Archive: February 2012

Managing your IT infrastructure is no easy task, especially with evolving threats and regulatory compliance requirements. Is your IT management solution up to the task of helping you ensure regulatory compliance?

Monitoring vital systems is important, but developing a monitoring system that can be fully audited and verified is critical for compliance purposes.  SNMPv3 plays a critical part in helping IT organizations meet certification guidelines set forth by many industry regulatory standards.  SNMP provides administrators with the most stable and widely adopted solution to help with the task. SNMP can leverage built-in authentication methods, adhere to encryption standards, and more importantly provide the invaluable ability to expose vast amounts of data to any verified administrator.

IT Monitoring and Compliance
The Federal Information Security Management Act (FISMA), the Health Insurance Portability and Accountability Act (HIPAA) and the Sarbanes–Oxley Act (SOX) are three standards that set guidelines involving process verification and thorough auditing.  All three certification standards focus on developing an audit trail to track who viewed data, when they viewed it, and if they had the proper authorization to do so.  Effectively using SNMPv3 can be critical to helping you ensure compliance with FISMA, HIPPA and SOX.

FISMA Requirements
FISMA certification guidelines require IT organizations within the US Federal Government to record and archive every administrative action or change to network devices.  Administrators can utilize the User-based Security Model (USM) within SNMPv3, recording all changes a specific user makes on any managed device.  The change or actions can be forwarded to a SYSLOG server or service where a query or audit report can be generated.  Additionally, FISMA also requires that IT departments utilize the AES256 encryption standard within SNMPv3’s privacy settings.

HIPPA and SOX Requirements
For both HIPPA and Sarbanes Oxley, the usage of SNMPv3 is recommended as a solution for the “High Level Security” mandate outlined in each certification’s guidelines.  Both regulatory guidelines require full audits and action reports related to every access gained and/or denied on all highly secured network devices. 

With these requirements in mind, is your monitoring system able to leverage SNMPv3 to provide an audit trail to help you with compliance issues? If not, consider our NeuralStar solution which has strong and proven SNMPv3 capabilities.

SNMPv3 capabilities within NeuralStar
IT management solutions use and depend on properly deployed SNMPv3 environments as the control mechanism in gaining management access to all enabled devices. 

To be able to profile, classify, and setup default polling options on the initial discovery is extremely valuable to all management operations.  Highly secured network deployments may utilize unique SNMPv3 values for each device or small groups of devices.

NeuralStar, an enterprise class management solution can utilize the full spectrum of SNMPv3’s USM and encryption settings to gain access to related devices during a network discovery. Via NeuralStar’s comprehensive, built-in utilities, administrators can set specific SNMPv3 values on individual devices. NeuralStar also has a highly sought-after feature in its compatibility with any privacy or encryption standards that an IT organization has deployed, including AES256 encryption within SNMPv3.     

If you have any questions about effectively using SNMPv3 for compliance purposes, please contact us at


network management, it, it management, snmp,

Are you getting the service levels you expect? Find out by downloading our complimentary Service Level Monitor. The Service Level Monitor detects and displays your speed of service by uploading and downloading a file to a remote server.

• Displays upload and download speed with graphics bars and numeric values

Records and displays the historically best upload and download speeds

Tracks the most recent 25 speed tests in a graphical fly-out window

Counts the number of times the service level you defined has not been met

Enables you to customize threshold levels for downstream and upstream data transfer

  Allows you to set bandwidth units, downstream and upstream maximum values, and threshold values

We also have other complimentary utilities that provide monitoring solutions for specific problem areas like servers, applications, website traffic and much more.  You can use these utilities right from your desktop without the need to launch a full blown management program. The series of utilities has logged over 100,000 downloads. Try them out and let us know what you think.



Upcoming Shows – From Army IT to Satellites

Posted on - 1 comments

In the month of March, come visit us at the premiere Army IT show, TechNet Land Forces Southwest and/or the industry leading satellite show Satellite 2012.  Check out the details below.

TechNet Land Forces

Satellite 2012

When: March 27-29

When: March 12-15

Where: Tucson, AZ

Where: Washington, DC

Focus: Network and security operations

Focus: Situational awareness, interference, cybersecurity, ground systems and tactical communications

Why: Come by the booth for a chance to win a big flat screen TV.

Why: Register today with your VIP Code (NEW1892) for free access to the exhibition (A $95 value)!



it, cybersecurity,