Information and Event Management (SIEM) Systems
James Tarala
- Sponsored By: ArcSight
- Webcasts: Analyst Webcast: Addressing the 20 Critical Security Controls with SIEM
- Managing Insiders in Utility Control Environments Matthew E. Luallen
-
A Real-Time Approach to Continuous Monitoring
James Tarala
- Sponsored By: Netwitness Splunk
- Webcasts: Analyst Webcast: A Real-Time Approach to Continuous Monitoring
-
Compliance and Security Challenges with Remote Administration
Dave Shackleford
- Sponsored By: Netop
- Webcasts: Analyst Webcast: Remote Administration and Security Compliance
- Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors Jonathan Pollet
-
Enabling Social Networking Applications for Enterprise Usage
Eric Cole, PhD
- Sponsored By: Palo Alto Networks
- Webcasts: Analyst Webcast: Taming the Social Network Beast
-
Sentinel Log Manager Review
Jerry Shenk
- Sponsored By: Novell
-
PCI 2.0: What's New? What Matters? What's Left?
Dave Hoelzer
- Sponsored By: SecureWorks
- Webcasts: Special Webcast: PCI 2.0: What's new? What's important? What's missing?
-
How to Choose a Qualified Security Assessor
Dave Shackleford
- Sponsored By: SecureWorks
- Webcasts: Special Webcast: PCI 2.0: What's new? What's important? What's missing?
-
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
-
Cloud Security and Compliance: A Primer
Dave Shackleford
- Sponsored By: Catbird McAfee
- Webcasts: Analyst Webcast: A Primer to Compliance and Security in the Cloud
-
McAfee Total Protection for Server Review
Dave Shackleford
- Sponsored By: McAfee
-
A Guide to Virtualization Hardening Guides
Dave Shackleford
- Sponsored By: VMWare
- Webcasts: Industry Analysts Program - A Guide to Virtual Hardening Guides
-
SANS Log Management Survey: Mid-Sized Businesses Respond
Jerry Shenk
- Sponsored By: RSA
-
Keys to the Kingdom: Monitoring Privileged User Actions for Security and Compliance
Dave Shackleford
- Sponsored By: LogRhythm
-
Oracle Database Security: What to Look for and Where to Secure
Tanya Baccam
- Sponsored By: Oracle
- SANS Sixth Annual Log Management Survey Report Jerry Shenk
-
Managing Operating System (OS) Lock Down
Dave Shackleford
- Sponsored By: Trusted Computer Solutions (TCS)
- Webcasts: Automated Operating System Lockdown: Security Blanket 4.0 Review
-
Calculating TCO on Intrusion Prevention Technology
Eugene E. Schultz, Ph.D.
- Sponsored By: Sourcefire
- Webcasts: Calculating TCO with Adaptive IPS
-
Smart Strategies for Securing Extranet Access
Dave Shackleford
- Sponsored By: Oracle
- Webcasts: Smart Strategies for Securing Extranet Access
-
New Tools on the Bot War Front
Jerry Shenk
- Sponsored By: FireEye
- Webcasts: New Tools on the Bot War Front Webcast Sponsored by FireEye
-
Making Database Security an IT Security Priority
Tanya Baccam
- Sponsored By: Oracle
- Webcasts: Making Database Security an IT Security Priority Webcast Sponsored by Oracle
-
Securing a Smarter Grid: Risk Management in Power Utility Networks
Matthew E. Luallen
- Sponsored By: NitroSecurity
- Webcasts: Protecting a Smarter Grid: Power Utility Security
-
Application Whitelisting: Enhancing Host Security
Dave Shackleford
- Sponsored By: McAfee
- Webcasts: Application Whitelisting Webcast Sponsored by McAfee
-
IT Audit for the Virtual Environment
J. Michael Butler and Rob Vandenbrink
- Sponsored By: VMWare
- Webcasts: IT Audit for the Virtual Environment Webcast
-
Top Virtualization Security Mistakes (and How to Avoid Them)
Jim D. Hietala
- Sponsored By: Catbird McAfee
- Webcasts: Catbird and McAfee Virtualization Webcast
-
Data Protection Requirements
Barbara Filkins
- Sponsored By: McAfee
-
Data Protection Requirements Checklist
Barbara Filkins
- Sponsored By: McAfee
-
SANS Review: McAfee's Total Protection for Data
Dave Shackleford
- Sponsored By: McAfee
-
SANS Annual 2009 Log Management Survey
Jerry Shenk
- Sponsored By: ArcSight Intellitactics Loglogic
-
Benchmarking Security Information Event Management (SIEM)
J. Michael Butler
- Sponsored By: NitroSecurity h
-
ArcSight Logger Review
Jerry Shenk
- Sponsored By: ArcSight
-
Real-Time Adaptive Security
Dave Shackleford
- Sponsored By: Sourcefire
-
Log Management in the Cloud: A Comparison of In-House versus Cloud-Based Management of Log Data
Jerry Shenk
- Sponsored By: Alert Logic
-
Demanding More from Log Management Systems
Jerry Shenk
- Sponsored By: LogLogic
-
Monitoring Security and Performance on Converged Traffic Networks
SANS Analyst, Dave Shackleford
- Sponsored By: NIKSUN
-
Leveraging Event and Log Data for Security and Compliance
SANS Analyst, Dave Shackleford
- Sponsored By: Intellitactics
-
Data Leakage Landscape: Where Data Leaks and How Next Generation Tools Apply
SANS Analyst, Barbara Filkins and Deb Radcliff
- Sponsored By: Utimaco Trend Micro
-
The SANS Database Audit and Compliance Survey
SANS Analyst, Barbara Filkins
- Sponsored By: Lumigent
-
NetDetector/NetVCR 2005 Traffic Analyzer
Jerry Shenk
- Sponsored By: NIKSUN
-
Regulations and Standards: Where Encryption Applies
Dave Shackleford
- Sponsored By: Utimaco Safeware
-
Building Brick Houses: Applying Secure Lifecycle Practices to Web Applications
Gary W. Longsine and Jonathan Ham
- Sponsored By: Watchfire
-
Hardware Versus Software: A Usability Comparison of Software-Based Encryption with Seagate Secure™ Hardware-Based Encryption
J.D. Hietala
- Sponsored By: Seagate
-
Correlating SIM information to Detect Insider Threats
Dr. Eric Cole
- Sponsored By: SenSage
-
Using Security Information Management Systems for PCI Compliance
Dave Shackleford
- Sponsored By: SenSage
-
Encryption Procurement: Setting a Standard
Stephen Northcutt and Barbara Filkins
- Sponsored By: Utimaco
-
The SANS 2007 Log Management Market Report
Jerry Shenk
- Sponsored By: LogLogic
-
Building the Business Case for Log Management Intelligence (LMI) - November 2006
Steve Mancini and Jerry Shenk
- Sponsored By: LogLogic
-
Penetration testing: Assessing Your Overall Security Before Attackers Do - June 2006
Stephen Northcutt, Jerry Shenk, Dave Shackleford, Tim Rosenberg, Raul Siles and Steve Mancini
- Sponsored By: CORE Impact
-
The Log Management Industry: An Untapped Market - June 2006
Stephen Northcutt, Jerry Shenk & Dave Shackleford
- Sponsored By: LogLogic
-
PowerBroker vs. Sudo - February 2006
Jerry Shenk & Steve Mancini
- Sponsored By: Symark
All papers are copyrighted. No re-posting or distribution of papers is permitted.
Masters This paper was created by a SANS Technology Institute student as part of their Master's curriculum.
