LogInspect 5 Product Features Robust. Dynamic. Unparalleled.



Similar documents
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Compliance Management, made easy

Caretower s SIEM Managed Security Services

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Clavister InSight TM. Protecting Values

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

The SIEM Evaluator s Guide

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

QRadar SIEM 6.3 Datasheet

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Boosting enterprise security with integrated log management

Discover & Investigate Advanced Threats. OVERVIEW

How To Use Cautela Labs Cloud Agile.Com

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Trend Micro. Advanced Security Built for the Cloud

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Scalability in Log Management

How To Buy Nitro Security

Detect & Investigate Threats. OVERVIEW

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Vulnerability Management

Securing SharePoint 101. Rob Rachwald Imperva

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Extreme Networks Security Analytics G2 Risk Manager

Meeting PCI Data Security Standards with

SANS Top 20 Critical Controls for Effective Cyber Defense

Tivoli Security Information and Event Manager V1.0

Extreme Networks Security Analytics G2 Vulnerability Manager

SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

THE GLOBAL EVENT MANAGER

Managed Security Protection & Outsourcing Services

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Continuous Network Monitoring

Swordfish

Peter Dulay, CISSP Senior Architect, Security BU

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

IBM Security IBM Corporation IBM Corporation

Symantec Security Information Manager Administrator Guide

Log Management Solution for IT Big Data

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

QRadar SIEM and Zscaler Nanolog Streaming Service

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

access convergence management performance security

1 Introduction Product Description Strengths and Challenges Copyright... 5

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Enabling Security Operations with RSA envision. August, 2009

Virtual Compliance In The VMware Automated Data Center

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

IBM Security QRadar Risk Manager

An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009

High End Information Security Services

IBM Security QRadar Risk Manager

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Cyber Security for NERC CIP Version 5 Compliance

Vulnerability Management for the Distributed Enterprise. The Integration Challenge

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Server Monitoring: Centralize and Win

I D C A N A L Y S T C O N N E C T I O N

PCI Compliance for Cloud Applications

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Ecom Infotech. Page 1 of 6

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

RAVEN, Network Security and Health for the Enterprise

Empowering Your Business in the Cloud Without Compromising Security

10 Reasons Your Existing SIEM Isn t Good Enough

Cloud and Data Center Security

CA Service Desk Manager

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

Enterprise Security Solutions

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

WHITE PAPER: Egenera Cloud Suite

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Exporting IBM i Data to Syslog

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Injazat s Managed Services Portfolio

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

QRadar SIEM and FireEye MPS Integration

IBM Security QRadar Vulnerability Manager

CONTINUOUS LOG MANAGEMENT & MONITORING

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

End Your Data Center Logging Chaos with VMware vcenter Log Insight

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

BlackStratus for Managed Service Providers

Total Protection for Compliance: Unified IT Policy Auditing

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Transcription:

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10 Denies LogInspect - transforming SIEM solutions into business value Most organizations today realize and accept that a SIEM solution adds clear business value on several fronts, including: Automation of regulatory processes Improved efficiency in forensic investigations Increased troubleshooting turnaround time A widely improved security position The LogInspect platform intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated results are displayed in easy-to-manage Dashboards that can be configured based on the specific roles and responsibilities of each user. LogInspect collects and stores data from any source LogInspect provides a secure, centralized log archive that automatically analyzes log messages in real time. Log consolidation and safe storage of evidence provide a single interface for accessing and managing all information. Once raw, unaltered log data collected from across the Enterprise is received, it is stored in archives subject to integrity checks per the log management standard (the NIST 800-92 SHA-1 hashing algorithm). LogInspect analyzes and alerts automatically The built-in intelligent log analysis engine automatically detects and notifies of all critical incidents. Events monitored can be very diverse and can include an ongoing attack, a compromised system, a system breakdown or user authentication, and much more. LogInspect s powerful search engine LogInspect has its own, unique search language making it easy to search for specific information within the logs. This includes an advanced labeling structure that allows for highly efficient log tagging. Any search from simple to advanced can be converted on the fly into a permanent Dashboard. Searches can also be reported for easy future reference. And the advanced log analytics make it easy to display data in the best possible fashion. LogInspect Dashboards Security Event Management is much more valuable if the information collected can be presented and found with little effort. LogInspect presents information through a structured overview, allowing you to quickly spot new trends and drill down any information. LogInspect simplifying auditing and compliance LogInspect can help you achieve complete insight to your network, making it easy to meet common regulations thanks to builtin templates based on the most common compliance and security reports, including: PCI-DSS SOX HIPAA Basel-II ISO27001 2

LogInspect 5 Asset Security. Robust. Dynamic. Unparalleled. With LogInspect 5, ImmuneSecurity has launched the 5th generation of its SIEM platform bringing asset security to an entire new level. data enrichment capabilities, integrating external data such as enterprise databases, IT asset management information or even data from an Internet portal. ImmuneSecurity Your dedicated security partner ImmuneSecurity is dedicated to delivering customer-focused applications within IT security, particularly Security Information and Event Management (SIEM). Enterprise ready Thanks to unparalleled correlation, LogInspect 5 can now analyze data across a diverse array of systems for true Enterprise-wide implementation. Dynamic data integration LogInspect s reliable logging solution is now matched with dynamic Requirement ready LogInspect 5 is built to satisfy any requirements mandated by: Compliance Threats & Forensics IT operation visibility We have a long history of partnering with our customers, listening and continuously adapting to match their needs. Our software solutions are characterized by ease of deployment, ease of use, ease of management and outstanding global support. LogInspect displays data in easy-to-read gauges and diagrams. 3

LogInspect is complex in its structure, yet easy to configure and manage. Out-of-the-box implementation Risk Assessment Confidentiality, Integrity, Availability (CIA). This well-known model enables operational implementation of a calculated threat impact score. It can be based on your personal risk analysis, placing focus on the most important events as aligned with, e.g., an internal IT security strategy. Dashboard for ease of control Based on web 2.0 design models, LogInspect s advanced Dashboard technology allows users to individually configure the Dashboard to reflect desired views based on a user s role in an organization. The Dashboard displays critical Events and Security Incidents in real-time. Data Enrichment LogInspect makes it possible to enrich your necessary log messages with information from other sources, such as CMDBs, the Internet, Portals or any other data source. This can be a static or dynamic process. Application and database monitoring LogInspect provides performance and availability metrics from any database log, including: Trigger alerts based on database activities and commands Detection of policy violations Inspection of application traffic content Event Correlation LogInspect s Event Correlation Engine can detect patterns of events, such as: Missing parts of a business transaction Mismatches between log messages and external data sources Brute force attempts Security incidents Active Response Engine LogInspect s Active Response Engine provides for automatic, valuable measures, such as: E-mails alerting to detected security incidents Automatic system triggers from specific events, such as blocking an IP in the Firewall, or shutting down users if suspicious security incidents occur Integration into existing ticketing and support systems Rules and signatures via powerful application structure At LogInspect 5 s core is a strong application structure that enables easy implementation of new security rules, Dashboards, searches, reports and more ensuring that all customers are always up to date. LogInspect can also adapt to other proprietary formats. Out-of-the-box reporting Common reporting templates for compliance such as PCI, SOX, ISO2700x, HIPPA and more are standard to the LogInspect solution and can be modified or created from scratch using an intuitive LogInspect Report Wizard. Built-in scaling LogInspect offers built-in scaling architecture, enabling enterprise-wide implementation that combines any hardware and virtualized appliances. Searches and reports can include any subset of any distributed LogInspect servers across the network. System requirements LogInspect is delivered as a preconfigured appliance based on any common brand of hardware, VMware or HyperV enabling ultimate flexibility in terms of deployment. License model The software is licensed through an annual subscription that includes all new upgrades, patches, signature subscriptions, and e-support through the ImmuneSecurity Ticket System. 4

LogInspect is a powerful SIEM tool with endless customizable search and monitoring functionalities. Unique, heavy-volume data performance Powered by NoSQL Traditional relational databases have proven to perform poorly when processing heavy volumes of data. LogInspect is powered by the latest NoSQL technologies, better known as a document database. The LogInspect technology enables the receiving and real-time normalization of billions of logs a day with techniques commonly used by Google, Amazon, Facebook and other heavy data companies ISO 27001 Compliance 5 More information: WWW.IMMUNESECURITY.COM

Corporate Headquarters ImmuneSecurity A/S Aldersrogade 6A DK-2100 Copenhagen O Denmark Phone: +45 70 266 286 Fax : +45 70 266 287 E-mail: info@immunesecurity.com More information: WWW.IMMUNESECURITY.COM Sweden ImmuneSecurity Solna Business Park Svetsarvägen 15 SE-171 41 Solna Sweden Phone: +46 85 052 1230 Fax : +45 70 266 287 E-mail: info@immunesecurity.com