syslog-ng Product Line



Similar documents
The syslog-ng Store Box 3 F2

The syslog-ng Store Box 3 LTS

The syslog-ng Premium Edition 5LTS

The syslog-ng Premium Edition 5F2

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

Performance Guideline for syslog-ng Premium Edition 5 LTS

Clavister InSight TM. Protecting Values

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

Distributed syslog architectures with syslog-ng Premium Edition

The Business Benefits of Logging

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Performance measurements of syslog-ng Premium Edition 4 F1

How To Buy Nitro Security

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

PCI DSS compliance and log management

What s New in Centrify DirectAudit 2.0

Shell Control Box 3 F5

Shell Control Box 4 LTS Product Description

Shell Control Box 4 F2 Product Description

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Optimizing Backup & Recovery Performance with Distributed Deduplication

SOFTNIX LOGGER Centralized Logs Management

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS

Peter Dulay, CISSP Senior Architect, Security BU

Information Technology Policy

QuickSpecs. HP Data Protector Reporter Software Overview. Powerful enterprise reporting with point and click simplicity

The syslog-ng Store Box 4 LTS Administrator Guide

Alliance Key Manager Solution Brief

RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief

<Insert Picture Here> Oracle Database Security Overview

Q1 Labs Corporate Overview

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

QRadar SIEM 6.3 Datasheet

The Comprehensive Guide to PCI Security Standards Compliance

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

What is Security Intelligence?

soliddb Fundamentals & Features Copyright 2013 UNICOM Global. All rights reserved.

CrashPlan PRO Enterprise Backup

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Click to edit Master title style. How To Choose The Right MSSP

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Managing Large Imagery Databases via the Web

QRadar Security Intelligence Platform Appliances

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

Defining, building, and making use cases work

Content Distribution Management

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Symantec Security Information Manager Administrator Guide

Hardware and Software Requirements for Server Applications

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

FireMon Security Manager Fact Sheet

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

CorreLog Alignment to PCI Security Standards Compliance

Implementing efficient system i data integration within your SOA. The Right Time for Real-Time

Monitoring Windows Workstations Seven Important Events

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No

Configuring Celerra for Security Information Management with Network Intelligence s envision

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Vyatta Network OS for Network Virtualization

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

EISOO AnyBackup Family 5.0 All-in-One Protection

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009

Complete Database Security. Thomas Kyte

What is new in syslog-ng Premium Edition 5 F3

Monitoring Microsoft SQL Server Audit Logs with EventTracker The Importance of Consolidation, Correlation, and Detection Enterprise Security Series

Exporting IBM i Data to Syslog

Symantec Security Information Manager 4.8 Release Notes

Securely maintaining sensitive financial and

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LEPIDEAUDITOR SUITE- DATASHEET

CONTINUOUS LOG MANAGEMENT & MONITORING

...DYNAMiC INTERNET SOLUTiONS >> Reg.No. 1995/020215/23

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Integrigy Corporate Overview

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Symantec Messaging Gateway 10.5

QRadar Security Management Appliances

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

RSA SecurID Two-factor Authentication

Transcription:

www.balabit.com syslog-ng Product Line

syslog-ng Description www.balabit.com IT environments constantly generate important data in log messages syslog-ng Collects Filters Classifies Normalizes Stores Transfers syslog-ng is not a log analysis tool but it is essential to analysis 2

The Evolution of Log Management www.balabit.com More data More complex data More important data Can your log management handle all the data? Audit Logs File changes Identity Access Management Firewalls Intrusion Detection Mobile Devices Databases ERP CRM Custom Applications Servers, Routers, Gateways Network Configuration Changes Authentication Radius LDAP Web Servers Clickstream Data Debugging Software Infrastructure Diagnostics Compliance Security Business Intelligence Log Management Infrastructure 3

Product Family www.balabit.com syslog-ng Open Source Edition Leader since 1998, de facto standard in 2001 Large, world-wide community syslog-ng Premium Edition Commercial version Additional features Professional support syslog-ng Store Box Turnkey appliance Index, search, reporting Professional support 4

syslog-ng Open Source Edition www.balabit.com Key Features Community Flexible message filtering and re-writing Pattern-based classification Secure log transfer via SSL/TLS Flow-control adaptive message rate control High speed processing > 650k/sec 100,000s of users worldwide Well know by system admins Included in 3rd party devices Custom add-ons 5

syslog-ng Premium Edition www.balabit.com Additional Features Zero Message Loss Reliable Log Transfer Protocol (RLTP) Client side failover Disk buffer Encrypted log storage SQL source and destination support Windows support Support for more than 50 server platforms Professional Support 6

syslog-ng Store Box (SSB) www.balabit.com Key Features Turnkey solution Web-based Graphical User Interface (GUI) Flexible message filtering, classification, re-writing Encrypted storage Fast search capability via indexing Message rate alerts Customizable reports Professional Support 7

Key Technology Differentiators www.balabit.com Reliability - Zero message loss Application level acknowledgement - Reliable Log Transfer Protocol Disk-based buffer Client side failover Security Encrypted transfer and storage Scalability High speed processing < 650k/sec Flexibility Widest platform support OS support AIX, FreeBSD, Solaris, RHEL, SLES, Debian, Ubuntu, Tru64 CPU architectures - x86_64, i386, Alpha, PA-RISC, Itanium, SPARC, POWER Wide variety of logs messages natively supported Log filtering, classification, and normalization 8

Typical Use Cases www.balabit.com Enterprise Class Log Management Distributed, heterogeneous IT environments Optimizing SIEM solutions Lower TCO, Improve analysis performance Compliance Meet SOX, HIPAA, PCI-DSS and more regulatory requirements more efficiently with reliable, tamperproof data Forensics Find out what, when, and who more quickly with reliable, accessible log data 9

Typical Use Case www.balabit.com Optimizing SIEM The Challenge Ensuring data feeding SIEM is reliable By 2016, 40% of enterprises will actively analyze at least 10 terabytes of data for information security intelligence, up from less than 3% in 2011. source: Gartner Analysis is only as good a the data feeding it Many SIEM installations fail due to poor log management The Solution Optimize SIEM with robust log management syslog-ng improves SIEM installations with Wider log source coverage Extensive platform support Zero message loss Optimize Performance Faster SIEM query times analyze what is important Lower TCO SIEM vendors offer usage or capacity based pricing (eps or GB/mo) 10

Typical Use Case www.balabit.com Enterprise Class Log Management The Challenge Managing logs in a large, global IT environment Large distributed IT infrastructure 100s of locations, 1000s of log sources Heterogeneous environment Many legacy systems, custom applications Mission critical Business processes rely on infrastructure and applications The Solution Centralize log data One tool for collection and pre-processing Collect from wide variety of sources Filter, classify, parse, re-write Wide range of server platforms supported Scale to the largest IT environments > 650,000 messages/sec > 10,000s log sources 11

Typical Use Case www.balabit.com Forensics The Challenge Find out what, when, who...and fast IT Operations Server or network crash Fraud investigation Internal or external threats Legal challenges Providing evidence in court The Solution Reliable, accessible log data Centralize Collect log data from a wide variety of sources and locations Organize - Filter, classify, and organize various types of logs to ensure logs are quickly accessed Preserve Ensure log data is not lost Reliable transfer Secure transfer and storage 12

Typical Use Case www.balabit.com Compliance The Challenge Comply with many regulations efficiently Data Protection - PCI-DSS, HIPAA, EU Data Directive Financial - SOX (EuroSox, Jsox), FISMA Basel II Internal Policies - Data retention/deletion The Solution Reliable log management solution Ensure reliability Zero message loss Ensure security Encrypted transport TLS/SSL Encrypted storage Logstore Customize reports to facilitate audits (SSB) 13

Licensing www.balabit.com syslog-ng Open Source Combination of GPL and LGPL syslog-ng Premium Edition Log Source Hosts (25 3,000, > 3,000 unlimited) High Speed deployments ( > 200k messages per second) priced individually syslog-ng Store Box Log Source Hosts (50 1,000, > 1,000 unlimited) Hardware Configurations SSB1000-1xQuad Core CPU, 4 GB RAM, 1 TB SATA HDD, RAID1 SSB5000-2xQuad Core CPU, 24 GB RAM, 5 TB SATA HDD, RAID50 SSB10000-2xQuad Core CPU, 24 GB RAM, 10 TB SATA HDD, RAID50 SSBVA - Virtual appliance run under VMware ESXi 14

BalaBit Professional Support Post-Sales Support www.balabit.com Part of the Product Three level support Level 1 Customer care Level 2 System Engineers Level 3 Software Developers Highly qualified engineers Direct contact with software development team Tight coordination with 1st line Partner Support Three Support Packages Base 8x5, Next business day response time Extended 12x5, 4 hour response time Privileged 24x7, 2 hour response time 15

BalaBit Professional Support www.balabit.com Pre-Sales Support Technical Consultation Project Scoping Proof of Concept Request for Information/Proposal Feature request management Integration Services Design, Planning, Installation Pilot configuration support Configuration validation Training Services Certification programs On-site e-learning 16

Customers www.balabit.com 17

Conclusion www.balabit.com Log data is essential for IT operations, security, compliance, and increasingly for business intelligence Choose a trusted log management infrastructure that Prevents message loss during transfer Prevents tampering with encrypted transfer and storage Scales to the ever increasing amount of data To learn more Visit our website http://www.balabit.com/network-security/syslog-ng Contact our Sales Team sales@balabit.com Contact our Pre-Sales Support Team pre-sales@balabit.com 18