<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Complex Data Visualized &#187; toolComplex Data Visualized</title>
	<atom:link href="http://complexdatavisualized.com/tag/tool/feed/" rel="self" type="application/rss+xml" />
	<link>http://complexdatavisualized.com</link>
	<description>Survey of interfaces and visualizations of complex networks</description>
	<lastBuildDate>Wed, 26 Nov 2014 21:34:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>IPython: interactive/self-documenting data analysis</title>
		<link>http://complexdatavisualized.com/ipython-interactiveself-documenting-data-analysis/</link>
		<comments>http://complexdatavisualized.com/ipython-interactiveself-documenting-data-analysis/#comments</comments>
		<pubDate>Mon, 09 Sep 2013 12:53:38 +0000</pubDate>
		<dc:creator>Johannes Landstorfer</dc:creator>
				<category><![CDATA[communication]]></category>
		<category><![CDATA[Visualization Work]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[Ideas]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[tool]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=727</guid>
		<description><![CDATA[IPython is an &#8220;interactive&#8221; framework for writing python code. Code snippets can be run at the programmer&#8217;s will and the output will be displayed right below the code. Together with rich input from html-markup to iFrames, an entire workflow can be fully documented. This is very handy for learning, of course, but also to make a complex analysis of a computer incident available and transparent to later readers. As everything (docu, code, output) gets &#8220;statically&#8221; ...]]></description>
				<content:encoded><![CDATA[<p><a href="http://ipython.org/" target="_blank">IPython</a> is an &#8220;interactive&#8221; framework for writing python code. Code snippets can be run at the programmer&#8217;s will and the output will be displayed right below the code. Together with rich input from html-markup to iFrames, an entire workflow can be fully documented. This is very handy for learning, of course, but also to make a complex analysis of a computer incident available and transparent to later readers. As everything (docu, code, output) gets &#8220;statically&#8221; saved in JSON, the documentation is even independent of the availability of data sources. (Note: there is also a special &#8220;<a href="http://nbviewer.ipython.org/" target="_blank">Notebook viewer</a>&#8221; available online so the reader doesn&#8217;t have to know/have IPython her/himself)</p>
<p>As a couple of powerful viz and analysis libraries are available for Python (such as <a href="http://pandas.pydata.org/" target="_blank">PANDAS</a>), this is (almost) ideal for recording an analysts way to a result.</p>
<p>Ideas for improvement:</p>
<ol>
<li>make it even more interactive/auto-updating so that changes in one place (&#8220;cell&#8221;) show up in other places at once (maybe even work with realtime sources?) – maybe towards frameworks like puredata/MAX: this would help explore various parameters for the analysis functions.</li>
<li>Think about some auto-recording functions so that documentation becomes easier and the &#8220;author&#8221; has to think less about it. This might be especially possible in the narrow context of network security analysis where certain procedures are standardized or very common.</li>
</ol>
<p>See how it works, e.g. with PCAPS (German)</p>
<p><iframe width="955" height="537" src="http://www.youtube.com/embed/66c7aACFf7Q?feature=oembed&#038;start=1080" frameborder="0" allowfullscreen></iframe></p>
<p>Thanks to <a href="http://www.genua.de" target="_blank">Genua</a> who shared their internal training so well recorded and so generously!</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/ipython-interactiveself-documenting-data-analysis/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Stanford Dissertation Browser</title>
		<link>http://complexdatavisualized.com/stanford-dissertation-browser/</link>
		<comments>http://complexdatavisualized.com/stanford-dissertation-browser/#comments</comments>
		<pubDate>Wed, 03 Apr 2013 14:13:13 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[graph]]></category>
		<category><![CDATA[infosthetics]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[science]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=410</guid>
		<description><![CDATA[The Stanford Dissertation Browser is an interactive tool to explore similarities between different fields of study at Stanford University by examining the language used in the different PhD publications. Fields of study are arranged around a circle with one field of study in the centre. For the subject in the centre similarities with other fields are shown by the distance to the centre. The closer the circles, the more common the language these fields share. ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-416" alt="Stanford-Dissertation-Browser-electrical-engineering-625x608" src="http://complexdatavisualized.com/wp-content/uploads/2013/04/Stanford-Dissertation-Browser-electrical-engineering-625x608.png" width="625" height="608" />The <a href="http://nlp.stanford.edu/projects/dissertations/browser.html">Stanford Dissertation Browser</a> is an interactive tool to explore similarities between different fields of study at Stanford University by examining the language used in the different PhD publications. Fields of study are arranged around a circle with one field of study in the centre. For the subject in the centre similarities with other fields are shown by the distance to the centre. The closer the circles, the more common the language these fields share.</p>
<p>For example, if you select <em>Electrical Engineering</em> the field <em>Computational Science</em> will move close to the centre, which is not a big surprise. When selecting <em>Music</em>, however, <em>Computational Science</em> also moves very close to the centre. Something you might not expect, at least not to this degree. With a slider at the bottom different years can be selected. The different years are shown all the time in the diagram by very subtle grey circles, which display year and field of study, if you hover over them. In this way you get an overview over the distribution over time and can get more details by moving the timeline slider to select specific years.</p>
<p>This way of visualizing a network is similar to the method the research group <em>Research on Complex Systems</em> at <em>Northwestern University</em> used in their <a title="Visualizing connectivity of airports during Eyjafjallajökull eruption" href="http://complexdatavisualized.com/?p=399">visualization of the structural change in the international flight network</a>. In a similar manner, one particular node was put into focus, surrounding nodes being closer to this node when these two nodes were strongly connected by many links. The same ist the case with the different fields of study. The more words they share, the more connections or links are there between these fields, moving them closer together.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/stanford-dissertation-browser/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Log Visualization with a Correlation Engine</title>
		<link>http://complexdatavisualized.com/security-log-visualization-with-a-correlation-engine/</link>
		<comments>http://complexdatavisualized.com/security-log-visualization-with-a-correlation-engine/#comments</comments>
		<pubDate>Thu, 07 Feb 2013 17:39:48 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=224</guid>
		<description><![CDATA[On the 28th Chaos Communication Congress organized by Chaos Computer Club in Berlin, network security specialist Chris Kubecka talks about how correlation and visualization of network log data from different devices can support the process of finding potential threats and malware. Usually a network is comprised of a variety of different devices that each generates log files in its own format. Having a separate console for each of these devices]]></description>
				<content:encoded><![CDATA[<p><iframe width="955" height="537" src="http://www.youtube.com/embed/1ITnxWuBKnk?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>On the <a href="http://events.ccc.de/congress/2011/wiki/Welcome">28th Chaos Communication Congress</a> organized by Chaos Computer Club in Berlin, network security specialist Chris Kubecka talks about how correlation and visualization of network log data from different devices can support the process of finding potential threats and malware. Usually a network is comprised of a variety of different devices that each generates log files in its own format. Having a separate console for each of these devices</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/security-log-visualization-with-a-correlation-engine/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>LogRhythm</title>
		<link>http://complexdatavisualized.com/logrhythm/</link>
		<comments>http://complexdatavisualized.com/logrhythm/#comments</comments>
		<pubDate>Thu, 07 Feb 2013 16:23:30 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[SIEM]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[desktop]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=206</guid>
		<description><![CDATA[LogRhythm is a SIEM that can be applied either in smaller organizations as a single software instance or in midsize to large organizations as a combination of different software applications. It offers log management, event management, reporting, user and file integrity monitoring. The product is easily and quickly deployed due to a helpful configuration wizard. Though LogRhythm is capable of event correlation, compared to its competitors it&#8217;s very basic and optimized for the most common ...]]></description>
				<content:encoded><![CDATA[<p><a href="http://logrhythm.com/"><img class="alignnone size-large wp-image-221" alt="LogRhythm" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/LogRhythm-1024x620.png" width="1024" height="620" /></a></p>
<p><a href="http://logrhythm.com/">LogRhythm</a> is a SIEM that can be applied either in smaller organizations as a single software instance or in midsize to large organizations as a combination of different software applications. It offers log management, event management, reporting, user and file integrity monitoring. The product is easily and quickly deployed due to a helpful configuration wizard. Though LogRhythm is capable of event correlation, compared to its competitors it&#8217;s very basic and optimized for the most common use cases. Gartner has positioned the product in their <a href="http://www.gartner.com/technology/reprints.do?id=1-1ANUJF3&amp;ct=120525&amp;st=sb">Magic Quadrant for Security Information and Event Management</a> as one of the leaders.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/logrhythm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Sentinel, Security Manager (NetIQ)</title>
		<link>http://complexdatavisualized.com/sentinel-security-manager-netiq/</link>
		<comments>http://complexdatavisualized.com/sentinel-security-manager-netiq/#comments</comments>
		<pubDate>Wed, 06 Feb 2013 15:58:26 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[SIEM]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[desktop]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=183</guid>
		<description><![CDATA[The company NetIQ offers two SIEM solutions: Sentinel and Security Manager. Sentinel is a product originally offered by Novell. With the recent acquisition of the company by NetIQ there are two products overlapping in their functionality. In the future all functionality will be merged into the Sentinel solution. Sentinel&#8217;s strength lies in event correlation and real-time event management. Security Manager lacks this functionality and focuses more on host- and agentbased monitoring capabilities for server platforms, ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-198" alt="NetIQ Sentinel" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/NetIQ-Sentinel.jpg" width="900" height="636" /></p>
<p>The company <a href="https://www.netiq.com/">NetIQ</a> offers two SIEM solutions: <a href="https://www.netiq.com/products/sentinel/">Sentinel</a> and <a href="https://www.netiq.com/products/security-manager/">Security Manager</a>. Sentinel is a product originally offered by Novell. With the recent acquisition of the company by NetIQ there are two products overlapping in their functionality. In the future all functionality will be merged into the Sentinel solution. Sentinel&#8217;s strength lies in event correlation and real-time event management. Security Manager lacks this functionality and focuses more on host- and agentbased monitoring capabilities for server platforms, something missing in most SIEMs. Sentinel is a leader in the <a href="http://www.gartner.com/technology/reprints.do?id=1-1ANUJF3&amp;ct=120525&amp;st=sb">Gartner Magic Quadrant 2012</a></p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/sentinel-security-manager-netiq/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Enterprise Security Manager (McAfee)</title>
		<link>http://complexdatavisualized.com/enterprise-security-manager-mcafee/</link>
		<comments>http://complexdatavisualized.com/enterprise-security-manager-mcafee/#comments</comments>
		<pubDate>Wed, 06 Feb 2013 14:23:33 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[SIEM]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=166</guid>
		<description><![CDATA[McAfee NitroSecurity is a software that offers SIEM functionality and log management in one single tool separating it from other SIEM systems. It is scalable and has a high performance, which makes it especially useful for organizations that need to analyse huge numbers of events. The company itself emphasizes the speed of the product as an outstanding feature. It is one of the five products positioned as leader in the Magic Quadrant for Security Information ...]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.mcafee.com/us/products/enterprise-security-manager.aspx#vt=vtab-Overview"><img class="alignnone size-large wp-image-176" alt="McAfee NitroSecurity" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/McAfee-NitroSecurity-1024x716.png" width="1024" height="716" /></a><img class="alignnone size-large wp-image-181" alt="McAfee NitroSecurity 2" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/McAfee-NitroSecurity-2-1024x716.png" width="1024" height="716" /></p>
<p><a href="http://www.mcafee.com/us/products/enterprise-security-manager.aspx#vt=vtab-Overview">McAfee NitroSecurity</a> is a software that offers SIEM functionality and log management in one single tool separating it from other SIEM systems. It is scalable and has a high performance, which makes it especially useful for organizations that need to analyse huge numbers of events. The company itself emphasizes the speed of the product as an outstanding feature. It is one of the five products positioned as leader in the <a href="http://www.gartner.com/technology/reprints.do?id=1-1ANUJF3&amp;ct=120525&amp;st=sb">Magic Quadrant for Security Information and Event Management</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/enterprise-security-manager-mcafee/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Q1 Labs (IBM)</title>
		<link>http://complexdatavisualized.com/q1-labs-ibm/</link>
		<comments>http://complexdatavisualized.com/q1-labs-ibm/#comments</comments>
		<pubDate>Wed, 06 Feb 2013 13:10:27 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[SIEM]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=146</guid>
		<description><![CDATA[IBM offers an extensive security system solution called Q1 Labs. This includes several products for different security aspects, like, for example, QRadar Log Manager for collecting, archiving and analyzing network and security event logs or QRadar SIEM for real-time analysis of security alerts and correlating data from different sources to detect any threats. The product distinguishes itself from other products by its ability to collect and process NetFlow data, by deep packet inspection (DPI) and ...]]></description>
				<content:encoded><![CDATA[<p>IBM offers an extensive security system solution called <a href="http://q1labs.com/">Q1 Labs</a>. This includes several products for different security aspects, like, for example, QRadar Log Manager for collecting, archiving and analyzing network and security event logs or QRadar SIEM for real-time analysis of security alerts and correlating data from different sources to detect any threats. The product distinguishes itself from other products by its ability to collect and process NetFlow data, by deep packet inspection (DPI) and behavior analysis for all supported event sources. <a href="http://www.gartner.com/technology/reprints.do?id=1-1ANUJF3&amp;ct=120525&amp;st=sb">According to Gartner</a> it can be considered one of the leaders in the field (Gartner 2012).</p>
<p><img class="alignnone size-full wp-image-156" alt="QRadar SIEM Dashboard" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/QRadar-SIEM-Dashboard.png" width="806" height="572" /></p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/q1-labs-ibm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HP Enterprise Security Products and ArcSight</title>
		<link>http://complexdatavisualized.com/hp-enterprise-security-products-and-arcsight/</link>
		<comments>http://complexdatavisualized.com/hp-enterprise-security-products-and-arcsight/#comments</comments>
		<pubDate>Tue, 05 Feb 2013 18:50:42 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[SIEM]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[graph]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=131</guid>
		<description><![CDATA[In their business unit ESP (Enterprise Security Products) Hewlett Packard offers several security tools in three different areas: Application Security (Fortify), Information Security (ArcSight) and Network and Cloud Security (Tipping Point). While Fortify is targeted at software security, ArcSight can be considered a SIEM (Security Information and Event Management) system. TippingPoint is a defense system against cyber attacks and threats. According to Gardner ArcSight can be considered as one of the leaders in the field ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-large wp-image-142" alt="ArcSight ESM Dashboard" src="http://complexdatavisualized.com/wp-content/uploads/2013/02/ArcSight-ESM-Dashboard-1024x469.png" width="1024" height="469" />In their business unit <a href="http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#">ESP</a> (Enterprise Security Products) Hewlett Packard offers several security tools in three different areas: Application Security (Fortify), Information Security (ArcSight) and Network and Cloud Security (Tipping Point). While Fortify is targeted at software security, ArcSight can be considered a SIEM (Security Information and Event Management) system. TippingPoint is a defense system against cyber attacks and threats.<br />
<a href="http://www.gartner.com/technology/reprints.do?id=1-1ANUJF3&amp;ct=120525&amp;st=sb">According to Gardner</a> ArcSight can be considered as one of the leaders in the field of SIEMs. There are different ArcSight SIEM solutions available depending, if you are  interested in recording and analyzing log information or if you are focussing on real-time security events. The choice for one of the solutions is also dependent on the size of your network.</p>
<p>Though ArcSight is one of the most popular products on the market on the market it has its shortcomings:</p>
<blockquote><p>&#8220;ArcSight Enterprise Security Manager is complex in terms of deployment and performance management.&#8221;</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/hp-enterprise-security-products-and-arcsight/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Splunk</title>
		<link>http://complexdatavisualized.com/splunk/</link>
		<comments>http://complexdatavisualized.com/splunk/#comments</comments>
		<pubDate>Mon, 28 Jan 2013 17:07:06 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Intrusion Detection System]]></category>
		<category><![CDATA[Visualizations]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[commercial]]></category>
		<category><![CDATA[dashboard]]></category>
		<category><![CDATA[diagram]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=107</guid>
		<description><![CDATA[Splunk is a general tool for analysing data in huge IT infrastructures. It consists of different tools that can be utilized in different contexts. With the &#8220;Splunk App for Enterprise Security&#8221; potential threats and security incidents can be observed, analysed and classified. Users of the app are presented with a web dashboard that visualizes different aspects of the network.]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-116" alt="splunk_dashboard 2" src="http://complexdatavisualized.com/wp-content/uploads/2013/01/splunk_dashboard-2.png" width="664" height="450" /> <img class="alignnone size-full wp-image-117" alt="splunk_dashboard" src="http://complexdatavisualized.com/wp-content/uploads/2013/01/splunk_dashboard.png" width="663" height="394" /></p>
<p><a href="http://www.splunk.com/">Splunk</a> is a general tool for analysing data in huge IT infrastructures. It consists of different tools that can be utilized in different contexts. With the &#8220;Splunk App for Enterprise Security&#8221; potential threats and security incidents can be observed, analysed and classified. Users of the app are presented with a web dashboard that visualizes different aspects of the network.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/splunk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ACARM WUI</title>
		<link>http://complexdatavisualized.com/acarm-wui/</link>
		<comments>http://complexdatavisualized.com/acarm-wui/#comments</comments>
		<pubDate>Mon, 28 Jan 2013 13:27:23 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Intrusion Detection System]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[heatmap]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tool]]></category>
		<category><![CDATA[visualization]]></category>
		<category><![CDATA[web]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=86</guid>
		<description><![CDATA[ACARM (Alert Correlation, Assessment and Reaction Module) is a tool that correlates alerts sent by host and network sensors into groups and in that way reducing the amount of messages that need to be viewed by a sytem administrator. There is a Web GUI that let&#8217;s the admin observe the different kinds of alerts with different graphical representations like, for example, pie charts, bar charts or more advanced. Different kinds of alerts are color coded ...]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-93" alt="ACARM_Heatmap" src="http://complexdatavisualized.com/wp-content/uploads/2013/01/ACARM_Heatmap.png" width="500" height="482" /></p>
<p>ACARM (Alert Correlation, Assessment and Reaction Module) is a tool that correlates alerts sent by host and network sensors into groups and in that way reducing the amount of messages that need to be viewed by a sytem administrator. There is a Web GUI that let&#8217;s the admin observe the different kinds of alerts with different graphical representations like, for example, pie charts, bar charts or more advanced. Different kinds of alerts are color coded on a color scale from green to red, green being just information, while red being critical.</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/acarm-wui/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
