CONTINUOUS LOG MANAGEMENT & MONITORING

Similar documents
ALERT LOGIC LOG MANAGER & LOGREVIEW

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE

PCI DSS Reporting WHITEPAPER

PCI DSS Top 10 Reports March 2011

LOG MANAGEMENT: BEST PRACTICES

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

PROGRAM OVERVIEW: ALERT LOGIC SECURITY-AS-A-SERVICE FOR SERVICE PROVIDERS

How To Use Cautela Labs Cloud Agile.Com

Log Management Solution for IT Big Data

access convergence management performance security

BlackStratus for Managed Service Providers

nfx One for Managed Service Providers

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Boosting enterprise security with integrated log management

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Vistara Lifecycle Management

Symantec Control Compliance Suite Standards Manager

TekCare Secure Service Agreement

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

NEC Managed Security Services

How To Buy Nitro Security

Symantec Advanced Threat Protection: Network

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Scalability in Log Management

Symantec Backup Exec.cloud

Company Overview. Enterprise Cloud Solutions

Cloud and Data Center Security

MANAGED SECURITY SERVICES (MSS)

Current IBAT Endorsed Services

Managed Security Service Providers vs. SIEM Product Solutions

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Data Protection Appliance

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Security Event and Log Management Service:

Cloud Vendor Evaluation

2014 HIMSS Analytics Cloud Survey

Kaseya IT Automation Framework

Log Management Best Practices: The Benefits of Automated Log Management

Symantec Security Information Manager 4.8 Release Notes

FIRN Secure Internet Bundled Services:

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

The Purview Solution Integration With Splunk

QRadar SIEM 6.3 Datasheet

Security Information and

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Extreme Networks Security Analytics G2 Vulnerability Manager

Hosted SharePoint: Questions every provider should answer

Netwrix Auditor for SQL Server

Detect & Investigate Threats. OVERVIEW

Trend Micro. Advanced Security Built for the Cloud

Netwrix Auditor for Exchange

custom hosting for how you do business

MANAGED SECURITY SERVICES (MSS)

XpoLog Center Suite Data Sheet

Server & Application Monitor

Introducing AI. A new, free, comprehensive way to manage servers. For press inquiries please contact:

1 Introduction Product Description Strengths and Challenges Copyright... 5

CLOUD GUARD UNIFIED ENTERPRISE

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Secret Server Splunk Integration Guide

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Enterprise Security Solutions

Symantec Control Compliance Suite. Overview

How To Protect Your Cloud From Attack

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

QRadar Security Intelligence Platform Appliances

Implementing Managed Services in the Data Center and Cloud Space

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview

Caretower s SIEM Managed Security Services

Netwrix Auditor for Windows Server

Trend Micro Cloud Security for Citrix CloudPlatform

NETWRIX EVENT LOG MANAGER

Data Storage That Looks at Business the Way You Do. Up. cloud

Technology Highlights Of. (Medusa)

Panorama. Panorama provides network security management beyond other central management solutions.

Extreme Networks Security Analytics G2 SIEM

WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER OCTOBER Unified Monitoring. A Business Perspective

Netwrix Auditor for Windows File Servers

IT Security & Compliance. On Time. On Budget. On Demand.

Payment Card Industry Data Security Standard

A Global IT Managed Service Provider

How To Monitor Your Entire It Environment

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

8 Key Requirements of an IT Governance, Risk and Compliance Solution

The Sumo Logic Solution: Security and Compliance

Discover & Investigate Advanced Threats. OVERVIEW

TABLE OF CONTENTS. INTRODUCTION: - Section 1: PCI DSS Version 3.0 Changes - Section 2: Can IDS and WAF Techniques Replace Systems with PCI DSS 3.0?

Transcription:

OFFERING BRIEF: CONTINUOUS LOG MANAGEMENT & MONITORING ALERT LOGIC LOG MANAGER AND ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER Virtually every system you use to manage and run your business creates log data. This data is your system of record, detailing material changes to your networks, applications, and systems on a daily basis. For years, businesses have looked for better ways to harvest this rich data for operational, compliance, and security uses. Unfortunately, the traditional method of deploying hardware and software on-premises to collect, manage, and analyze log data involves a significant investment of time and money. The complexity of this approach is compounded by the trend toward cloud first hybrid data centers where an organization s most sensitive data is now dispersed across public clouds, private clouds, and hosting providers as well as on-premises. In today s cloud first environment, solving your log management needs with yesterday s technology is not viable. You need an approach to log management that delivers deep insight into your security and compliance posture without the headache of bringing yet another product in-house. LOG MANAGER TAKES THE COMPLEXITY AND COST OUT MANAGING LOGS. WITH ALERT LOGIC LOG MANAGER YOU CAN COLLECT, AGGREGATE, AND NORMALIZE LOG DATA FROM ANY OPERATING SYSTEM, NETWORK DEVICE, AND APPLICATION IN YOUR ENVIRONMENT AUTOMATICALLY. ACTIVEWATCH FOR LOG MANAGER PROVIDES 24X7 REAL-TIME SECURITY MONITORING THAT IDENTIFIES POTENTIAL COMPLIANCE AND SECURITY ISSUES THAT COULD COMPROMISE YOUR ORGANIZATION S SECURITY POSTURE.

Alert Logic Log Manager with Alert Logic ActiveWatch delivers on the promises made by traditional log management products without the cost and complexity. Alert Logic Log Manager is a cloud-based log management solution that enables easy, scalable collection of log data from across your datacenter environments, whether they be on-premises, in the cloud, or a combination of both. With lightweight deployment options, you can collect logs from operating systems, applications, network devices, and more in a matter of hours. Powered by a massive processing grid, Alert Logic Log Manager allows you to search logs in a consistent, reliable manner without creating complex queries or custom reports. This powerful technology, coupled with an intuitive web interface, will allow your IT resources to spend more time uncovering valuable information and less time sorting through mountains of meaningless logs. THE KEY TO MEETING YOUR SECURITY AND COMPLIANCE GOALS Collecting, parsing, and, storing logs are the first of your security and compliance goals, but without continuous expert monitoring, meeting your goals is unlikely, if not impossible. To truly maintain your desired compliance and security posture, you need a team of experts working for you around the clock, identifying compliance issues and indicators of compromise from your log data. This is what Alert Logic ActiveWatch for Log Manager delivers: continuous expert monitoring. SECURITY & COMPLIANCE ACROSS ALL YOUR IT ASSETS Uncovers compliance and security issues from your log data: automate log collection, aggregation, and normalization of logs across your entire environment, saving time, money and reducing complexity Scalable real-time log collection with 90-day and 1-year data retention to accommodate your growing and changing environment Delivered as-a-service so you don t have to focus on managing the storage, computing and software required for 24 x 7 availability Alert Logic ActiveWatch for Log Manager is a managed service that delivers 24x7 security monitoring of your log data and identifies potential security and compliance issues that could impact your organization. Alert Logic security and compliance experts use advanced technology, up-to-date threat intelligence, and correlation rules to help you gain deep insight and visibility into the security posture of your IT environment. Unlike other costly and incomplete managed security services, Alert Logic ActiveWatch for Log Manager not only identifies security issues, but also provides the recommended steps you need to resolve the issue. With ActiveWatch for Log Manager, you can also meet the log review mandates required by many regulations, such as PCI DSS 3.1. By eliminating the burden of daily log review and delivering an easy to use search capability, you can focus your efforts on other important, business critical projects. This simple, easy approach to log management and analysis increases your ability to maintain compliance and increase your security posture without being an expert. WE RE HAPPY TO PUT IT SECURITY IN THE HANDS OF ALERT LOGIC SO WE CAN FOCUS ON BUILDING GREAT PRODUCTS FOR OUR CLIENTS. GAUTAM LULLA, CHIEF OPERATING OFFICER

ALERT LOGIC LOG MANAGEMENT: THE COMPONENTS ALERT LOGIC LOG MANAGER ACTIVEANALYTICS Unlike other log management approaches that require you to purchase software, hardware, hire and/or train staff, and maintain the solution, Alert Logic s approach to log management is all-inclusive, providing everything you need to meet your log management goals. DATA ANALYSIS ALERT LOGIC ACTIVEWATCH INCIDENT IDENTIFICATION LOG MANAGER Log management and analysis solution that collects, parses, and analyzes logs from operating systems, applications, and network devices. SECURITY CONTENT MANAGEMENT ACTIVEINTELLIGENCE CONTINUOUS THREAT INTELLIGENCE ACTIVEANALYTICS Security analytics platform that processes, parses, and analyzes data to identify security incidents ACTIVEINTELLIGENCE New threat intelligence sources and security content to support additional security use cases ACTIVEWATCH 24x7 security monitoring and investigation managed service staffed by security experts who understand threats and know how to respond to them FEATURES AND CAPABILITIES Easy to use web interface with intuitive search interface TECHNOLOGY Over 4,000 parsers available with new log format support added frequently Cloud storage with offsite replication for disaster recovery Advanced correlation capabilities EVENT CORRELATION AND NOTIFICATION Designed to detect suspicious activity Automatic alerts sent when rule is triggered PCI-specific rules to comply with requirement 10.6 Certified security analysts and researchers INTEGRATED MANAGED SECURITY SERVICES 24x7 state-of-the-art Security Operations Center Monitoring, analysis and expert guidance capabilities Customized alerting and escalation procedures

Dozens of dashboards and reports Custom reporting capabilities ANALYSIS AND REPORTING Audit-ready reports Single web-based console for entire environment Report scheduling, creation and review SSAE 16 audited data centers PCI Level 2 audited vendor PCI Approved Scanning Vendor (ASV) COMPLIANCE SUPPORT Storage and archival of incident analysis and cases Support for multiple compliance mandates PCI DSS 3.1, HIPAA, SOX, GLBA, cobit, etc. Rapidly deploy across your environment and scale as needed SECURITY-AS-A- SERVICE DELIVERY Pay-as-you-go model with minimal capital expenditure No hidden costs Subscription Includes: Software and Hardware Upgrades, Maintenance and Patches SPECIFICATIONS WINDOWS AGENTS SPECIFICATIONS CPU Utilization Supported OS Log collection frequency 1-10%, depending on log volume 15 MB minimum 30 MB minimum Port 443 - required for log transport and agent maintenance updates Windows Server (2012, 2008, 2003, 2000) Windows (8, 7,Vista, XP) Platform: 32-bit / 64-bit Agent-only deployments and with virtual and physical appliances, Virtual Private Cloud (VPC) and Public Cloud Every 5 minutes (logs collected and sent back to Alert Logic Cloud) Local System account has all the requisite permissions by default

SPECIFICATIONS (CONT.) SYSLOG AGENTS SPECIFICATIONS CPU Utilization Supported OS Log collection frequency 1-10%, depending on log volume 10 MB minimum Up to 500 MB minimum Port 443 - required for log transport and agent maintenance updates Debian (Squeeze, Lenny), Ubuntu 7.x-12.x, CentOS 5.x -6.x RedHat 5.x -6.x), Platform: 32-bit / 64-bit Agent-only deployments and with virtual and physical appliances, VPC and Public Clouds Every 5 minutes (logs collected and sent back to Alert Logic Cloud) No special permissions are required PHYSICAL APPLIANCE SPECIFICATIONS CPU Intel 4, 8, or 16 core 4GB, 16GB, 32GB, or 64GB 2x 1TB, RAID 1 Port 443 - required for log transport and appliance maintenance updates Both agent-based and agent-less Windows, Syslog, Flat File log collection VIRTUAL APPLIANCE SPECIFICATIONS CPU 2 cores minimum 2GB minimum 1GB 50GB Port 443 - required for log transport and appliance maintenance updates Supported virtual environment VMware only Syslog via agent or agent-less, Windows and Flat File via Agent only Note Not designed to run in a public cloud environment Use agent-only deployments instead ABOUT ALERT LOGIC Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyses over 400 million events and identifies over 50,000 security incidents each month, which are managed by our 24 7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com. 2015 Alert Logic, Inc. All rights reserved. Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or servicemarks of Alert Logic, Inc. All other trademarks listed in this document are the property of their respective owners. 0615US