suresec siem and network performance management

19

Click here to load reader

Upload: ertugrul-akbas

Post on 19-May-2015

3.800 views

Category:

Technology


0 download

DESCRIPTION

Suresec SIEM and Network Performance Management

TRANSCRIPT

Page 1: Suresec SIEM and Network Performance Management

AN

ET

20

13

Su

rese

c

Page 2: Suresec SIEM and Network Performance Management

1. SURESEC .................................................................................................................................................................... 3

2. SIEM .......................................................................................................................................................................... 4

Correlation Engine ........................................................................................................................................................ 4

Sample Correlation Rules .......................................................................................................................................... 5

What problems does it solve? ...................................................................................................................................... 6

What features does it offer? ......................................................................................................................................... 6

What platforms and devices does it support? .............................................................................................................. 7

3. LOG MANAGEMENT .................................................................................................................................................. 7

Comprehensive Log Data Collection and Log Management ......................................................................................... 8

Cross-platform Log Collection ....................................................................................................................................... 8

Windows Event Logs: Agent-less or Agent-based ........................................................................................................ 9

Syslog ............................................................................................................................................................................ 9

Flat File Logs .................................................................................................................................................................. 9

Universal Database Log Collection and Log Management ......................................................................................... 10

Scalable Log Centralization ......................................................................................................................................... 10

Log Archiving and Retrieval ......................................................................................................................................... 10

4. Performance & Availability Monitoring Features ................................................................................................... 11

Cross-domain Visibility ................................................................................................................................................ 12

Business Service Management ................................................................................................................................... 12

Root-cause Analysis .................................................................................................................................................... 12

SLA Monitoring & Powerful Reporting........................................................................................................................ 12

SLA Dashboard & Business Views ........................................................................................................................... 12

Trend Monitoring&Capacity Planning ........................................................................................................................ 13

Fault Management ...................................................................................................................................................... 13

5. ABOUT ANET ........................................................................................................................................................... 14

Page 3: Suresec SIEM and Network Performance Management

1. SURESEC: INTEGRATED SECURITY PERFORMANCE AND AVAILABILITY

MONITORING

Suresec delivers enterprise security and network management capabilities including SIEM capabilities, NOC level

visibility, management of multiple and geographically distributed networks and automatic failover and

redundancy for continuous operations. This enables organizations to include RF, microwave and IP communications

systems, as well as cyber security, physical security, and even infrastructure, such as HVAC, UPS and power systems

in a unified dashboard with centralized alarming and integrated event management.

Security Information and Event Management Log Management Security Reporting

Network Management High Availability & Redundancy Performance Management

Event Correlation & Analysis Low 5651 Support Fault Management

Network Operations & Security Management Proactive Application Monitoring Bandwidth Management

Data Center Server Management

Multi-Functional Management Platform

Integrated Security and Network Management Platform

SIEM, Network Monitoring and Log Management Solution

Real-time availability management across thousands of devices, including applications as diverse as satellite,

cryptography and security devices.

Granular control over any type of event definition, with the ability to collect, normalizes and integrates data from any

device, application or service.

Page 4: Suresec SIEM and Network Performance Management

2. All-in-One IT Monitoring

Suresec is a monitoring application to integrate security (SIEM), performance, and availability monitoring in a single

application. We monitor devices, users and applications across the entire IT infrastructure - on premise, in the cloud,

or a hybrid of both - from a single pane of glass.

3. SIEM

Suresec is a web based, agent-less, SIEM, log analysis, network monitoring and reporting software. The software

application monitors, collects, analyzes, and archives logs and monitoring parameters from enterprise-wide network

perimeter security devices, Routers, Switches, SNMP Devices, VM, DHCP servers, Linux or Windows Systems then

generate reports. The devices are, Firewalls, Proxy servers, Intrusion Detection System (IDS)/Intrusion Prevention

System (IPS), and Virtual Private Networks (VPN), Mail Servers like MS Exchange Servers, Zimbra Mail Servers, Postfix

Mail Servers etc.. , distributed Windows hosts, distributed Unix hosts, Routers, Switches, and other SysLog devices,

Application like IIS web server, IIS FTP server, MS SQL server, Oracle database server, DHCP Windows and Linux

servers. The Suresec application generates graphs and reports that help in analyzing system problems with minimal

impact on network performance. Two prominent features of the application are network monitoring and security

reports.

Correlation Engine

The Correlation Engine leverages predefined rules to identify attack patterns and malicious behavior. When trying to

penetrate a system, attackers often take advantage of the fact that security controls are rarely working together and

are rarely monitored. Correlation Engine helps to automate that analysis so that attacks can be quickly identified and

breaches can be quickly contained.

Page 5: Suresec SIEM and Network Performance Management

Sample Correlation Rules

User Authentication

Alert on 5 or more failed logins in 1 minute on a single user ID

Attacks on the Network

Alert on 15 or more Firewall Drop/Reject/Deny Events from a single IP Address in one minute

Alert on 3 or more IPS Alerts from a single IP Address in five minutes.

Virus Detection/Removal

Alert when a single host sees an identifiable piece of malware

Alert when a single host fails to clean malware within 1 hour of detection.

Alert when a single host connects to 50 or more unique targets in 1 minute

Alert when 5 or more hosts on the same subnet trigger the same Malware Signature (AV or IPS)

within a 1 hour interval.

Web Server

Files with executable extensions (cgi, asp, aspx, jar, php, exe, com, cmd, sh, bat), are posted to a

web server, from an external source

Black-listed applications

Alert when an unauthorized application (e.g. Teamviewer, LogmeIn, Nmap, Nessus, etc.) is run on

any host

Monitored Log Sources

Alert when a monitored log source has not sent an event in 1 Hour

User Activity Reports

All Active User Accounts (any successful login grouped by account name in the past XX days)

Active User List by Authentication type

a) VPN Users

b) Active Directory Users

c) Infrastructure Device Access (Firewalls, Routers, Switches, IPS)

User Creation, Deletion and Modification (A list of all user accounts created, deleted or modified)

Access by any Default Account – (Guest, Root, Administrator, or other default account usage)

Password resets by admin accounts in the past 7 days.

Page 6: Suresec SIEM and Network Performance Management

Access Reports

Access to any protected/monitored device by an untrusted network

a) VPN Access to Server Zone

b) Access by a Foreign Network to Server Zone

Malware

A list of host addresses for any identified malware or attack - grouped by malware name

A count of any given malware (grouped by Anti-Virus Signature), over the past XX days

Email activity

Top 10 E-mail subjects

Top 10 addresses to send email

Top 10 addresses to receive email

Top 10 addresses to send email with largest total size (MB)

Top 10 addresses to receive email with largest total size (MB)

Web Content

Top 10 Destinations by Domain Name

Top 10 Blocked Destinations by Domain Name

Top 10 Blocked Sources by IP Address

Top 10 Blocked categories

Total sent and received bytes grouped by IP addresses

User Account activity

Top 10 Failed Logins

What problems does it solve?

Suresec helps network security administrators & IT Managers for bandwidth monitoring, Firewall internet

security events monitoring efficiently. Also the Suresec software generates reports to comply with various

regulations such as Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act

(GLBA), Sarbanes-Oxley Act (SOX), and Payment Card Industry Data Security Standards (PCI) and

archives logs for the purpose of network auditing and forensic analysis. The Suresec software also reduces

system downtime, and increases network performance in the enterprise. It helps system administrators to

troubleshoot problems on hosts, select applications, and the network. The logs event manager software helps

organizations meet host-based Security Information Event Management (SIEM) objectives.

What features does it offer?

Multiple Device/ Vendor Support, Flexible Log Archiving, Capability to view traffic trends and usage

patterns, Multi-level drill down into top hosts, protocols, web sites and more, VPN/ Squid Proxy Reports,

Multi-varied Reporting Capabilities, Centralized event log management, Compliance reporting, Automatic

alerting, Historical trending, Security analysis, Host grouping, Pre-built event reports, Customizable report

profiles, Report scheduling, Multiple report formats. Compliant with Turkish Law 5651 which guaranties

that logs cannot be changed and digitally signed.

Page 7: Suresec SIEM and Network Performance Management

What platforms and devices does it support?

Platforms: Windows and Linux

Devices:

Firewalls:

Fortinate,Juniper/NetScreen,Cisco,Checkpoint,Watchguard,Drytek,Zyxel,3Com,Anchiva,Applied

Identity, ARKOON Network Security, Astaro, Aventail, AWStats, BlueCoat, CheckPoint, Cimcor,

Cisco Systems, Clavister, CyberGuard, D-Link, DP Firewalls, Electronic Consultants ,FreeBSD,

Global Technologies, IPCop, Ingate, Inktomi, Kerio, Lenovo Security Technologies, Lucent,

McAfee, Microsoft ISA,NetApp,NetASQ,NetFilter,Netopia,Network-1, Snort, SonicWALL, Squid

,St. Bernard Software, Sun Microsystems

Proxy-servers: Microsoft ISA, NetCache, Squid, MS TMG 2010,Trend Micro, Mcafee

IDS/IPS: Checkpoint, Juniper IDP, Cisco, UTM devices and others

VPN: Cisco ASA VPN Concentrator , Juniper SSL VPN, Microsoft PPTP/L2TP SonicWALL

Aventail

Servers: Windows NT/2000/XP/Vista/2003 & 2008 Servers, Linux - RedHat, Debian, UNIX -

Solaris, HP-UX, IBM AS/400,

Network Devices: Switches and Routers - Alcatel-Lucent TiMOS, AOS,Brocade Foundry

IronWare,Cisco CatOS, IOS,Cisco MDS,Cisco NX-OS,Extreme ExtremeWare XOS,H3C

Comware,HP ProCurve,Huawei VPR,Juniper Junos,Nortel ERS, Passport

Applications: SNARE for Windows, Apache (Syslog) ,IIS - Web server, FTP server and MS SQL

server, DHCP - Windows and Linux and Oracle.

Text-Based Log: Csv/Tsv/W3C/Txt/Custom

Mail Servers: Lotus Notes, MS IIS SMTP, MS Exchange, Qmail, Postfix

Web Filter: Barracuda Spam Firewall, McAfee Web Gateway, Microsoft ISA Server, Squid,

WebSense MailFilter, WebSense WebFilter

Virtualization: VMWare ESX, ESXi, vSphere, vCenter

Web Server: Apache Webserver, Microsoft IIS for Windows 2000, 2003, 2008

Hardware Monitoring: Dell servers, HP servers, IBM servers, Network devices ,Storage devices ,

4. LOG MANAGEMENT

Suresec unique log management feature being able to collect log data from across an enterprise regardless of

their source, present the logs in a uniform and consistent manner and manage the state, location and efficient

access to those logs is an essential element to any comprehensive Log Management and Log Analysis

solution. The Suresec solution was designed to address core log management needs including:

The ability to collect any type of log data regardless of source

The ability to collect log data with or without installing an agent on the log source device, system or

application.

The ability to "normalize" any type of log data for more effective reporting and analysis

The ability to "scale-down" for small deployments and "scale-up" for extremely large environments

Page 8: Suresec SIEM and Network Performance Management

An open architecture allowing direct and secure access to log data via third-party analysis and

reporting tools

A role based security model providing user accountability and access control

Automated archiving for secure long term retention

Wizard-based retrieval of any archived logs in seconds

Comprehensive Log Data Collection and Log Management

Being able to collect log data from across an enterprise regardless of their source, present the logs in a

uniform and consistent manner and manage the state, location and efficient access to those logs is an

essential element to any comprehensive Log Management and Log Analysis solution. The Suresec solution

was designed to address core log management needs including:

The ability to collect any type of log data regardless of source

The ability to collect log data with or without installing an agent on the log source device, system or

application.

The ability to "normalize" any type of log data for more effective reporting and analysis

The ability to "scale-down" for small deployments and "scale-up" for extremely large environments

An open architecture allowing direct and secure access to log data via third-party analysis and

reporting tools

A role based security model providing user accountability and access control

Automated archiving for secure long term retention

Wizard-based retrieval of any archived logs in seconds

Cross-platform Log Collection

Today's IT operations require many technologies; routers, firewalls, switches, file servers, and applications

to name a few. Suresec has been designed to collect from them all through intelligent use of agent-less and

agent-based techniques.

Page 9: Suresec SIEM and Network Performance Management

Windows Event Logs: Agent-less or Agent-based

Suresec can collect all types of Windows Event Logs with or without the use of an agent. Many Windows-

based applications write their logs to the Application Event Log or a custom Event Log.

Examples of supported log sources that can be collected by Suresec in real time include:

Windows System Event Log

Windows Security Event Log

Windows Application Event Log

Microsoft Exchange Server application logs

Microsoft SQL Server application logs

Windows based ERP and CRM systems application logs

Syslog

Many log sources, including most network devices (e.g. routers, switches, firewalls) transmit logs via

Syslog. Suresec includes an integrated Syslog server for receiving and processing these messages. Simply

point any syslog generating device to Suresec and it will automatically begin collecting and processing those

logs.

Flat File Logs

Suresec can collect logs written to any ASCII-based text file. Whether it is a commercial system or

homegrown application, Suresec can collect and manage them.

Examples of supported log sources using this method include:

Web servers logs (e.g. Apache, IIS)

Linux system logs

Windows ISA server logs

DNS and DHCP server logs

Host based intrusion detection/prevention systems

Homegrown application logs

Page 10: Suresec SIEM and Network Performance Management

Exchange message tracking logs

Universal Database Log Collection and Log Management

Since so much sensitive information resides in databases, it is important to monitor and track access and

activity surrounding important databases. The actual and reputational cost of a theft of customer records can

be very large. Suresec can help. Suresec collects, analyzes, alerts, and reports on logs from Oracle,

Microsoft SQL Server. It also captures data from custom audit logs and applications that run on the

database. This capability enables customer to use Suresec for real-time database monitoring to guard against

insider and outsider threats.

Scalable Log Centralization

Suresec is architected to scale easily and incrementally as your needs grow. Whether you need to collect 10

million or more than 1 billion logs per day, Suresec can handle it. With Suresec you simply deploy the

capacity you need when you need it, preserving your initial investment along the way. Deployments can

start with a single, turnkey appliance and grow easily by adding incremental log manager appliances as

needs expand. With Suresec’s “building blocks” distributed architecture, you can access and analyze logs

throughout your deployment with ease.

Log Archiving and Retrieval

Many businesses have compliance requirements to preserve historic log data and be able to provide it in its

original form for legal or investigative purposes. Collecting, maintaining and recovering historic log data

can be expensive and difficult. Imagine trying to recover logs from a specific server two years ago. Were

the logs archived or saved anywhere. If so, where have the logs been stored? What format are they in?

Can the correct archived log files be identified among the tens of thousands (or millions) of other archive

files…in a reasonable period of time? With Suresec, the answers to these questions are easy.

Activity Auditing

For compliance verification, users’ and administrators’ actions within Suresec are logged. Suresec user

activity reports provide powerful proof that Suresec is actively used to analyze log data for compliance

purposes.

Page 11: Suresec SIEM and Network Performance Management

5. Performance & Availability Monitoring Features

Suresec network monitoring capability besides security management is unique feature of Suresec platform.

Suresec Performance and Availability Management gives you an integrated view into the health of your

network, systems, applications and virtualization environments. We monitor performance and availability

metrics, application health, infrastructure resource usage, track and correlate network and application

behavior, baseline metrics and detect anomalous activity.

Types of Monitors:

Based on the parameters they measure, we have categorized Suresec monitors broadly into four types. They

are:

Operating Systems: Microsoft® Windows Server™,2000/2003/2008/2012,Microsoft Windows®,

XP, Vista, 7, 8,RedHat® Linux, SuSE® Linux, IBM AIX®, Hewlett-Packard HP-UX®,

SunSolaris™, VMware®.

Application Monitors : WebLogic, IBM WebSphere, Microsoft Exchange, Microsoft IIS, Microsoft

SQL Server, MySQL, Oracle, Tomcat, FTP, HTTP, URL, Port.

Network Monitors: Cisco® & Other Network Devices, DHCP, SNMP Devices, SNMP Trap, HP,

Avaya, Dell.

Advanced Monitors : Virtual Machine, Novell, Vsphere

Infrastructure: Active Directory, Dell OpenManage™,HP Systems Insight Manager ,(HP SIM) ,IBM

Director ,Protocol Availability, Syslog, Windows Event Log

Page 12: Suresec SIEM and Network Performance Management

Cross-domain Visibility

Our cross-domain monitoring approach spans server, storage, network, virtualization and applications to

automatically cross-correlate metrics in real-time, freeing you from the task of gathering this information

from multiple sources.

Business Service Management

We monitor the performance health of your business services in addition to individual devices and

applications.

Root-cause Analysis

We automatically connect the dots, in real-time, to rapidly isolate the root cause of security and network

issues. This is valuable in virtualized environments where problem root causes vary with time due to

vMotion and other changes.

SLA Monitoring & Powerful Reporting

Service level trends and tracking is now on your fingertips. A powerful tool to manage predict and prevent

problems before they affect to users and business.

SLA Dashboard & Business Views

Get full visibility into your organization through real - time SLA monitoring and Business Views.

Page 13: Suresec SIEM and Network Performance Management

Trend Monitoring&Capacity Planning

You can use system statistics to monitor the bandwidth of all the volumes, interfaces, and CPUs,Disks that

are being used on your system.

You can also monitor the overall CPU utilization for the system. These statistics summarize the overall

performance health of the system and can be used to monitor trends in bandwidth and CPU utilization.

You can monitor changes to stable values or differences between related statistics. These differences then

can be further used for capacity planning

Fault Management

Suresec Fault Management unique capability is the set of functions that detect, isolate, and correct malfunctions in

your network. When a fault or event occurs, a network component will often send a notification to the network

operator. An alarm is a persistent indication of a fault that clears only when the triggering condition has been

resolved.

Page 14: Suresec SIEM and Network Performance Management

6. SURESEC ADVANTAGES

Decision speed: Integrated analysis technology processes highly complex decision logic in real-time

– similar to how humans reason.

Continuous learning: We continuously learn the behavior of your environment by cross-correlating

log information, device availability and performance statistics.

Real-time alerting and historical forensics: Many ready to use rules detect anomalous behavior and

events. Comprehensive search and reporting capabilities simplify compliance reporting.

Business service visibility: Monitoring data center resources, users and applications in the context of

business services – not devices, speeds and feeds – to accelerate problem detection and resolution.

Customers who have used SURESEC have experienced:

Improved productivity.

Higher business operations uptime.

Lower IT costs.

Improved business performance.

Ability to meet Service Level Agreements.

By correlating customer service level commitments you will have better visibility to required

response times.

Monitor applications.

Monitor ecosystem business services, not just devices.

Reduce Mean Time to Repair through automated root cause investigation.

Avoid costly outages with proactive monitoring.

Page 15: Suresec SIEM and Network Performance Management

7. ABOUT ANET

ANET Software is an R&D and Engineering company which is founded in 2003.we are developing SIEM,

network management, application monitoring, network inventory management, network security and

internet filtering solutions.

Also we have solutions about

Log Management

Fault Management

Compliancy & Windows Events Manager

Network Monitoring

Asset Management

Network Security

UPS Management

Netflow Monitoring

Distributed Backup

Mail Archieve

Ticket Management System-Helpdesk

Network Diagnostic & Trend Analysis

Computer Security as a project based customized solutions.

We have been working on network management&internet safety for a long time. we have done R&D

projects With TurkTelekom and TTNET.

Turk Telekom group provides integrated telecommunication services from PSTN, GSM to wide band

internet.

Turk Telekom group companies have 17.1 millions of PSTN customers, 6 millions of ADSL customers and

12.4 million GSM customers as of June 30, 2009

TTNET offers the latest Internet access technology to its customers across 81 cities of Turkey.

The TTNET product portfolio features ADSL fast Internet access, Dial-up Internet access, WiFi wireless

Internet access,

G.SHDSL, Metro Ethernet, ATM and Frame Relay Internet access services.

Also our team and projects awareded by the Scientific and Technical Research Council of Turkey.

(TUBİTAK ) and

REPUBLIC OF TURKEY MINISTRY OF INDUSTRY AND TRADE: Small and Medium Industry

Development Organization. (KOSGEB)

We have also R&D department. Some of our R&D papers are:

POPULAR SCIENCE JOURNALS

Page 16: Suresec SIEM and Network Performance Management

Ertuğrul Akbaş, KORELASYON MOTORU, İLERİ ANALİTİK YÖNTEMLER, BİLGİ

GÜVENLİĞİ VE LOG YÖNETİMİ, http://www.olympos.net/belgeler/log-yonetimi/korelasyon-

motoru-ileri-analitik-yontemler-bilgi-guvenligi-ve-log-yonetimi-29121324#axzz2AGe4adnG

Ertuğrul Akbaş ,LOG YÖNETİMİ ve SIEM, http://www.olympos.net/belgeler/siem/log-yonetimi-

ve-siem.html#axzz2AGe4adnG

Ertuğrul Akbaş, http://www.linkedin.com/groups/Log-Y%C3%B6netimi-ve-SIEM-

4230485.S.94663393

Ertuğrul Akbaş, Yerli Yazılım Sanayi, Operatörler ve İçerik Filtreleme, Telekom Dünyası Dergisi,

http://www.telekomdunyasi.com/

Ertuğrul Akbaş, Merkezi veya ISP Seviyesinde İçerik Filtreleme Çocuk Pornosu ve Zararlı Siteleri

Engellemede Başarılı Olabilir mi?, http://www.olympos.org/belgeler/icerik-filtrelemede-hukumet-

politikalari/merkezi-veya-isp-seviyesinde-icerik-filtreleme-coc

Ertuğrul Akbaş, Topolojik Bağımlı Otomatik Sistem Güvenliği Tarama Yöntemi,

http://www.olympos.org

Ertuğrul Akbaş , Bilgi Güvenliği, http://www.olympos.org

Ertuğrul Akbaş, Yerel Alan Ağlarında Paket Analizi ile Güvenlik Taraması, http://www.olympos.org

Ertuğrul Akbaş, WEB İÇERİK TARAMA VE EBEVEYN KONTROLU ,

http://www.olympos.org/belgeler/icerik-yerellestirme/web-icerik-tarama-ve-ebeveyn-kontrolu-

2912666.html

Ertuğrul Akbaş, Çocuk Pornosu ve Zararli Içerik Engellemede Önemli Yöntemlerden Biri : URL

Kategorizasyonu. http://www.olympos.org/belgeler/internet-guvenligi/cocuk-pornosu-ve-zararli-

icerik-engellemede-onemli-yontemlerden-biri-url

JOURNALS

E. Akbas, E. Murat Esin, "SEAMLESS INTEGRATION OF NETWORK MANAGEMEN

PROTOCOL WITH DISTRIBUTED CONTROL", The IJISIP Proceedings (ISSN: 1304-2386),

Volume: 1, Number :1, July 2003, International XII. Turkish Symposium of Artificial Intelligence

and Neural Networks (TAINN' 2003).

INTERNATIONAL CONFERANCE PAPERS

E.Akbas, Enhancing SIEM Correlation Rules Through Baselining, 5th International Conference on

Information Security and Cryptology,May 17-19, 2012,Ankara,Turkey

http://www.iscturkey.org/index.php?option=com_content&view=article&id=46&Itemid=63&lang=tr

E. Akbas ,NEXT GENERATION FILTERING: OFFLINE FILTERING ENHANCED PROXY

ARCHITECTURE FOR WEB CONTENT FILTERING”, 23rd of the International Symposium on

Computer and Information Sciences ( ISCIS 2008 ), İstanbul, Turkey, 2008

http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=4717848&arnumber=4717892&count=124&

index=43

Ertuğrul Akbaş, Yerel Alan Ağlarında Paket Analizi ile Güvenlik Taraması, ", Ağ ve Bilgi Güvenliği

Ulusal Sempozyumu, Mayıs,2008, Girne, KKTC.

http://www.emo.org.tr/ekler/578fe27c90622d7_ek.pdf

Ertuğrul Akbaş, Web İçerik Tarama ve Ebeveyn Kontrolü, Ağ ve Bilgi Güvenliği Ulusal

Sempozyumu, Mayıs,2008, 2008, Girne, KKTC.

http://www.emo.org.tr/ekler/b91892416e732f1_ek.pdf

Ertuğrul Akbaş "Topolojik Bağımlı Otomatik Sistem Güvenliği Tarama Yöntemi", ISC'07 Bilgi

Güvenliği ve Kriptoloji Konferansı, 13-14 Aralık,2007, Ankara, Turkiye.

www.iscturkey.org/iscold/ISCTURKEY2007/papers/54.pdf

Ertuğrul Akbaş , "Hata Yönetimi için Zeki Keşif ve Topoloji Oluşturma Yöntemi ", Ağ ve Bilgi

Güvenliği Ulusal Sempozyumu, pp 157-163, 9-11 Haziran,2005, Istanbul, Turkiye.

www.emo.org.tr/resimler/ekler/b3fff6463464959_ek.pdf

Page 17: Suresec SIEM and Network Performance Management

E. Akbas, E. Murat Esin, "Seamless Integration of Network Management Protocol with Distributed

Control " The twelfth Turkish Symposium on Artificial Intelligence and Neural Networks,02-04

July 2003, Çanakkale, Turkey.

E. Akbas, "System Independent And Distributed Fault Management System", The Eighth IEEE

Symposium on Computers and Communications,30 June-3 July 2003, Antalya, Turkey.

http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1214302

E. Akbas, "Web Based Management: A Novel Architecture ", The Sixteenth International

Symposium on Computer and Information Sciences (ISCIS XVI), October, 29-31, 2001, Antalya,

Turkey

Page 18: Suresec SIEM and Network Performance Management

Some of our references:

Page 19: Suresec SIEM and Network Performance Management

Contact

Doğu Mah. Bilge sok. No=2

Kat= 5 Daire= 4

Pendik/İstanbul

Tel : 0216 3540580

0216 3540581

Fax : 0216 3540580

[email protected]

[email protected]

www.anetyazilim.com

www.anetyazilim.com.tr