Clavister InSight TM. Protecting Values



Similar documents
QRadar SIEM 6.3 Datasheet

Boosting enterprise security with integrated log management

Analyzing Logs For Security Information Event Management Whitepaper

Analyzing Logs For Security Information Event Management Whitepaper

Configuring Celerra for Security Information Management with Network Intelligence s envision

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Payment Card Industry Data Security Standard

Analyzing Logs For Security Information Event Management

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Information Technology Policy

Analyzing Logs For Security Information Event Management

Extreme Networks Security Analytics G2 Vulnerability Manager

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

How To Achieve Pca Compliance With Redhat Enterprise Linux

What is Security Intelligence?

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Achieving SOX Compliance with Masergy Security Professional Services

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Cyberoam Perspective BFSI Security Guidelines. Overview

Q1 Labs Corporate Overview

How To Buy Nitro Security

Current IBAT Endorsed Services

Extreme Networks Security Analytics G2 SIEM

Symantec Security Information Manager Administrator Guide

Discover & Investigate Advanced Threats. OVERVIEW

How To Manage Sourcefire From A Command Console

DEMONSTRATING THE ROI FOR SIEM

Click to edit Master title style. How To Choose The Right MSSP

Demonstrating the ROI for SIEM: Tales from the Trenches

End-user Security Analytics Strengthens Protection with ArcSight

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Detect & Investigate Threats. OVERVIEW

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Injazat s Managed Services Portfolio

Scalability in Log Management

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Caretower s SIEM Managed Security Services

Extreme Networks Security Analytics G2 Risk Manager

Building a Web Security Ecosystem to Combat Emerging Internet Threats

10 Reasons Your Existing SIEM Isn t Good Enough

Enterprise Security Solutions

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

The Education Fellowship Finance Centralisation IT Security Strategy

IBM Global Technology Services Preemptive security products and services

FIVE PRACTICAL STEPS

HP and netforensics Security Information Management solutions. Business blueprint

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Unified Threat Management, Managed Security, and the Cloud Services Model

Vulnerability. Management

Monitoring Windows Workstations Seven Important Events

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Log management & SIEM: QRadar Security Intelligence Platform

CLOUD GUARD UNIFIED ENTERPRISE

Symantec Protection Suite Small Business Edition

Security Event and Log Management Service:

Meeting PCI Data Security Standards with

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

LogRhythm and NERC CIP Compliance

IBM ISS Optimizacija Sigurnosti

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

IBM QRadar Security Intelligence April 2013

syslog-ng Product Line

High End Information Security Services

Enterprise Security. Moving from Chaos to Control with Integrated Security Management. Yanet Manzano. Florida State University.

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Cisco Remote Management Services for Security

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

AVeS Cloud Security powered by SYMANTEC TM

IBM Tivoli Netcool Configuration Manager

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Dedicated IT Support. BEFORE You Need It. Save Time, Money and Headache.

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Log Management Solution for IT Big Data

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Solution Brief for HIPAA HIPAA. Publication Date: Jan 27, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Feature. Log Management: A Pragmatic Approach to PCI DSS

IT Security & Compliance. On Time. On Budget. On Demand.

IBM Security QRadar Vulnerability Manager

The Evolution of Managed Security Services ISS Virtual-SOC Solution, Security the Way You Need It

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

How To Protect Yourself From A Hacker Attack

access convergence management performance security

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Review: McAfee Vulnerability Manager

SANS Top 20 Critical Controls for Effective Cyber Defense

Peter Dulay, CISSP Senior Architect, Security BU

Transcription:

Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values

& Enterprise-wide security intelligence Regulation support: SOX, GLBA, HIPPA, PCI and FISMA Heterogeneous device support Real-time monitoring and correlated alerting Forensics and investigative root cause analysis and monitoring portals MSSP support with advanced user access controls is an award-winning, easy-to-use Security Information and Event Management (SIEM) solution that provides essential real-time security intelligence to help decipher hacker/virus behavior, combat security threats and meet regulatory compliance requirements across the entire IT infrastructure. provides powerful security intelligence across thousands of network devices that have an impact on a company s security framework. automatically collects and correlates event data from variety of heterogeneous multi-vendor network devices including routers, switches, firewalls, VPNs, IDS/IPS systems, proxy servers, spyware, antivirus, SPAM and content Figure 1: Enables Advanced Security and Regulatory Compliance filtering web security appliances. This information helps to eliminate false positives, identify security breaches and corporate violations, improve security operations and delivers the necessary tools to meet Sarbanes-Oxley (SOX), Gramm-Leach-Billey Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry (PCI) and Federal Information Security Management Act (FISMA) compliance. helps minimize incident response time and maximize the ability to take preventative actions by providing advanced security event monitoring, correlation and historical reporting. The end result improves security operations and protects IT assets by helping organizations centrally manage information risk and take proactive steps to minimize security breaches and meet compliance mandates. Forensiscs analysis Log Management Figure 1: Advanced Security and Regulatory Compliance

Protecting Values Architectural Overview In today s environment, one of the primary key features for a security management solution is the ability to scale to large networked environments. provides a distributed architecture for small to medium enterprises that scales to thousands of network devices. The architecture supports both a stand-alone deployment for smaller networks and a distributed deployment for larger enterprise installations. The flexibility of the architecture allows for the creation of a SIEM solution that can adapt to any environment. The architecture allows MSSPs to take advantage of out-of-thebox reporting and monitoring portals to offer new value-added revenue generating services or expand their current remote monitoring services to include comprehensive on-demand reporting and compliance audit log management. The built-in XML-based API allows MSSPs and enterprise customers to integrate reporting, alerting and monitoring data with other third-party portals. delivers all necessary tools, such as centralized log management, monitoring/alerting, reporting and forensics analysis to help meet both compliance and security operations management requirements, all in a single solution. Standard Deployment Distributed Deployment Forensics Regional/Divistional Central Regional/Divisional Forensics Architectural Benefits Distributed and highly scalable Role-based access and Active Directory/ LDAP single Heterogeneous device and vendor support sign-on integration Anytime, anywhere web-based management Out-of-the-box reporting and monitoring portals All-in-one solution with log management, monitoring, correlation, reporting and forensics XML-based API for easy integration by MSSPs and enterprise customers

Advanced Security Intelligence Event Drilldown through Workbench Provides advanced onthe-fly event drill-down with correlation and analysis of significant security events to enable quick resolution of security incidents. User-definable Event and Threat-Level Classifications Classify events and threat levels based on unique requirements. Real-time and Heterogeneous Real-time Monitors security event data across the entire network in real-time. Real-time Correlated Allows the creation and definition of any number of alerts to reduce false positives and identify blended attacks. Real-time Event Manager Presents a view of security event data from thousands of heterogeneous and multi-vendor network devices. Prioritizes the actions based on business impact of each event, allowing for corrective actions before an incident occurs. Dashboard Provides a quick, consolidated view of the environment. Create and view any number of user specific monitoring views and toggle between the different views. Figure 3: Dashboard Security Portal with Powerful Drilldown Access to over 1,000 interactive reports. Correlated Offers a holistic view and understanding of hacker and virus activity by correlating data across all network devices instead of looking at each device data separately. Intrusion and Rules-based Attack and rules-based reports provides a comprehensive understanding of the intrusions and rule violations. Protocol and Web Usage Provides a firm handle on protocol and web usage patterns. SPAM, Spyware and Antivirus Generates reports on malware activities. Vulnerability Integrates and reports on vulnerability data derived from your network. Content Categorization Generates reports to help understand employee web usage patterns. Automated Report Generation and Distribution Automatic e-mail distribution of reports in HTML, MHTML, PDF, Word, Excel and Text formats. Figure 5: center Compliance Management Log Archiving for Compliance Automatically compresses, encrypts and archives log files for investigative analysis and regulatory compliance. Compliance Provides centralized monitoring and alert correlation for real-time investigation of security incidents with regulatory compliance implications. Compliance Reports Offers detailed reports specific to SOX, HIPAA, GLBA, PCI and FISMA. Scalable Search Searches hundreds of GB of log data across multiple devices to aid in investigative analysis. Activity Investigation Identifies anomalies and employee corporate policy violations. Figure 4: Security intelligence and Compliance Reports Figure 6: Security Portal Copyright 1998-2006 Clavister AB. All rights reserved. Information in this document is subject to change without prior notification.

Protecting Values Awards System Requirements Processor Pentium 4 2.8 GHz or higher Disk Space 100 GB or higher RAM 2 GB or higher Operating System Windows Server 2000 / 2003 Fast IO Internet Explorer 6.0 with Java Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Part number: clavister-dts-insight-a004 Protecting Values Copyright 1998-2006 Clavister AB. All rights reserved. Information in this document is subject to change without prior notification.