From: Pete Stagman Subject: February 1st BAWSUG meeting Date: Monday, January 30, 2006 12:10:48 Boston Area Windows Server User Group Wednesday, February 1st 2006 6:00PM Microsoft Waltham 6:00-7:00 - Pizza, Ministrivia, Meet and Greet. If we have time we will try to fit in some "Tech-Tips Live" so bring your tough questions. Pizza Courtesy of PacketMotion 7:00-8:00 - Microsoft Virtual Server 2005 – by Dan Stolts President and Sr. Systems Engineer - Bay State Integrated Technology, Inc. http://www.BayStateTechnology.com 8:00-9:00 - Applying Identity Intelligence to Your Internal Network Security – By Scott Ruple, Vice President of Marketing, PacketMotion www.PacketMotion.com Internal network security is top of mind for businesses today. To achieve internal network security and satisfy internal and government regulation requirements for network security, network management must be based on identity management. The network security manager must be able to accurately track the activities of every individual on the network. Today's tracking machine and device activities simply does not provide enough information. To achieve a global view of the enterprise network, all the way from a high-level business view down to detailed information about a specific user's activity, a network monitoring system must be able to: · Reveal in detail how the network operates at the user, group, and application levels. · Expose security policies that are not being enforced or that have unforeseen consequences. · Enable management to make business decisions quicker, without spending hours assembling technical details into higher-level data. · Detect internal abuse as it is happening. · Maintain a real time awareness of network activity to avoid reacting to events after the fact. · Support historical investigation and reporting. Identity management systems such as Microsoft's Active Directory enable a structure for the IT to specify the composition of the enterprise. However, as many IT organizations are finding, directory tools provide only a static view of the enterprise and lack integration with the activity of the enterprise. The emerging generation of identity management tools will bind together the business view of the enterprise with the activity view to create an active understanding of the security policies as they are implemented on the corporate network. This is being referred to as identity intelligence. Identity intelligence leads to far improved internal network security by integrating the identity view of Directory systems with the activity on the network resulting in significantly more accurate security policy management and much lower costs associated with forensics and auditing. About Scott Ruple: Scott Ruple has more than 20 years of experience in systems design, networking, and storage networking industries as chief executive, marketing management, and engineering management functions. Before joining PacketMotion, Scott was President and CEO of Coalsere Software and Senior Vice President of Marketing at JNI Corp., named to Red Herring's Top 20 IPOs of 2000. Prior to joining JNI, Scott was Vice President of Marketing at Emulex Network Systems. Before that, Scott spent six years in senior management at Motorola, where he was instrumental in the turn around of the Computer Group and the architecture and design of their next generation semiconductor fab automation systems. His career also includes positions at Ungerman-Bass, Link Flight Systems, and Hughes Aircraft. Scott received his bachelor's degree in Information Systems Engineering from the University of Arizona and his master's degree from the University of Southern California.