NIH Enterprise Architecture Home

Event Monitoring and Analysis Brick

Description

Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities that attackers can exploit to gain access, even when NIH has secured the network perimeter with firewalls and intrusion detection systems. In order to proactively find and plug such holes NIH will require the use of both vulnerability assessment products and vulnerability assessment services.

System Monitoring and Logging. Identifying and reacting to security incidents in real-time requires comprehensive system and network monitoring, Furthermore the ability to aggregate alarms and other information from disparate systems is necessary to correlate events and identify an incident.

Brick Information

Tactical

(0-2 years)

Strategic

(2-5 years)

 

 

 

 

Retirement

(To be eliminated)

Containment

(No new development)

 

 

 

 

Baseline

(Today)

Emerging

(To track)

  • Event Monitoring
    • Computer Associates TNG
    • HP Openview
    • HP ITO
    • Fluke Optview
    • Fluke Link Analyzer
    • Fluke Network Inspector
    • Quest Software Big Brother
    • Open NMS
    • NetIQ
    • Ipswitch What’s Up Gold
    • Deepmetrix ipMonitor
  • Log Monitoring
    • Microsoft Operations Manager
  • Log Analysis
    • Envision
    • Central Syslog Facility
    • Router/switch logging
    • Remote syslog
    • OS Logging
    • Microsoft Operations Manager
  • Event Correlation

Comments

  • Tactical and strategic products were selected to leverage NIH's investment in products that are a proven fit for NIH's known future needs. Leveraging baseline products in the future will minimize the operations, maintenance, support and training costs of new products.
  • Some baseline products have been designated retirement and containment. These products are either not as widely or successfully deployed at NIH, or they do not provide as much functionality, value, or Total Cost of Ownership as the selected tactical and strategic products

Relevant Standards

Relevant Policies

Time Table

This architecture definition approved on: July 28, 2003

The next review is scheduled in: TBD