Security tools

what is the security tool used in BI? and what are the other sap security tools and its uses?

Hi,
Security tools will be used based on the requirement.
different security tools:
GRC, VIRSA, Brizrites etc etc....
-srini

Similar Messages

  • What is the best cleanup/security tool for Lion

    I am looking for a good cleanup/security tool for my iMac. Specifically for Lion. Any recommendations or horror stories will be appreciated.

    anti-virus is not necessary unless you have Windows installed on a seperate partition.  Security tools aren't necessary either.  You are on a mac, not a pc.  Totally different worlds.  You can download Disk Doctor from the app store for 99 cents.  And if you insist on an a/v program, install ClamXav (it's free-do a google search for it)

  • Build exe for DSC security tools

    Hi All,
    I am developing an application in LV7.0 which has Visa read/write functions, alongwith that i want to implement some security features using Dsc module's vi present in function palette. My requirement is wen Login button is clicked a login dialog box gets popped up, this i have done by using NI SEC Invoke login dialog. vi. I have also used other security tools like NI SEC User account info.vi, programmatic logout.vi etc.........Vi is working perfectly fine but after making exe, and running it on same pc, login dialog box doesn't gets popped on login button clicked.
    So my doubt is do i need to add some security library files while building exe and creating installer???
    Your reply will be valuable to me
    Thanks & Regards,
    Ratna 

    Hi Sahil,
    Thanks for ur reply. wanted to inform u that i m using only security tools of DSC module, apart from that no other DSC tools. Even though i add all supporting files which was listed in the document named Support Files to Include when Building a LabVIEW DSC Module Application (available on http://zone.ni.com/devzone/cda/tut/p/id/4189) link. In addition to this i also add .rtm file for viewing tool bar while running application and security.llb (available at development machine directory:LabVIEW7.0\Vi.lib\lvdsc>. But still the problem remains as it is. So my question is do i need to add any other supporting files related to DSC security tools, which can solve my problem???????
    If u have any clue, kindly recommend me.
    Regards,
    Ratna 

  • Where is sun.security.tools.KeyTool

    I have read that I can only create certificates using the Keytool. However, I would like to present my users with a GUI where they can enter their details (similar to the ones that the Keytool asks), and once they press OK, my application will create a certificate for them.
    Can I create a certificate programmatically. (I don't want to tell my users: "Please, go to the command line and enter 'keytool -genkey .....' ")
    I was told that there is an API for sun.security.tools.KeyTool, but I cannot seem to find this API.
    Any thoughts

    I am in the same boat of trying to generate keys/certificates programmatically. I have used the KeyTool program. It's shortcoming is that you are calling the main(args []) method which does not throw an exception. Thus, if you execute a command (-genkey, -import, etc) that throws an exception, say where the -alias argument for the -import command already exists, the runtime exception kills your entire process, in my case it shutsdown tomcat ;( . Anyway, I used the Runtime.exec() call to execute commands so I could detect and handle error conditions. My problem now is that my -import call is just hanging and not returning (and I have run the same command from the command line with success).
    In short, I am going to look at the links above for third party APIs for certificate generation.
    Is there a more graceful or forgiving API from Sun other than the KeyTool program to generate and manage keys/certificates?
    Thanks in advance for your help and ideas.

  • Will Mozilla co-operate with AVG to ensure their Security Tool Bar works with Firefox 5?

    Like some other FF users, I've been getting an 'unresponsive script' mesage on starting FF. After trying various things and eliminating add-on probs, I discovered that it was AVG's Security Tool Bar 7.004.022.004 that was responsible for the 'hang'. Who needs to do the tweaking -- Mozilla or AVG? (I have paid AVG 2011 version)

    Running the script by python2 solves it for me:
    su - mythtv -c "nice -n 19 python2 /usr/bin/tv_grab_nl_py --output ~/listings.xml"
    Best regards,
    Cedric

  • Windows 10 upgrade asks to uninstall HP Security tools on Probook 4540s and finger reader gone

    Recently Windows updated to Windows 10 version. Before upgrade it asks to uninstall HP security tools as it is not compatible on Windows 10. So after uninstall Windows 10 upgrade went fine. Now my finger scanner verfication option gone during login. Is there latest tool comptabile for Windows 10 available ?

    I want to upgrade from windows7 to  windows10 (probook 4350s) I have the same question about compatible version, which I hope HP or somebody answer soon and help us...I also cant uninstall my protect tools as upgrade needs me to.I want to know is it possible for finger scanner to work in windows10 after uninstalling HPPTM. thanks,Nazanin Mirzabeigi 

  • Virtual Security Tooling integration

    I need a solution that integrates these three functions:
    Packet capture and deep packet inspection with something like virtual switch port mirroring sessions and mirror them to collectors.
    Scanning for security and compliance with something like vMware configuration Manager, Nessus or the like
    SIEM and analaysis of the above two with something like Splunk that functions as my syslog server but also does analytics, correlation and SIEM like functions.  It takes the information from my port mirroring collectors and my scans and integrates it with my syslog data to tell me what is wrong.
    Requirements:
    All these tools need to work together hopefully out of the box as much as possible
    I need to have as little manual labor to tell these tools what to look for in a VMware environment as possible - they should be tuned for VMware infrastructure ideally
    I'd like some kind of a guide or reference architecture to help me get started on how to build this - what kinds of tools work together, what to watch out for, how not to spend huge money on a set of tools and find they can't be integrated or don't work for virtual/cloud environment.
    Your input / thoughts/ experiences / caveats appreciated.
    Thanks!

    It works now, although the video is a bit choppy. I made a
    logging mechanism and frames seem to render in weird timings.
    Anyway, the problem is now audio. How to implement audio and how to
    sync audio with video. Any tips?
    What audio format does Adobe FME expect from filters? I need
    to know that to convert to it first. PCM?
    This is a sample (frame: rendering time)
    1: 2
    2: 2
    3: 4
    4: 2
    5: 2
    6: 24
    7: 2
    8: 49
    9: 89
    10: 88
    11: 98
    12: 133
    13: 3
    14: 91
    15: 89
    16: 74
    17: 51
    18: 94
    19: 76
    20: 86
    Thanks again!

  • SAP Security tool within to determine the affects of a security change.

    Hi -
    Do anyone know of a security application tool within SAP to determine the affects of a security change to roles other than SUIM, SE16 ( tables), PFCG, etc
    The basics are:
    1) A role is updated to include additional t-codes, removal of t-codes, or change authorizations of existing t-codes.
    2) Currently there is no way to determine what other t-codes may be affected by the change in authorizations which makes regression testing almost impossible.  The ultimate solution would be a list to the process teams for regression testing to ensure everyone is aware of the consequences of making a change.
    The application in question would:
    1) Use the change log within SAP (with a few parameters specified) to determine what authorizations were changed.
    2) Lookup all the authorizations by t-code for every t-code in the roles meeting the criteria.
    3) Create a list of roles / t-codes that use the authorizations that were identified as changed.  This would be the t-codes that need to be evaluated for regression testing.
    This process is possible today, but would take hours to evaluate a simple change by hand.  A single t-code can have 100+ authorizations and a role could have 50+ t-codes.  This case would lead to the manual cross referencing of 5000+ items which would be extremely time consuming and prone to error.
    Thanks
    Larry Mac

    Hi Larry,
    I am only aware of SUIM....
    there are some possibilities beside change logs, for instance Transaction->executable with role/for user,....
    Also rsusr008_009_new(critical authorizations) gives you a good chance for finding such
    possible effects.
    The cusotmizing of critical auths./combinations/variants is a bit complex, but following the documentation step by step gives a good starting point.
    So if after the changes users show up in the result, you knwo, that you have to react.
    Of course this is not 100% the solution you are looking for, but gives the possibility for an additional check/countercheck.
    b.rgds, Bernhard

  • Self Service Security Tool

    Hello All,
    Can anybody let me know the step by step procedure on how to use the self service security checks tool used in solution manager for Audits..

    Hi,
    Apart from the note, have you checked that the user starting the ST14 data collection has
    all the authorizations acocording the note above?
    Are you able to display the information collected in transaction ST14
    under the Utilities ->Analysis browser menu option?
    Please check also the following note that can be helpful:
    967938 - Security Optimization Self-Service: SDCC download
    Please also review and follow the steps described in the documentation
    "HOWTO: Using the Security Optimization Self Service" ?
    The documentation as well as SAP Tutor file are available in the
    path below in service marketplace.
    http://service.sap.com/sos
    -> Media Library
    Please firstly review the documentation and ensure that the steps
    are followed correctly.
    Hope this helps.
    Cheers
    SH

  • Cisco Security Tool

    Some time ago, I came across a tool on Cisco web-site which will go through a running-config and highlight any security weaknesses? Does anybody know the URL to this tool or if it is still up on this site?
    Thanks a lot for your help
    mary

    I think this tool is not available anymore
    Check following link there list of current Cisco online tools
    http://www.cisco.com/en/US/products/prod_tools_index.html
    Maybe following security document could be helpful
    http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml
    Best regards
    M.

  • Iphone as a security tool against car-steals?

    Is there any accessory that comes along with Iphone to secure car with a localisation seeker. Actually I'd like to put this thing (if there exist) in my bike in order to localise it anytime I want!

    Google latitude should do it, but I am having problems using it with Iphone and you can see I am waiting for an answer.

  • Security tools for audit and penetration testing weblogic server 10.3.5.0 and other

    hi all
    is it possible please introduce me the best softwares for auditing and penetration testing on weblogic server 10.3.5 (scan the machine for finding vulnerabilities and unsecured configuration in web logic server)
    thanks for your attention
    good luck

    This is a good one
    IBM developerWorks : Download : IBM Security AppScan V8.8

  • I just downloaded something called 'MAC KEEPER' and has told me: that i have on security tools 2 issues

    ..

    This type of attitude isn't really much help after all the noise and trouble and permutations.
    Wasting time over the definition of virus? worm? most people don't know malware from scareware. Of course in the month SINCE this thread, more was learned, just accessing a site would download a file w/o user prompt or action.
    Mac Trojan Horse poses as Adobe Flash Installer
    Fake FlashPlayer for Mac OS X leads to site redirection attacks
    Stop using "virus" or assume it means all variants of security threats.
    And install something, can't hurt:  Sophos Anti-Virus for Mac

  • Windefender, other ms security tools: stop bunching fixes by category, do parallize disk scans

    windefender offline: I have individual fixes I need to apply. some of the stuff it's finding are invalid in my book and are good utilities I have written, and some in a given category like "hosts file possible hijack" may be a problem (1 or 2 files
    maybe), but most are backups of my hosts file I wrote to eliminate ad servers and block malware servers and bad sites. and now windefender is trying to take my hosts file security measures out - all of them in every hard disk, as a single item. I cannot pick
    and choose as I would like.
    it's not an issue of how much RAM I have or how fast my cpu goes. I have 12 threads and 64GB RAM and 4 hard disks I think (which it scans disks only serially, not in job-queued parallel, which took 2-3 days - could have only taken hours - and yes, that would
    require a different UI layout than a traditional single-line current filepath - how about a listbox?). ouch.
    my mother has been asking for a pdf to be scanned, my computer is unusable during this scan time.
    now windows defender offline - looks like the hard disk light has stopped blinking and the progress bar is at 75%, so I guess it's locked up sort of (GUI still responds, but not cleaning up like I told it to). time for the reset button. and it's been really
    slow going, but at least it works 50% (scans OK, but doesn't clean). it is cleaning ISO files which may contain installers, zips, exes, many things. .tar, .tgz, etc. because I am a software developer.
    please get this program to work. thanks.
    it didn't find the problem I was intending, which was the malware infecting IE after visiting aclj.com, a malware-injecting spoof of the good site aclj.org.
    please get  these programs to work before sending it out the door if possible. do some test suites. thank you.

    windefender offline: I have individual fixes I need to apply. some of the stuff it's finding are invalid in my book and are good utilities I have written, and some in a given category like "hosts file possible hijack" may be a problem (1 or 2 files
    maybe), but most are backups of my hosts file I wrote to eliminate ad servers and block malware servers and bad sites. and now windefender is trying to take my hosts file security measures out - all of them in every hard disk, as a single item. I cannot pick
    and choose as I would like.
    it's not an issue of how much RAM I have or how fast my cpu goes. I have 12 threads and 64GB RAM and 4 hard disks I think (which it scans disks only serially, not in job-queued parallel, which took 2-3 days - could have only taken hours - and yes, that would
    require a different UI layout than a traditional single-line current filepath - how about a listbox?). ouch.
    my mother has been asking for a pdf to be scanned, my computer is unusable during this scan time.
    now windows defender offline - looks like the hard disk light has stopped blinking and the progress bar is at 75%, so I guess it's locked up sort of (GUI still responds, but not cleaning up like I told it to). time for the reset button. and it's been really
    slow going, but at least it works 50% (scans OK, but doesn't clean). it is cleaning ISO files which may contain installers, zips, exes, many things. .tar, .tgz, etc. because I am a software developer.
    please get this program to work. thanks.
    it didn't find the problem I was intending, which was the malware infecting IE after visiting aclj.com, a malware-injecting spoof of the good site aclj.org.
    please get  these programs to work before sending it out the door if possible. do some test suites. thank you.

  • Network Security Tools

    I wanted to start a thread that lists network scanning protection software. I recently came across EMCO Network Malware Cleaner. As you can see I had a worm hiding...
    What tools do you find most helpful? I do have an enterprise AV in place but this snuck by. Trying to keep my domain as clean as possible.
    You can download the EMCO Network Malware Software here: http://emcosoftware.com/network-malware-cleaner/download

    Did you catch thelatest blog entryby Scott Horn, Vice President of Marketing at Seagate? You can view theblog versionor read through here:
    In the first-of-its-kind open day held in June, CERN openlab welcomed the scientific community to learn more about the latest projects and achievements of its unique collaborations with leading companies in the fields of information and communication technology. As a contributor to CERN openlab, Seagate was present to celebrate the early successes of our collaboration in the development of next generation storage technologies.A key challenge of CERN’s operations is to be able to successfully manage the demand of storing the huge amounts of data they capture every minute of every day. In fact, the Large Hadron Collider has generated 100 petabytes of data to date, as well as 2-3 petabytes of...

Maybe you are looking for

  • How can I set a breakpoint within a macro in order to debug a prog.?

    Hello all, How can I set a session Breakpoint inside a macro (i.e. DEFINE .... END-OF-DEFINITION) in order to debug a prog.? I keep on getting the message: "The position of a breakpoint cannot be determined." What does this message mean? Thanks for y

  • Safari (10.5.2) crashes 100% of the time after successfuly logging on .Mac

    Safari (10.5.2) crashes 100% of the time after successfuly logging on .Mac portal. ... and Firefox doesn't. I've upgraded yesterday night to 10.5.2 and today (while behind an http proxy) I can't get to log in onto .Mac Safari crashes as soon as my lo

  • Flash Player will not install - OSX 10.9.5 w/ Firefox 34.0.5

    I know this question has been asked before, but since no one seems to have an answer for it I have no choice but to ask again. I was having trouble posting scores on a gaming website. The game ran fine, and I could log in successfully, but my scores

  • Invalid request for HTTP request from Java

    I've written the following code to retrieve data from HTTP url: byte [] buffer = new byte[1024];                URLConnection conn = src.openConnection();                //conn.setRequestProperty("Range", "bytes=" + (start + completed) + "-" + end);

  • How to take infotype name out of T-Code PO10 and PPOSE

    Hello Everyone,                       I have created an OM infotype which will replace the current custom infotype. Right now I can see both infotypes through those T-Codes(PO10 and PPOSE). I am looking not do display the name of that old infotype in