Welcome!

Bill Roth, Ulitzer Editor-at-Large

Bill Roth

Subscribe to Bill Roth: eMailAlertsEmail Alerts
Get Bill Roth via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Bill Roth
By Anton Chuvakin Starting from Requirement 1 “Install and maintain a firewall configuration to protect cardholder data” we see that it mentions that organizations must have “a formal process for approving and testing all external network connections and changes to the firewall configu...
By Anton Chuvakin The requirement itself is called “Track, and monitors all access to network resources and cardholder data” and is organized under the “Regularly Monitor and Test Networks” heading in PCI DSS. The requirement is organized in several sections related to process, events ...
By Guy Churchward The past few weeks I’ve been convincing myself that an interesting, maybe even ‘thought provoking’ blog on the convergence of IT operations and security would be of value. The signs are definitely here, our clients talk about it, every analyst I meet asks me about it,...
Bill Roth I love information security stories in the mainstream press. They are often a generous amalgam of fear-mongering, misinformation, and technical ignorance. The truth is always buried somewhere under the headline, if it is even in the story at all. Consider two recent mainstrea...
This article is cross posted from Anton's blog simply because we think the more people that see it, the better. Thanks Anton. By Anton Chuvakin. Once upon a time, I was retained to create a comprehensive PCI DSS-focused log review policies, procedures and practices for a large compan...
I read a story today in eWeek about sidejacking and FireSheep. The headline read “Firesheep and Sidejacking Not Just a WiFi Problem”. First, it is important to know that I love “portmanteaus”, or made up words. So, the headline was a twofer, and was as exciting as it was incomprehensib...
  We’re holding a webinar on the challenges faced by companies who have to make changes to their business operations due to compliance issues. For IT departments, the pressure to deliver a secure IT infrastructure against a background of constantly changing compliance and regulato...
Among other things, PCI DSS mandates creating system logs and reviewing them from all systems in scope for PCI compliance. One should always remember that log collection and review are also critical for good security operations and incident response. In this article, we will focus on o...
Woohoo, it’s officially international Beatles day over at Apple. To spread the joy we’re giving away all 256 items that make up the Beatles Box Set over on iTunes.   All you’ve got to do is answer 7 easy PCI related questions and your name will be placed in the draw. One lucky win...
I have a love/hate relationship with trade shows. On the one hand, I love them. I love meeting customers and prospects, and I love the shameless boosterism that it entails. On the other hand, as someone who has to manage to a budget and deliver ROI, I hate them. The ROI never works out...
By Christophe Briguet SIEM products are intended to target mature companies that understand log management and SEM, and want to add real value to their data by deploying a system for correlation and analysis. Ideally, the deployment of a SEM solution is the ultimate stage of log monito...
By Dimitri McKay Over the past year, the IT world has seemingly fallen head over heels for the cloud. Cloud computing has great potential in terms of collaboration and efficiency, and it's already delivering strong results for organizations that have leveraged the cloud model. For all ...
By Dr. Anton Chuvakin PCI DSS defines itself as “a set of comprehensive requirements for enhancing payment account data security. “ However, in many real-world implementations of PCI DSS controls, the focus is on reducing the risk to transactions by limiting the number of systems that...
Hello. My name is Andy Morris. You may remember me from famous blogs of the past such as The LogLogic Story, or Do I Get a T-Shirt With That? As you may have noticed we’ve not posted anything since the 21st of September. Where have we been? What have we been doing? Well actually, it’s ...
In Google Analytics, there is a somewhat mysterious metric called the Bounce Rate. The meaning of the bounce rate is defined by the number of people who look at one page and then "bounce away" to other sites. Wikipedia has a decent definition. As always, Avinash Kaushik has a great art...
Last week as everyone knows, HP purchased ArcSight for a boat load of cash. While some of the smaller vendors may have panicked, we viewed this as a good thing. Our Chief Logger (Guy Churchward), did a round of interviews saying that the acquisition validated our be...
By Christophe Briguet There’s been some back and forth on the interwebs about why we’re introducing the Universal Collection Framework, and why we intend to essentially give the underlying magic (the ULDP protocol) away to the competition. Most of the negative feedback (exclusively fro...
By Bill Roth The Wall Street Journal web site reports that HP is going to purchase ArcSight for around $1.5B. You may remember that this story initially broke on Aug 26th from the same WSJ reporters, Ben Worthen and Anupreeta Das. However, no credence was given to the sto...
This is what we do If I were to try and sum up everything I’ve written in the last 10 chapters (I lied when I said this would take 12 chapters – sorry), it would be this: LogLogic provides 360 degrees of insight by centralizing and structuring IT data – enabling customers like yo...
Deploy Any Way And of course no 360 claim would be complete without multiple deployment options. Regardless of whether you want to deploy appliances, software or virtualized machines, regardless of whether you’re building a datacenter, using a satellite WAN to connect branch offic...
Use The ‘use’ section of our technology is actually lots of products that all feed off the central warehouse. We have a S.E.M. solution that we refer to as a SOC-in-a-box, which is probably the most accurate correlation engine available. We have compliance technology that takes you...
See Our ‘see’ is simply the biggest, fastest, most scalable and complete IT data warehouse available today. We have one customer that currently gives us 53 BILLION logs per day. Twitter (not a customer), we estimate, produces 127,000 log messages per second. Our biggest box p...
Get Let’s look at ‘get, see, use’ in a little more detail. Our “get” is actually technology called the Universal Collection Framework. This framework provides universal IT data collection capable of collecting, without agents, from just about anywhere. Where we do need agents for ...
To quote BusinessWire, we’ve just announced another world first. At VM World today we announced our support for VMware vCloud Director in LogLogic 5. Want to see it in action? Press play below…
The Flexibility Wheel This ‘get, see, use’ is what we refer to as ‘360 Insight.’ Put simply, it means that we don’t care where your data is, or what format it’s in; we can get it and give you 360 degrees of sight into all your IT data. We don’t care why you’re capturing all that...
The difference is clear Our approach is different. Firstly, there’s no spaghetti! Ours is a simple world where all data, regardless of source or type, is centralized, augmented, enriched, parsed and understood, then smartly passed onto the appropriate visualization tools. We a...
There’s an analyst firm you may not have heard of called Securosis. Every member of the firm is a rock-star from one of the major players that got fed up constantly having to guard their words and toe a corporate line. These guys speak it like they see it, and it often isn’t pr...
Adding Complexity And that brings us to what I’ll call 1st generation solutions to your problem. On the left of the slide you’ll see what I call “data assets.” These are your routers, firewalls, switches, servers, operating systems, databases, commercial and homegrown applicatio...
Hmmm, products of the week? Us? Again? Wow, people love the 5 thank you
Day One of the Cloud Computing Conference and Expo is in full swing. First off, it took me nearly 30 minutes to find parking. For some reason the top level of the parking structure of the Santa Clara Convention Center was closed off. Not sure why. Then I walked through the San Jose Hya...
  (Full disclosure: As of this writing, I am likely to take a job with Ebay in the next few weeks). Yesterday, Ebay posted earnings that were less than stellar at first blush. But when you dig behind the numbers, there are many reasons for optimism. First, the potential sale of Skype...
  (Full disclosure: As of this writing, I am likely to take a job with Ebay in the next few weeks). Yesterday, Ebay posted earnings that were less than stellar at first blush. But when you dig behind the numbers, there are many reasons for optimism. First, the potential sale of Skype...
Once you get Google Analytics set up, the next question someone usually asks is: What do I pay attention to? In my view, the following metrics are useful for a first timer. Consider this a kind of Google Analytics 101. Visitors: Many people still focus on hits, which the number of ...
Visitors: Many people still focus on hits, which the number of times a particular file is pulled from a server. But it is more relevant to pay attention to the pages that people who come to your site actually see. Some people also still pay attention to page views. This is also inaccur...
The first of the two devices is targeted at consumers. The Cloudplug is a device that makes anu USB or eSata hard drive into Network Attached Storage. CTERA is also offering an online backup service for $199 for 10Gb of space. The second of the devices is targeted at small businesses. ...
Here are some thing to think about when you set up an eCommerce site cheaply, and how to consider doing it:   1. Get a shopping site provider like Shopify.com. I will send you some of their competitors tomorrow so you can compare.2. Sign up for your gmail account.3. Once you get a si...
Here are some thing to think about when you set up an eCommerce site cheaply, and how to consider doing it:   1. Get a shopping site provider like Shopify.com. I will send you some of their competitors tomorrow so you can compare.2. Sign up for your gmail account.3. Once you get a si...
I recently wrote about the notion of Location as the new element of identity. I have since started playing with Google Latitude. It is a more formal version of the MoosTrax app I wrote about, but it is also harder to use. Don't get me wrong, the Mobile App I used on my Blackberry Bold...
I recently wrote about the notion of Location as the new element of identity. I have since started playing with Google Latitude. It is a more formal version of the MoosTrax app I wrote about, but it is also harder to use. Don't get me wrong, the Mobile App I used on my Blackberry Bold...
Instant messaging gives us the ability to rapidly communicate to (and annoy) your friends and co-workers, but it also lets people know if you are on-line, or your “presence”.  Who you are and whether or not you are on-line important elements of your identity. But, since we life in the ...