1995-09-30 - Computer Misuse Detection System

Header Data

From: anonymous@freezone.remailer
To: cypherpunks@toad.com
Message Hash: cff0aad0d9e3d7678bf4d11bcab12c6e5008582263620461fad853b3f21eb66d
Message ID: <199509301109.HAA21436@light.lightlink.com>
Reply To: N/A
UTC Datetime: 1995-09-30 11:09:16 UTC
Raw Date: Sat, 30 Sep 95 04:09:16 PDT

Raw message

From: anonymous@freezone.remailer
Date: Sat, 30 Sep 95 04:09:16 PDT
To: cypherpunks@toad.com
Subject: Computer Misuse Detection System
Message-ID: <199509301109.HAA21436@light.lightlink.com>
MIME-Version: 1.0
Content-Type: text/plain


URL: http://www.saic.com/products/cmds/index.html


   *** Products and Services ***
     
_________________________________________________________________

   
                       COMPUTER MISUSE DETECTION SYSTEM
                                       
                [CMDS]
                
   Caught in the Act
          Until now, computer misuse could not be detected 
until after
          the damage was done. With CMDS, the system alerts you 
to
          suspicious computer activity as it takes place so you 
can react
          immediately.
          
   Round the Clock Security
          CMDS never sleeps. Computer misuse characteristically 
takes
          place at times when you are not expecting it. If an 
intruder
          rattles your door knob at 2:00 AM, CMDS is there to 
watch the
          shop.
          
   Make the Intruders Think Twice
          Knowing that security software of this type is 
installed will
          give the potential misusers reason to reconsider 
their actions.
          CMDS affects the intruder's motivations by 
threatening them
          with unseen protection. Like police radar, they won't 
know it's
          there until they've been caught!
          
   Security Through Pictures
          If a picture is worth a thousand words and then CMDS 
speaks
          volumes about the security status of your network. 
The security
          trending reports show you, graphically, all the 
information you
          need to identify the intruders.
          
   Off-the-Rack or Tailor Made
          A well made suit off-the-rack can meet the needs of 
most people
          at tremendous cost savings. However, a tailor-made 
suit may be
          necessary when the person in need has special 
requirements.
          SAIC can tailor a system using CMDS core technology 
to meet any
          large heterogeneous network or detection 
requirements.
          
   Increase Efficiency While Reducing Cost, Time Spent, and 
Losses
          CMDS will increase efficiency of your security 
operations by
          performing faster than a manual review process. Your 
security
          staff will be freed up for other activities reducing 
your
          overall cost. Your losses will decrease through the 
deterrence
          and detection capabilities of CMDS.
          
   
     
_________________________________________________________________

   
More About CMDS...

          o Detecting Computer Crime
          o Product Description
          o Designed to Detect
          o Detection Capabilities
          o System Requirements
          o Licensing and More Information
          
   
     
_________________________________________________________________

   
Intrusion Detection Research Papers

          Audit Reduction and Misuse Detection in Heterogeneous
          Environments: Framework and Application.
          Click here to download Macintosh Microsoft Word 5.1 
file
          (464K).
          
   
     
_________________________________________________________________

   
   Copyright SAIC Home
     
_________________________________________________________________

   
    Last updated on 07-10-95







Thread