New ways to a secure IT Management

Similar documents
IBM QRadar Security Intelligence April 2013

Scalability in Log Management

IBM Security IBM Corporation IBM Corporation

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Symantec Advanced Threat Protection: Network

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

IBM Tivoli Storage Productivity Center (TPC)

With Great Power comes Great Responsibility: Managing Privileged Users

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security Intelligence Strategy

The syslog-ng Premium Edition 5LTS

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

SapphireIMS 4.0 BSM Feature Specification

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Zscaler Cloud Web Gateway Test

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

The syslog-ng Premium Edition 5F2

Configuring Celerra for Security Information Management with Network Intelligence s envision

How To Buy Nitro Security

Advanced Threats: The New World Order

SOLUTION BRIEF. TIBCO LogLogic A Splunk Management Solution

QRadar SIEM 7.2 Flows Overview

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

RAVEN, Network Security and Health for the Enterprise

Performance Guideline for syslog-ng Premium Edition 5 LTS

Analyzing Logs For Security Information Event Management Whitepaper

Analyzing Logs For Security Information Event Management Whitepaper

Discover & Investigate Advanced Threats. OVERVIEW

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

Bridging the gap between COTS tool alerting and raw data analysis

Enterprise Resource Planning

Detect & Investigate Threats. OVERVIEW

First Look Trend Micro Deep Discovery Inspector

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

IBM QRadar Security Intelligence Platform appliances

Embracing Microsoft Vista for Enhanced Network Security

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

How To Fix A Fault Notification On A Network Security Platform (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent

VMware vcenter Log Insight Getting Started Guide

The webinar will begin shortly

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Clavister InSight TM. Protecting Values

Security strategies to stay off the Børsen front page

STEALTHWATCH MANAGEMENT CONSOLE

Maximizing Your Desktop and Application Virtualization Implementation

Symantec Advanced Threat Protection: Network

Log management & SIEM: QRadar Security Intelligence Platform

Smarter wireless networks

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

QRadar Security Intelligence Platform Appliances

What s New in Security Analytics Be the Hunter.. Not the Hunted

Integration Guide. Zen Load Balancer Ubuntu/Microsoft Windows

Introducing IBM s Advanced Threat Protection Platform

Observer Probe Family

STEALTHWATCH MANAGEMENT CONSOLE

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

NEC s Carrier-Grade Cloud Platform

IBM SECURITY QRADAR INCIDENT FORENSICS

Symantec Virtual Machine Management 7.1 User Guide

SapphireIMS Business Service Monitoring Feature Specification

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

V1.4. Spambrella Continuity SaaS. August 2

QRadar Security Management Appliances

Supporting New Data Sources in SIEM Solutions: Key Challenges and How to Deal with Them

IronPort C10 for Small and Medium Businesses

ThreatSpike Dome: A New Approach To Security Monitoring

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

The Advantages of Enterprise Historians vs. Relational Databases

A Mock RFI for a SD-WAN

ESET SMART SECURITY 6

The big data revolution

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Analyzing HTTP/HTTPS Traffic Logs

Cisco Advanced Malware Protection for Endpoints

Business Continuity Policy

Secret Server Splunk Integration Guide

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Network Performance + Security Monitoring

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Threat Advisory: Accellion File Transfer Appliance Vulnerability

Unified Security, ATP and more

Analyzing Logs For Security Information Event Management

How To Manage The Sas Metadata Server With Ibm Director Multiplatform

Network Monitoring Comparison

Secospace elog. Secospace elog

Transcription:

New ways to a secure IT Management

Comprehensive IT Performance & SIEM A strategic imperative IT is the key to the business strategy implementation and success. Organizations can get essential added value thanks to its optimization. In order to achieve best visibility and understanding, IT-Professionals need reports from heterogeneous sources providing a permanent, real-time and detailed insight of the entire IT performance. NetDescribe is specialized in the security and performance optimization of large infrastructures, if necessary with the integration of M2M data in the analysis landscape. We focus on the automated and integrated IT service management. Our solutions provide the necessary visibility across the entire infrastructure to achieve the best possible performance and to continually meet current security requirements. Security Productivity Cost control Your requirements Our solutions & Corporate Governance Operational Intelligence Event Data Management and Log Analysis M2M Performance Optimization of the IT infrastructure Recording and merging all events of the company-wide traffic for data and security analysis with minimal footprint Automatisation of: Configuration Management Fault & Performance Management Network Management Analysis of End User Experience Application Performance Analysis Dynamic WAN Optimization Protection against targeted attacks Proactive detection and prevention of Advanced Persistant Threats (APT) Data Center Security Transaction control between security zones Product line Event2Log - Designed to perform Event2Log High Speed Logging Gateway Maximum IT events with minimal hardware All software solutions depend on the performance of the hardware platform on which they are installed. Even if the software scales, the events which are beyond the scope of this performance ability, are ignored. But compliance, security and operational requirements oblige companies to create more visibility in their IT landscape and therefore record all IT event data. Furthermore, Internet of Things (M2M) and Industry 4.0 projects lead to rapidly rising volumes of data that have to be collected, saved and made available for future analysis. NetDescribe has developed a solution that exactly answer the challenge of combining volume and speed with less hardware: Event2Log - High Speed Logging Gateway. This solution enables the centralized gathering of up to 600,000 events/second on one appliance only without data loss. The events can be forwarded in their integrality to long term archiving systems for compliance purpose and to analysis tools after an automated intelligent filtering of the relevant data.

Events/ Second up to 600 000 Event2Log Appliance 100 000 All Events. No Limit. Any Time. Standard Appliance Limit 0 3:00 6:00 9:00 12:00 15:00 18:00 21:00 24:00 Time x GB/ Day Approach All Events Approach The High Speed Logging Gateway allows the complete recording of events, even at peak times of operation, without license and hardware costs becoming incalculable. With the recording of up to 600,000 events per second with a single appliance, the NetDescribe technology is unique. With the High Speed Logging Gateway various types of logs or raw data can be recorded and then stored and analyzed according to the requirements. A dedicated algorithm developed by NetDescribe and a compression rate of up to 90% make this possible. High Speed Logging Gateway Event2Log Features Event2Log Core Event2Log Raw Event2Log PALx Out of the box Out of the box Customization Protocols Syslog NetFlow V5/V9/IPFIX SNMP-Trap RAW Data Proprietary Application Logs SOAP Binary Format Operations/ BI Gateway Intelligence Security GOAL Events in raw format Up to 90 % compression rate Only known & relevant events Up to 90 % compression rate All threats & unknown events Buffering for SIEM EVENTS Storage Analysis & Monitoring Investigation APPLICATION

Event2Log - High Security Web Gateway Several Web Services, one security level Any upgrade of security rules brings its own operational hurdles. The high Security Web Gateway allows a secured web based data transfer between security zones using different rules & standards without the need for any new development in the existing service security setup. A machine to machine communication that only makes single services available at machine level, guaranties higher security. All logging information about the connections are gathered and made available for analysis systems. This enables you to promptly implement new security specifications, keeping budget under control and saving resources. The Event2Log High Security Web Gateway is designed for any industry segment, like i.e. with dispatched subsidiaries, multiple suppliers or federal organizations. High Security Web Gateway Application Security Zone A https://gateway/server1,2,.. Application Transport Layer Security Zone B Application Data Flow Analysis Data Flow Event Log Performance Log Log Server 1 Server 2 Server...

Technology partners for tailor-made solutions Because success needs individuality The understanding of the specific expectation of our customers, coupled with our extensive experience in the operations of distributed IT infrastructure, is the basis of our success. Nevertheless, we are convinced that no single IT tool delivers the solution to all pain. Therefore we also work with technology providers that deliver the best solutions in their segment for the today s challenges customers are facing. Company Milestones 2004 Representation of Crannog Software (today Fluke Networks) 2006 Establishment of NetDescribe GmbH 2009 Introduction of Managed Services 2012 ISO 9001:2008 Certification Launch of Event2Log product line 2013 Launch of Event2Log High Speed Logging Gateway 2014 Launch of Event2Log High Security Web Gateway

A NetDescribe technology www.event2log.com NetDescribe GmbH Keltenring 7 82041 Oberhaching Germany Phone +49 89 642 18 30 Fax +49 89 642 18 40 info@netdescribe.com www.netdescribe.com Copyright 2015 NetDescribe GmbH. All rights reserved. All trademarks are property of their respective owners. (v1.4)