Friday, May 20, 2011

【 Weak current College 】 of five data storage security tools


In the last moment, we have explored for typically store maintenance personnel, the necessary five data storage security testing tools, the close link between these tools, either for network maintenance or still store maintenance, are thought to be. However, these data storage tools are only to be used in larger enterprises, so that when we're turning to SMEs should be tools corresponding to? this article will examine five data storage security tools that small and medium-sized enterprises, all the more simple and appropriate.

Common data security questions

Looking for storage-associated vulnerabilities, there are three areas need attention:

1. in a network environment in the use of storage host;

2. in your storage system services, use, and sharing;

3. some can lead directly to vulnerabilities specific weaknesses;

As of this point of uncontrollable factors, as well as the possibilities are many, but if you can pay attention to and what factors make a decision, you can make some of these have become essential. In my experience to talk about, I have had four storage-related vulnerabilities:

1. the unknown or forgotten those not patched in daily or system maintenance within the scope of the system;

2. in the operating system layer and use the dimensions of those without patching of software;

3. in the Web page maintenance interfaces use weak passwords for security and access control permissions;

4. those without protection is shared on the network can be free access to sensitive files and databases;

LANguard and QualysGuard

In order to be able to help prevent and deal with some of the more common questions about the data stored in the security questions, you can choose to use relative price low vulnerability scanning tool-LANgaurd.

LANguard is looking for available hosts, open ports, and many see vulnerability comparison tool for the novice. Also has an embedded on LANguard inside to find shared files on the network permissions security gadgets.

Another useful tool is the QualysGuard, is an almost able to cover all vulnerability search scan tools. It is able to scan those that exist in the operating system itself, or the use of the things you never be thought of vulnerability.

These tools offer you buy lisences is different from the price, but also means that there is not the same as the system can be scanned. You will need to spend hundreds of times or on us, as long as you own the necessary. To be able to rest assured that this investment will be of special merit. However, before you decide to purchase any data storage security tools before, make sure you have tested those tools and useful for the company.

Acunetix Web vulnerability scanning tools, and Web security scanner N-Stalker

For a Web page, the Acunetix Web vulnerability scanning tool is an especially good vulnerability scanning tool.

Acunetix Web vulnerability scanning tools to your current storage environment to find many common Web-based vulnerabilities, contains for example the default/empty password, the login mechanism flaws, even such as cross-site scripts and footnotes that some SQL input validation flaws can be scanned.

Addition of a Web page called N-Stalker use security scanning tools products can also be used to scan for vulnerabilities on a Web page. You just need a basic click Scan tool and make it point to you want to test the Web page address of the system or the system's IP address, keep the default options and then run it to. The scan is finished, the result will be a production, it carefully describes what is required to be attentively and enhanced.

In the end, or you use QualysGuard LANguard handled share and file permissions vulnerability on, you will start to worry about what you have to do with those not on the network that is free to access sensitive information. This is also the current you face the greatest risk of commercial information. IdentityFinder as a scan of a useful tool for sensitive files.

IdentityFinder as in a network shared drive search tools have a separate Edition and Enterprise Edition for the user to choose from. If the angle from the low-cost worry, a called FileLocatorNetwork products have the same function.

In short, your small business environment will benefit from these data storage safety tool, especially when you need to search those major environmental vulnerability is particularly useful when stored.

About the author: KevinBeaver is Atlanta PrincipleLogicLLC independent information security consultant, speaker, and professional witnesses. In the industry independent information security risk assessment and information service, he has over 20 years of valuable experience. Kevin was made and in which seven book on information security books that cover the hackers of which for example "HackingForDummies" and "HackingWirelessNetworksForDummies. He also is the information security audio books as well as one for it professionals with security knowledge learning of the founder of the blog.



No comments:

Post a Comment