REASON FOR LOG RETENTION MANAGEMENT

Similar documents
SOFTNIX LOGGER Centralized Logs Management

Clavister InSight TM. Protecting Values

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

What s New in Centrify DirectAudit 2.0

SolarWinds Log & Event Manager

GFI Product Manual. Deployment Guide

Secret Server Qualys Integration Guide

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Cisco Application Networking Manager Version 2.0

Cyber Security RFP Template

Scalability in Log Management

Complete Database Security. Thomas Kyte

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Securing the Service Desk in the Cloud

Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Improving PCI Compliance with Network Configuration Automation

Implementing Managed Services in the Data Center and Cloud Space

Netwrix Auditor. Administrator's Guide. Version: /30/2015

Achieving SOX Compliance with Masergy Security Professional Services

FireMon Security Manager Fact Sheet

SANS Top 20 Critical Controls for Effective Cyber Defense

Core Solutions of Microsoft Exchange Server 2013 MOC 20341

Exporting IBM i Data to Syslog

MS Administering Microsoft SQL Server Databases

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

Cisco UCS Central Software

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)

Enforcive /Cross-Platform Audit

Software Update Bulletin

The IDG 9074 Remote Access Controller

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Best Practices Report

Netwrix Auditor for File Servers

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

Verve Security Center

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

ClockWork Enterprise 5

The syslog-ng Store Box 3 F2

BKDconnect Security Overview

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Xirrus Management System

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

The Bomgar Appliance in the Network

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Information Technology Policy

Storage Guardian Remote Backup Restore and Archive Services

NETWRIX EVENT LOG MANAGER

CNS Security and Network Monitoring. Managed Services Description

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Core Solutions of Microsoft Exchange Server 2013

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Netwrix Auditor for Windows Server

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Avaya WLAN Orchestration System

Managed Service Plans

Enforcive / Enterprise Security

Best practices and use cases for consistent, enterprise-wide SIEM security policy management

Citrix XenServer Backups with SEP sesam

Solving the Desktop Dilemma

Annexure - " SERVICE REQUIREMENTS"

SOLUTION BRIEF. TIBCO LogLogic A Splunk Management Solution

MS 20341B: Core Solutions of Microsoft Exchange Server 2013

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Oracle Database Security

ACL Compliance Director FAQ

QRadar SIEM 6.3 Datasheet

COURSE OUTLINE MOC 20341: CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013 MODULE 1: DEPLOYING AND MANAGING MICROSOFT EXCHANGE SERVER 2013

Market Challenges Business Drivers

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Autodesk PLM 360 Security Whitepaper

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide

The Fundamental Difference Between SIEM & Log Management Solutions: State vs. Event Data

EMC Data Protection Advisor 6.0

Netwrix Auditor for Exchange

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Information Technology Solutions

Symantec Security Information Manager Administrator Guide

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

6231A - Maintaining a Microsoft SQL Server 2008 Database

Configuring an ArcSight Smart- Connector to collect events from Kaspersky Admin Kit 8.0

How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Transcription:

REASON FOR LOG RETENTION MANAGEMENT

COMPUTER LOG RECORD OF COMPUTER ACTIVITY

1. LAW ENFORCEMENT LAW

2. INCREASE SECURITY Centralized Log Server Authorized Only administrator can view and export

3. INCREASE IT SERVICES

ABOUT SOFTNIX Softnix Technology was established in 2007. We are Thailand based company with unsurpassed experience in centralized Simplify Web log management Base Management software and enterprise software Data development. Hashing and Archiving Clear text Logs Retention Our strategy is to 90 build Days the Data excellent Retention products and services to get the Undeleted best quality & Unedited and world class software organization. NTP Server Time Referred System alert for IT Auditor

OUR CHALLENGE HIGHEST EVENT RATES LOG COLLECTION Log Server

OUR CHALLENGE SEARCHING AND PROCESSING?

WE DO! Powerful search language (AND, OR, NOT and field level operators >,<, =, etc.).

LOG TAIL View your streaming logs in real-time and highlight important events to easily see

OUR CHALLENGE SECURED STORAGE

WE DO! DATA HASHING AND ENCRYPTION

AUTHORIZED ACCESS

ARCHIVING Backup your log data daily to long term storage

NOTIFICATION 1) System alert! 2) Event alert! 3) Last seen check!

OUR CHALLENGE REPORTING

WE DO! UNIVERSAL LOG REPORTING

GET STATISTIC

EXPLORING ROOT CAUSES OF WEB ATTACK

OUR CHALLENGE EXTENSIBLE TO BIG DATA

WE DO Hadoop ecosystem Business Analytics

FEATURE SUMMARY New Log Analysis Simplify Web Base Management Data Hashing and Archiving Clear text Logs Retention 90 Days Data Retention Undeleted & Unedited NTP Server Time Referred System alert for IT Auditor

THAILAND Na*onal Electronics and Computer Technology Center Standard (NECTEC) NECTEC STANDARD NTS 4003.1 2552 Computer Log Systems Download http://www.softnix.co.th/v2/nectec_nts/nts4003.1-cdv-520907 r0.6.pdf!

Standard / Certification ศอ. 2002.2 มอก.1561-2548 ศอ 2006.2.1-2555 มอก. 1956-2553 มอก. 1448-2544 FCC,CE,RoHS

HOW DOES IT WORK Routers! Firewall! IPS/IDP! Antivirus! Switches! Windows/Linux! Syslog / Non Syslog Statistic Report Dash Board Indexing On-Demand All Clear text Logs Retention Data Integrity (Hashing, Archiving) Log Analyzer Event Searching Web (HTTP/S) Data Base

WEB GUI

LOG NEWEST MONITORING Last received Legend Status

FULL-TEXT SEARCH

DATA INTEGRITY Automated checking the data integrity achieved by MD5 and SHA- 1

AUTHORIZATION AND AUDIT LOG

LOG ANALYZE REPORTING Power by Log Analyze based on Sawmill Advance analysis and report from Log file Individual Supported 828 Logs Format Graphic Report,Report Drill Down Export to Excel File (CSV File) Automatic E-Mail report Users account management report Role-Based Authentication Control (RBAC) Enterprise Database Support (MS SQL, Oracle) This module power by Sawmill. More information about Sawmill see http://www.sawmill.net

Log Web Server Report

Firewall Report

TMG Log Report

EASY TO FILTER Result

EASY TO FILTER Result

EASY TO FILTER

PRODUCTS EDITION

SOFTNIX LOGGER SOFTWARE EDITION Fully function centralized log management Easy to install Unlimited Device Client License limit by storage volume Flexibility for your network and hardware Sawmill Log Analyzer (Option)

SOFTNIX LOGGER APPLIANCE

DEPLOYMENT SOLUTION

ENTERPRISE INTEGRATION

VLAN NETWORK

HA / SCALABILITY

LICENSING SoLnix Logger Base License Unlimited Device Client License based on volume 500GB, 1TB,1.5TB,Unlimited Log Analyzer License (Op*onal) Licensing based on Profiles Lite Edi*on (Max. 5 Profiles) Professional Edi*on (Max. Unlimited Profiles) Enterprise Edi*on (Max. Unlimited Profiles) ü Database SQL Supported

SERVICES CENTER Maintenance Services Included Help Desk Support (8x5) (Phone, Email, Website, Remote) Critical On- site services 3 incident (BKK Thailand Only) Automatic Software Up2date (Online)

TECHNICAL REASON FOR CONSIDERATION Func*onal SoLnix Logger 180k log messages/sec/node peak 1.25TB/day Compressed to 270GB/day 70% compression ra*o

BUSINESS REASON FOR CONSIDERATION Lowest total cost of ownership (TCO) Choose a flexible solu*on to meet diverse needs Easily search and access sta*s*cs data Saving your storage with highly compression We are ready log management solu*on for Thai Cyber law

STANDARD / AWARD ระบบ Ticket Support มศอ. 4003.1-2552 ศอ. 2002.2 มอก.1561-2548 ศอ 2006.2.1-2555 มอก. 1956-2553 มอก. 1448-2544

STANDARD / AWARD ระบบ Ticket Support IT Professional Certificate

SITE REFERENCE (GOVERNMENT)

SITE REFERENCE

SITE REFERENCE (EDUCATION)