SOFTNIX LOGGER Centralized Logs Management



Similar documents
REASON FOR LOG RETENTION MANAGEMENT

ACL Compliance Director FAQ

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Intrusion Detection Systems (IDS)

Softnix Messaging Server (SMS)

F-Secure Messaging Security Gateway. Deployment Guide

Management, Logging and Troubleshooting

The Bomgar Appliance in the Network

Security Information/Event Management Security Development Life Cycle Version 5

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Enterprise File Share and Sync Fabric. Feature Briefing

Copyright 2012 Trend Micro Incorporated. All rights reserved.

MailStore Server 7 Technical Specifications

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

Best practices and use cases for consistent, enterprise-wide SIEM security policy management

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

MailStore Server Specifications. 6 - Technical. Archiving. Supported Servers and Internet Mailboxes. Supported Clients

DISASTER RECOVERY WITH AWS

Module 1: e- Learning

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

MailStore Server The Standard in Archiving

ACE Management Server Deployment Guide VMware ACE 2.0

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

Monitor all of your critical infrastructure from a single, integrated system.

Upgrade to Webtrends Analytics 8.7: Best Practices

Network Monitoring Comparison

Symantec Security Information Manager Administrator Guide

Securing Networks with PIX and ASA

Tim Bovles WILEY. Wiley Publishing, Inc.

H.I.P.A.A. Compliance Made Easy Products and Services

MailStore Server PRODUCT OVERVIEW

QRadar SIEM 6.3 Datasheet

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

What s New in Centrify DirectAudit 2.0

TORNADO Solution for Telecom Vertical

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

The syslog-ng Store Box 3 LTS

Cisco Application Networking Manager Version 2.0

SolarWinds Log & Event Manager

McAfee SMC Reference Guide 5.7. Security Management Center

SonicWALL GMS Custom Reports

SonicWALL Global Management System Reporting Guide Standard Edition

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

syslog-ng Product Line

SonicWALL Global Management System Reporting Guide Standard Edition

McAfee Network Security Platform Administration Course

syslog-ng Store Box PRODUCT DESCRIPTION Copyright BalaBit IT Security All rights reserved.

SonicWALL Global Management System Reporting User Guide. Version 2.5

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK tel:

Government of Canada Managed Security Service (GCMSS) Annex A-7: Statement of Work - Security Information and Event Management (SIEM)

About Network Data Collector

ClockWork Enterprise 5

Secure Web Appliance. SSL Intercept

NETWORK SECURITY HACKS

User's Guide. Product Version: Publication Date: 7/25/2011

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

XpoLog Competitive Comparison Sheet

HIPAA Compliance Use Case

CA ARCserve Backup Agents and Options

C p o y p r y i r g i h g t D t e a t i a lie l d

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Eurobackup PRO: Configuration Best Practices

Business and enterprise cloud sync, backup and sharing solutions

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

The syslog-ng Store Box 3 F2

Achieving PCI-Compliance through Cyberoam

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

MailStore Server 7 - Technical Specifications

Secure Web Appliance. Reverse Proxy

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Backup and Archiving Explained. White Paper

Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California

Introduction to Endpoint Security

McAfee Data Loss Prevention 9.3.0

Exporting IBM i Data to Syslog

Standard: Event Monitoring

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

Secured Enterprise eprivacy Suite

Using SolarWinds Log and Event Manager (LEM) Filters and Alerts

TITANXR Multi-Switch Management Software

Protezione dei dati. Luca Bin. EMEA Sales Engineer Version 6.1 July 2015

Enforcive /Cross-Platform Audit

A Guide to New Features in Propalms OneGate 4.0

The Leading Security Suites

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Secret Server Qualys Integration Guide

Transcription:

SOFTNIX LOGGER Centralized Logs Management STANDARD, RELIABLE, SECURITY Softnix Logger Our goal is not only regulate data follow by cyber law but also focus on the most significant such as to storage data in the save place with security, reliability, easy to access and reduce the administrative load. Product Overview Softnix Logger (SLG) is Centralized Logs Management or Syslog Server. Softnix Logger was designed of software appliance it easy to use. Moreover, Softnix Logger was supported log file device appliance and non-appliance such as Firewall, Router, Switch, Windows Server, Linux Server, Unix Server, Mail Server, Application Server, Authentication Server, Radius, LDAP Server and Active Directory Server. Furthermore, Softnix Logger unlimited number of devices licenses. Why did we keep Log file? The administrator using log files for analyzing problem, monitoring, network system usage, etc. In case of regulation compliance, Log file is significant piece of evidence that can be proved in charge of log investigates.

Logger Server CIA Model (Confidentially, Integrity, Availability) Why did we use Softnix logger? During the operation of Softnix logger, Softnix Logger is able to log file collection system with an effective and efficiency. User can entrust in terms of data stability said that user can t delete or modify. Centralized Log Server Data Hashing or Archiving Clear text Logs Retention 90 Days Data Retention Undeleted & Unedited NTP Server Time Referred System alert for IT Auditor Efficiency of Softnix logger Softnix logger system acts as receiver (Syslog server). Flexibility designed and suitably for all network. Softnix logger has larger networks such as ISP, Data Center and large organization. Be less afforded in network because this system doesn t install in traffic sniffer or in-line concept which risks to decrease network performance. Therefore, syslog protocol is the best way to log collection. 2

NETWORK TIME SERVER Feature Syslog Agent Softnix logger used syslog agent when server does not support syslog such as Windows Server Active Directory, Linux Samba, Web Server (IIS, Apache), MS Exchange, ISA server, Lotus Note by set up syslog agent on server for delivered log into Softnix Logger. Softnix Logger Time Server (NTP) Most important of implement centralized log are the stability and reliability of timing. Consider that, Softnix Logger can be type of Time Server (NTP Server) so wherewith supported NTP Server completely. 3

Date Searching Softnix logger with index data is more powering and fast searching, no matter have more information. We can find in any various conditions such as searching by IP/Hostname, key wording, category Log, date/month/year. Data Integrity Significant process of data integrality is verifying log file which high stability and reliable. The system will be recorded along with log file data hashing also safety log of file in name of MD5, SHA1 and data encryption. Data Access Control Administrator can specify the permission for access log file by distinguish in category as System Admin, System Data, and System Audit in different way. SFTP Log Collector EPS Graphic EPS (Event per Second) is a graphic report of traffic log use for evaluates the performance of system. Softnix logger supports up to 50,000 EPS base on model use and Hardware operation. If your network device or server couldn t support Syslog or Non-Syslog, you can arrange all data into storage via FTP/SFTP absolutely. Backup / Achieve To support the external storage to store backup log file such as raw log or system configure. 4

LOG Analyzer and Report (Option) Analysis system and reporting system log file Use for analysis, for data report shown type of chart table. In summary of statistic which display the most recent Top 10 views. Supported 828 Logs Format Analysis Log in various formats such as Firewall, LINUX Mail Sever, MS Exchange, MS ISA, Linux Squid Proxy, Windows Event Log Syslog, Unix Syslog also 828 Logs Format. Graphic Report, Report Drill Down Display in type of bar graph and summarize in type of single page report. Customized Filter Customized filter purpose to record the event or message that you want to customize by report to report. Export to Excel File (CSV File) To support CSV file and develop any report by MS EXCEL. Summary of report automatically via E-mail Summary all report in type of Single Page Summary by sending notice via E-mail. Moreover, Administrator can set time to send message. 5

Deployment and Scalability Scalability Softnix Logger use LVM (Logical Volume Manager) which supported the expansion of data storage, no need new software installation. Shared Storage Support SUMMARY - Simplifying Log Collection - The Best Choice for TCO - Confidentially,Integrity,Availability - Increase system security Softnix Logger supported external storage such as NAS, SAN, and ISCSI. Effect that user can use able Softnix Logger in large enterprise as well. Site to site Softnix Logger set up in forwarder mode. By this installation Administrator can install Softnix Logger at office branch in order to transfer data to Softnix Logger which located at head quarter as well. More information and join us with connection with our business partners. Contact global sales Softnix Technology Co.,Ltd. Tel. (+66)2-245 4942-3 FAX. (+66)2-245 4944http://www.softnixtech.com Email: sales@softnixtech.com