How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or

Size: px
Start display at page:

Download "How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or"

Transcription

1 Supported Products (Sample List) April, 2013

2 - Supported Products (Sample List) Supported Products (Sample List) LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications. Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from which Logs can be collected and managed is much broader than the list below. If you are seeking support for a log source type not listed below, support may exist or can be developed to meet your needs. For any custom log source or device not currently supported for full normalization, LogRhythm can collect, archive and manage those logs out-of-the-box. Furthermore, LogRhythm provides customers with the capability to create full normalization within the application. Alternatively, LogRhythm professional services can develop support for you Com Switch A A10 Networks AX1000 Load Balancer Active Scout IPS Adtran Switch AirDefense Enterprise Airmagnet Wireless IDS AirTight IDS/IPS Airwave Management System Log AIX Host AIX Host Alcatel-Lucent Wireless Controller Apache Access Log Apache Access Log Apache Access Log Apache Error Log Apache Error Log Apache SSL Access Log Apache SSL Access Log Apache SSL Error Log Apache Tomcat Access Log Apache Tomcat Request Parameters Apache Tomcat Service Clients Log APC ATS APC NetBotz Environmental Monitoring APC PDU APC UPS Arista Switch Arris CMTS Aruba Mobility Controller AS/400 via Powertech Interact Astaro Gateway Avaya Voice Mail Log Aventail SSL/VPN Avocent Cyclades Terminal Axway SFTP Azul Java Appliance B Barracuda Load Balancer Barracuda Spam Firewall Barracuda Web Application Firewall Barracuda Webfilter Bind 9 Bit9 Parity Suite Bit9 Parity Suite CEF Black Diamond Switch BlackBerry Enterprise Blue Coat PacketShaper Blue Coat Proxy BCREPORTERMAIN Blue Coat Proxy BCREPORTERMAIN Blue Coat Proxy SQUID-1 Blue Coat Proxy Unsupported CSV Blue Coat Proxy Unsupported W3C Blue Coat ProxyAV ISA W3C Blue Coat ProxyAV MS Proxy 2.0 Blue Coat ProxySG Bomgar Bradford Remediation & Registration Svr Brocade Switch BSD BSD Host C CA ACF2 for z/os - ACFRPTDS CA ACF2 for z/os - ACFRPTEL CA ACF2 for z/os - ACFRPTJL CA ACF2 for z/os - ACFRPTLL CA ACF2 for z/os - ACFRPTNV CA ACF2 for z/os - ACFRPTOM CA ACF2 for z/os - ACFRPTPW CA ACF2 for z/os - ACFRPTRL CA ACF2 for z/os - ACFRPTRV CA ControlMinder Cell Relay Cerberus FTP Cerner Checkpoint IPS Checkpoint Site-to-Site VPN Cisco ACS Cisco Aironet WAP Cisco Application Control Engine Cisco ASA Cisco Clean Access (CCA) Appliance Cisco CSS Load Balancer Cisco FWSM Cisco Global Site Selector Cisco IDS/IPS Cisco Ironport Web W3C Cisco ISE Cisco LMS (cwcli) Cisco LMS (Syslog) PAGE LogRhythm Inc.

3 Cisco Nexus Switch Cisco NGFW Cisco PIX Cisco PIX Cisco Router Cisco Secure ACS 5 Cisco Secure ACS CSV File Cisco Agent Cisco Switch Cisco UCS Cisco Unified Comm Mgr (Call Mgr) Cisco VPN Concentrator Cisco WAAS Cisco Wireless Access Point Cisco Wireless Control System CiscoWorks Citrix Access Gateway IIS Citrix Access Gateway NCSA Common Citrix Access Gateway Citrix Access Gateway W3C Citrix Netscaler Citrix Presentation Citrix Xen ClamAV Anti-Virus CodeGreen Data Loss Prevention ColdFusion Application Log ColdFusion Exception Log ColdFusion Mail Log ColdFusion Mailsent Log ColdFusion Log Consentry NAC Corero IPS Cornerstone Managed File Transfer Coyote Point Equalizer CoyotePoint Equalizer Cyber-Ark D DB2 Audit Log DB2 via BMC Log Master Deepnet DualShield Defender Dell Force 10 Dell PowerConnect Switch Dell Remote Access Controller Dialogic Media Gateway DocWorks E Ecessa ShieldLink eeye Retina Vulnerability Scanner EMC VNX Enterasys Dragon IDS Enterasys Router Enterasys Switch Entrust IdentityGuard Epicor Coalition EqualLogic SAN esafe Event Reporter (Win 2000/XP/2003) ExtremeWare ExtremeXOS F F5 BIG-IP ASM F5 BigIP Traffic Manager F5 Firepass Firewall F5 LTM FairWarning Ready-For- Healthcare Fargo HDP Card Printer and Encoder Fidelis XPS Finacle Core Finacle Treasury Logs FireEye Web MPS FireEye Web MPS Forescout CounterACT NAC Fortinet FortiGate Fortinet FortiGate v4.0 Fortinet FortiGate v5.0 Foundry Switch G Gene6 FTP Gene6 FTP Generic ISC DHCP GlobalSCAPE EFT Guardium Database Activity Monitor H H3C Router Hitachi Universal Storage Platform HP Procurve Switch HP Router HP Unix Tru64 HP Virtual Connect Switch HP-UX Audit Log HP-UX Host HP-UX Host I IBM 4690 POS IBM Blade Center IBM Informix Application Log IBM Informix Audit Log IBM WebSphere App v7 Audit Log IBM WebSphere Cast Iron Cloud Integration IBM ZOS Batch Decryption Log IBM ZOS CICS Decryption Log IBM ZOS RACF Access Log IBM ZOS RACF SMF Type 80 IceWarp Imperva SecureSphere InfoBlox Ingrian Safenet iprism Proxy Log IPTables Irix Audit Logs IRIX Host IRIX Host Ironport Ironport Web aclog iseries via Powertech Interact ISS Proventia SiteProtector - IPS IT-CUBE AgileSI J JBoss Log File JetNexus Load Balancer J-Flow - Juniper J-Flow Version 5 J-Flow - Juniper J-Flow Version 9 Juniper DX Application Accelerator Juniper Firewall Juniper Host Checker Juniper IDP Juniper NSM Juniper Router Juniper SSL VPN Juniper SSL VPN WELF Juniper Steel Belted Radius Juniper Switch Juniper Trapeze K Kemp Load Balancer Kerio Mail KERISYS Doors Event Export L Lancope StealthWatch Layer 7 SecureSpan SOA Gateway Lieberman Enterprise Random Password Manager Linux Audit Linux Audit ASCII

4 Linux Audit Log Linux Host Linux Host LOGbinder SP LogRhythm Data Loss Defender LogRhythm Enterprise Monitoring Solution LogRhythm File Monitor (AIX) LogRhythm File Monitor (HP- UX) LogRhythm File Monitor (Linux) LogRhythm File Monitor (Solaris) LogRhythm File Monitor (Windows) Connection Monitor (AIX) Connection Monitor (HP- UX) Connection Monitor (Linux) Connection Monitor (Solaris) Connection Monitor (Windows) Monitor (AIX) (HP-UX) (Linux) (Solaris) (Windows) LogRhythm SQL 2000 C2 Audit Log LogRhythm SQL 2005 C2 Audit Log LogRhythm SQL 2008 C2 Audit Log LogRhythm Syslog Generator LogRhythm Syslog Generator Monitor (AIX) Monitor (HP-UX) Monitor (Linux) Monitor (Solaris) Monitor (Windows) Lotus Domino Client Log M MacOS X McAfee And Web McAfee epolicy Orchestrator Events McAfee epolicy Orchestrator epoevents McAfee epolicy Orchestrator epoevents McAfee Foundstone McAfee IntruShield Manager McAfee Network Access Control McAfee Secure Internet Gateway McAfee Secur Meridian Metasploit Penetration Scanner Microsoft ActiveSync 2010 Microsoft CRM Microsoft DHCP Log Microsoft Forefront TMG Microsoft IIS (IIS ) File Microsoft IIS Error Log V6 Microsoft IIS FTP IIS Log File Microsoft IIS FTP W3C Extended Microsoft IIS NCSA Common File Microsoft IIS SMTP W3C Microsoft IIS URL Scan Log Microsoft IIS W3C File Microsoft Port Reporter PR- PORTS Log Microsoft SQL 2000 Error Log Microsoft SQL 2005 Error Log Microsoft SQL 2008 Error Log Application Backup DFS Diagnosis-PLA Dir Service DNS Dot Defender Firewall With Advanced Forefront AV Group Policy Operational Hyper-V Hvisor Hyper-V IMS Hyper-V Network Hyper-V SynthSt Hyper-V VMMS Hyper-V Worker MSExchange Management Operations Manager Print Services Replication SafeWord 2008 Setup System Task Scheduler TS Licensing TS Local Session Manager TS Remote Connection Manager TS Session Broker TS Session Broker Client Microsoft Windows 2008 DNS Microsoft Windows Firewall Application BioPassword DFS Directory Service DNS

5 DotDefender File Rep Service HA Kaspersky Micros POS PatchLink SafeWord 2008 SCE SMS 2003 System Virtual Mirapoint Monetra Motorola Access Point Microsoft 2003 Event Log (Snare) Microsoft 2003 Event Log (Snare) Microsoft 2008 Event Log (Snare) Microsoft Exchange 2003 Microsoft Exchange 2003 Microsoft Exchange 2007 Microsoft Exchange 2007 Microsoft Exchange 2010 Microsoft Exchange 2010 Microsoft Exchange RPC Client Access Microsoft IAS/RAS NPS DB Log Microsoft IAS/RAS Standard Log Microsoft IIS Web Log W3C (Snare) Microsoft ISA 2006 ISA All Fields Microsoft ISA 2006 W3C All Fields Microsoft SQL Reporting Services 2008 MySQL MySQL error.log MySQL mysql.log MySQL mysql-slow.log N Nagios ncircle Configuration Compliance Manager Nessus System Log Nessus Vulnerability Scanner NetApp CIFS Audit Event Log NetApp Filer Netflow - Cisco Netflow Version 1 Netflow - Cisco Netflow Version 5 Netflow - Cisco Netflow Version 9 Netflow - Palo Alto Version 9 NetScreen Firewall NeXpose Vulnerability Scanner Nortel 8600 Switch Nortel BayStack Switch Nortel Contivity Nortel Firewall Nortel IP 1220 Nortel Passport Switch Novell Audit Novell GroupWise Novell LDAP NuSecure Gateway O ObserveIT Enterprise OpenLDAP OpenVMS OpenVPN OPSEC LEA - Checkpoint Firewall OPSEC LEA - Checkpoint Firewall Audit Log OPSEC LEA - Checkpoint Log Oracle 10g Audit Trail Oracle 10g Audit Trail Oracle 10g Audit Trail Oracle 11g Audit Trail Oracle 11g Audit Trail Oracle 11g Audit Trail Oracle 11g Fine Grained Audit Trail Oracle 9i Oracle 9i Audit Trail Oracle Listener Audit Trail Oracle SunOne Directory Oracle SunOne Web Access Log Oracle Virtual Directory OSSEC Alerts Other Other Outpost24 P Palo Alto Firewall Polycom Postfix Postfix Princeton Card Secure ProFTPD Proofpoint Spam Firewall Protegrity Defiance DPS PureMessage For Exchange SMTP Log PureMessage For UNIX Blocklist Log PureMessage For UNIX Message Log Q Qualys Vulnerability Scanner Quest Defender R RACF (SMF) Radmin Radware Alteon Load Balancer Radware DefensePro Radware Web Director Audit Log Raritan KVM Raz-Lee Riverbed RL Patient Feedback RSA ACE RSA Adaptive Authentication RSA Authentication Manager 6.1 RSA Authentication Manager v7.1 RuggedRouter S SecureTrack SEL 3530 RTAC SEL 3610 Port Switch SEL 3620 Ethernet Gateway Sendmail File sflow - Version 5 SharePoint 2007 AuditData SharePoint 2010 EventData Sharepoint ULS ShoreTel VOIP

6 Sidewinder Firewall Siemens Invision Siemens Radiology Information System SnapGear Firewall SNMP Trap - Audiolog SNMP Trap - Cyber-Ark SNMP Trap - Dell OpenManage SNMP Trap - HP Network Node Manager SNMP Trap - IBM TS3000 Series Tape Drive SNMP Trap - RSA Authentication Manager SNMP Trap - Swift Alliance SNMP Trap - Trend Micro Control Manager Snort Fast Alert File Snort IDS Solaris - Sulog Solaris (Snare) Solaris Audit Log Solaris Host Solaris Host SonicWALL SonicWALL SSL-VPN Sophos Anti-Virus Sophos Encryption Appliance Sophos Web Proxy Sourcefire estreamer Sourcefire IDS 3D Sourcefire RNA SpamAssassin Squid Proxy Squid Proxy StoneGate Firewall Sudo.Log Swift Alliance Sygate Firewall Symantec Antivirus 10.x Corporate Edtn Symantec DLP Symantec Endpoint Symantec PGP Gateway Symbol Wireless Access Point Symmetry Access Control T Tandem EMSOUT Log File Tandem XYGATE Tipping Point IPS Tipping Point SSL Reverse Proxy Top Layer IPS Townsend Alliance LogAgent Trade Innovations CSCS Trend Micro Deep Trend Micro IMSS Trend Micro IWSVA Trend Micro Office Scan Tripwire Tumbleweed Mailgate Tumbleweed Mailgate U Untangle V Verint Audit Trail File VMWare ESX VMWare vcenter VMWare Virtual Machine Voltage Secur Vormetric CoreGuard Vormetric Log File vsftp Daemon Log W Watchguard FireBox WebDefend WebSense WebSense DLP WebSense Web WS2000 Wireless Access Point Wurldtech SmartFirewall X Xirrus Wireless Array XPient POS CCA Manager XPIENT POS POSLOG XPIENT POS Shell Log Z Zimbra System Log ZXT Load Balancer

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server

More information

Supported Devices (Event Log Sources)

Supported Devices (Event Log Sources) Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Security Event Viewer and Security Event Manager offer scalable and comprehensive data security assistance monitoring

More information

HawkEye AP Log Adapter List Updated January 2014

HawkEye AP Log Adapter List Updated January 2014 HawkEye AP Log Adapter List Updated January 2014 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

HawkEye AP Log Adapter List Updated January 2016

HawkEye AP Log Adapter List Updated January 2016 HawkEye AP Log Adapter List Updated January 2016 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee

More information

Reference Guide. Skybox View 7.0.600. Revision: 11

Reference Guide. Skybox View 7.0.600. Revision: 11 Reference Guide Skybox View 7.0.600 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards

More information

Supported Data & Log Sources

Supported Data & Log Sources Supported Data & Log Sources IT Compliance & Event Log Management Software for SIEM 14 South Networks IntraLock 30 3Com 4400 Switch 3Com 4500 Switch 3Com 4500G Switch 3Com 4800G Switch 3Com 5500 Switch

More information

Release Notes ArcSight SmartConnector

Release Notes ArcSight SmartConnector Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Copyright 2009 ArcSight, Inc. All rights reserved. ArcSight,

More information

McAfee SIEM Device Support

McAfee SIEM Device Support McAfee SIEM Device Support By Vendor Vendor Device Name Device Type Supported Logs A10 Networks Load Balancer (AX Series) Load Balancer ASP Syslog Adtran NetVanta Network Switches & Routers ASP Syslog

More information

og 4 NET A SureL 201

og 4 NET A SureL 201 SureLog ANET 2014 1. SURELOG: ADVANCED SECURITY MANAGEMENT... 3 2. ADVANTAGES... 3 Why Fast EPS Performance Matters... 3 3. LOG MANAGEMENT... 5 Comprehensive Log Data Collection and Log Management... 5

More information

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and

More information

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga Vendor/Product Log Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked

More information

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE CONFIDENCE: SECURED PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

Supported Log File Formats

Supported Log File Formats Supported File Formats Vendor/Product Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com 8e6 R2000 8e6 R3000 Aladin Esafe Blocked s Allied Telesyn ATI Level 3 Switch

More information

Global IT Networks Skills Matrix

Global IT Networks Skills Matrix Global IT Networks Skills Matrix Server Core Infrastructure and Management Windows Server (all versions) SQL (Infrastructure) SQL (DBA) Active Directory Active Directory Certificate s Active Directory

More information

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM

More information

NetBrain Workstation 6.0

NetBrain Workstation 6.0 Live Discovery: NetBrain can discover and map any SNMP reachable device. Device Vendor and Type Support Level Provided Tier 1 Tier 2 Tier 3 Router Alcatel Lucent Service Router Yes Yes Yes Cisco IOS Router

More information

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2) Log Correlation Engine 4.2 Architecture Guide October 3, 2013 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Architecture... 3 Components of the Log Correlation Engine...

More information

Detecting a Hacking Attempt

Detecting a Hacking Attempt Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6

More information

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY Connectors Overview Our library of out-of-the-box Connectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source

More information

TIBCO LogLogic Unity Quick Reference Guide Concepts

TIBCO LogLogic Unity Quick Reference Guide Concepts TIBCO LogLogic Unity Quick Reference Guide Concepts Overview TIBCO LogLogic Unity is a sleek, modern and scalable platform enabling technical teams to resolve open issues, which require advanced troubleshooting

More information

Peter Dulay, CISSP Senior Architect, Security BU

Peter Dulay, CISSP Senior Architect, Security BU CA Enterprise Log Manager 12.5 Peter Dulay, CISSP Senior Architect, Security BU Agenda ELM Overview ELM 12.5: What s new? ELM to CA Access Control/PUPM Integration CA CONFIDENTIAL - Internal Use Only Overview

More information

SENTINEL MANAGEMENT & MONITORING

SENTINEL MANAGEMENT & MONITORING MANAGEMENT & MONITORING Network Monitoring Server Monitoring Database Monitoring Application Monitoring End User Response Time Monitoring Virtualisation Monitoring VOIP Monitoring SLA Monitoring Knowing

More information

Competitive Replacement Program: Product Matrix

Competitive Replacement Program: Product Matrix Competitive Replacement Program: Product Matrix Helping you get the right Application Delivery Networking solution for your organization s needs. Category Eligible Trade-in Products F5 Purchased Products

More information

JUNIPER NETWORKS STRM TECHNICAL NOTE

JUNIPER NETWORKS STRM TECHNICAL NOTE JUNIPER NETWORKS STRM TECHNICAL NOTE USING EXTENSION DOCUMENTS JUNE 2008 Device extensions allow you to modify how a DSM parses logs, which is useful for resolving parsing issues. However, before you define

More information

Select the right security information and event management solution to automate security and compliance operations.

Select the right security information and event management solution to automate security and compliance operations. Security information and event management solutions Buyer s guide: purchasing criteria Select the right security information and event management solution to automate security and compliance operations.

More information

Title of Document Here

Title of Document Here WhatsUp Gold Monitor Library Networks Active Monitors WhatsUp Gold Premium APC UPS Fan (Cisco, Proliant and Dell) Network Statistics Monitor SNMP Interface Ping Power Supply (Cisco, Proliant and Dell)

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Competitive Replacement Program: Product Matrix

Competitive Replacement Program: Product Matrix Competitive Replacement Program: Product Matrix Helping you get the right Application Delivery Networking solution for your organization s needs. Category Eligible Trade-in Products F5 Purchased Products

More information

Restorepoint Plug-in Guide. Version 4.0

Restorepoint Plug-in Guide. Version 4.0 Restorepoint Plug-in Guide Version 40 Contents 1 Overview 2 2 Supported Devices 3 3 Real-time Change Detection 5 4 Device-specific Settings 6 5 Generic push plugin 27 6 Copyright notice 30 1 Overview This

More information

XenServer Virtual Machine metrics

XenServer Virtual Machine metrics 1 de 7 21/11/13 13:31 Tour (/tour/) How it Works /how-it-works/) Pricing (/pricing/) Customers (/testimonials/) WHAT WE MONITOR Application Monitoring /) Java Monitoring Tomcat monitoring Zookeeper Monitoring

More information

Configuration Audit & Control

Configuration Audit & Control The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration

More information

MonitorIT Overview July 2012

MonitorIT Overview July 2012 Contents Product Overview.3 I. End-to-End Performance Monitoring and Reporting II. Virtual Environment Monitoring III. Virtual Desktop Infrastructure Monitoring IV. Application Monitoring V. Physical Server

More information

ManageEngine Password Manager Pro Vs Thycotic Secret Server

ManageEngine Password Manager Pro Vs Thycotic Secret Server ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on August 19, 2015) Feature ManageEngine Password

More information

BMS Consulting LLC 2014. Portfolio, partners and benefits

BMS Consulting LLC 2014. Portfolio, partners and benefits BMS Consulting LLC 2014 Portfolio, partners and benefits 15 + years of history $70m + sales volume ISO 9000 450 + projects 80 + certified staff 60 + partners Our Evolution Reseller First MS LAR Box mover

More information

SNMP Collector Supported Device Inventory

SNMP Collector Supported Device Inventory Acme Acme Packet SD-3820 Border Controller Alcatel Bluecoat Alcatel 6850 BLUE COAT AV2400 / State of Device Utilization QoS Utilization QoS Subsystem Backplane Module 1.4 BLUE COAT AV510 Lan/Wan BLUE COAT

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached

More information

Effective Use of Security Event Correlation

Effective Use of Security Event Correlation Effective Use of Security Event Correlation Mark G. Clancy Chief Information Security Officer The Depository Trust & Clearing Corporation DTCC Non-Confidential (White) About DTCC DTCC provides custody

More information

Device Adapter Capabilities Report

Device Adapter Capabilities Report Device Adapter Capabilities Report Page 1 of 19 Span Custom 3Com 4500 3Com 4500 3.02 and 3Com SuperStack 3 3Com SuperStack 3Com 3200, 3800, 3.12 and 4200, 4400, 4900 3Com 1100, 3300 2.7 and 3Com 3Com 50

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices Last Updated 7/30/15 Vendor Name Device Type A10 Networks Load Balancer Load Balancer All Syslog AX Series Accellion Secure File Transfer Application All Syslog Access Layers Portnox NAC 2.x Syslog Adtran

More information

Evolution in IT Support

Evolution in IT Support My Metrics Evolution in IT Support Like all businesses, you depend on your network. Have you ever needed to send an important email or access vital information, but the system or data was inaccessible?

More information

McAfee SIEM Supported Devices

McAfee SIEM Supported Devices Last Updated 11/10/15 A10 Networks Load Balancer Load Balancer All ASP Syslog AX Series Accellion Secure File Transfer Application All ASP Syslog Access Layers Portnox NAC 2.x ASP Syslog Adtran Bluesocket

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Network Industry Trends

Network Industry Trends Network Industry Trends Friday October 24, 2008 Dennis Smith The Bank of New York Mellon First Vice President Infrastructure Advanced Engineering Agenda The Bank of New York Mellon History of the Network

More information

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP. RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,

More information

Secure Your Operations through NOC/SOC Integration

Secure Your Operations through NOC/SOC Integration IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation IBM Business/Service Assurance Offering Only Tivoli s suite offers

More information

Virtualization Journey Stages

Virtualization Journey Stages Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

iphouse has chosen LogicMonitor to offer a Software as a Service (SaaS) monitoring solution.

iphouse has chosen LogicMonitor to offer a Software as a Service (SaaS) monitoring solution. Monitoring with LogicMonitor iphouse has chosen LogicMonitor to offer a Software as a Service (SaaS) monitoring solution. Finally, an affordable, effortless, comprehensive monitoring service for every

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Attachment H. Installation-Accountable Government Property. October 2014

Attachment H. Installation-Accountable Government Property. October 2014 Attachment H Installation-Accountable Government Property October 2014 Page 1 Description QTY Manufacturer Model Installed Software Agency Applicaton/Service Collection 1 HP ProLiant DL380 G7 Login Jump

More information

Keeping your VPN protected

Keeping your VPN protected Keeping your VPN protected Overview The increasing use of remote access is driving businesses to look for an easy to manage, secure solution for providing access to sensitive company assets. There are

More information

VMware vrealize Operations Guide to Third-Party Solutions

VMware vrealize Operations Guide to Third-Party Solutions Last Updated: October 2014 WHITE PAPER Table of Contents VMware vrealize Operations.... 3 vrealize Operations Product Extensions and Third-Party Integrations.... 3 Advanced Management Packs.........................................

More information

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Advanced Linux System Administration Knowledge GNU/LINUX Requirements Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History

More information

Gloo Integrated Security, Performance, and Availability Monitoring Application

Gloo Integrated Security, Performance, and Availability Monitoring Application Gloo Integrated Security, Performance, and Availability Monitoring Application Simplifying complex real-time, cross-domain analytics for more secure, responsive and adaptive IT infrastructures Assure service

More information

How To Write An Ets Request For Proposal (Rfp)

How To Write An Ets Request For Proposal (Rfp) Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes

More information

Research, recommend, and assist in implementing identity automation solution.

Research, recommend, and assist in implementing identity automation solution. Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member

More information

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE FAST FORWARD YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE VISUALIZE COMPLY PROTECT RedSeal Networks, Inc. 3965 Freedom Circle, 8th Floor, Santa Clara, 95054 Tel (408) 641-2200 Toll Free (888)

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

Net LineDancer Update Notice

Net LineDancer Update Notice Net LineDancer Update Notice Update 14.06 Rev.20151007.1420 Added support for sending SNMP traps when a job fails. Added support to deep link directly to each page of the devices detail view. Added support

More information

Application Performance Monitor

Application Performance Monitor Application Performance Monitor Application Performance Monitor has better granularity and provides more details, so we know more quickly when we have problems. Matt Schaeffer, Systems Administrator, Home

More information

Chris Lang March, 2014

Chris Lang March, 2014 CA Delivers New Revenue Opportunities with Nimsoft Monitor Chris Lang March, 2014 1 2013 CA. All rights reserved. CA Technologies Your Strategic Partner CA Technologies has 30 + years experience providing

More information

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

Deployment Guide. Websense Web Security Websense Web Filter. v7.1 Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

Federal and Large Enterprise Solutions - FAQs

Federal and Large Enterprise Solutions - FAQs Federal and Large Enterprise Solutions - FAQs Correlog has special capability working with Federal (and other) large enterprises. Our technology operates either independently of, or alongside, other SIEM

More information

PROFILE: SENIOR SYSTEM ENGINEER

PROFILE: SENIOR SYSTEM ENGINEER PROFILE: SENIOR SYSTEM ENGINEER HOLISTIC ICT: BRIDGING THE GAP BETWEEN BUSINESS-ORIENTED DEMANDS AND TECHNOLOGY-DRIVEN SOLUTIONS. PERSONAL INFORMATION: PERSONAL: NAME: KOEN JANSSENS NATIONALITY: BELGIAN

More information

IBM TRAINING L13. Replacing Windows Servers with Linux. Mark Post. Orlando, FL. 2004-2006 Mark Post

IBM TRAINING L13. Replacing Windows Servers with Linux. Mark Post. Orlando, FL. 2004-2006 Mark Post IBM TRAINING L13 Replacing Windows Servers with Linux Mark Post Orlando, FL 2004-2006 Mark Post Agenda Reasons to move away from Microsoft Windows What Windows functions can be replaced? What can replace

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER QUICKSTART GUIDE: ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER TABLE OF CONTENTS Introduction...2 Getting Started...4 Configuring Log Sources...4 Common Log Sources...5 INTRODUCTION A FRESH APPROACH TO IDENTIFYING

More information

Zenoss for Cisco ACI: Application-Centric Operations

Zenoss for Cisco ACI: Application-Centric Operations Zenoss for Cisco ACI: Application-Centric Operations Introduction Zenoss is a systems management software company focused on the challenges of operating and helping ensure the delivery of large-scale IT

More information

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

Novell Sentinel Log Manager

Novell Sentinel Log Manager AUTHORIZED DOCUMENTATION Installation Guide Novell Sentinel Log Manager 1.1 December 2010 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

IBM Tivoli Application Dependency Discovery Manager

IBM Tivoli Application Dependency Discovery Manager Automatically discover application dependencies and configurations providing the visibility necessary to improve IT Service Management IBM Tivoli Application Dependency Discovery Manager Highlights Gain

More information

Hitachi ID Password Manager Frequently Asked Questions for Network Architects

Hitachi ID Password Manager Frequently Asked Questions for Network Architects Hitachi ID Password Manager Frequently Asked Questions for Network Architects 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 How does Hitachi ID Password Manager reset passwords? 1 2 How

More information

English Requirement: You must be able to understand and be understood in English.

English Requirement: You must be able to understand and be understood in English. MICHAEL R. BLOOMBERG Mayor MARTHA K. HIRST Commissioner THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

PCI DSS. Get Compliant, Stay Compliant Seminar

PCI DSS. Get Compliant, Stay Compliant Seminar PCI DSS Get Compliant, Stay Compliant Seminar ValueSYS Solutions & Services Wael Hosny CEO ValueSYS Wael.hosny@valuesys.net Solutions you Need, with Quality you Deserve Seminar Agenda Time 09:00 10:00

More information

Government of Canada Managed Security Service (GCMSS) Annex A-7: Statement of Work - Security Information and Event Management (SIEM)

Government of Canada Managed Security Service (GCMSS) Annex A-7: Statement of Work - Security Information and Event Management (SIEM) Government of Canada Managed Security Service (GCMSS) Annex A-7: Statement of Work - Security Information and Event Management (SIEM) Date: July 12, 2012 TABLE OF CONTENTS 1 SECURITY INFORMATION AND EVENT

More information