NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring



Similar documents
NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Securing ephi with Effective Database Activity Monitoring. HIMSS Webcast 4/26/2011. p. 1

How To Buy Nitro Security

Redefining SIEM to Real Time Security Intelligence

The Evolution of Security Information & Event Management (and the technology that can take us there)

Detect & Investigate Threats. OVERVIEW

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Q1 Labs Corporate Overview

High End Information Security Services

QRadar SIEM 6.3 Datasheet

What is Security Intelligence?

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Discover & Investigate Advanced Threats. OVERVIEW

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security IBM Corporation IBM Corporation

QRadar SIEM and Zscaler Nanolog Streaming Service

Boosting enterprise security with integrated log management

Clavister InSight TM. Protecting Values

QRadar SIEM and FireEye MPS Integration

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Security strategies to stay off the Børsen front page

McAfee Database Security. Dan Sarel, VP Database Security Products

Enterprise Security Solutions

Extreme Networks Security Analytics G2 SIEM

The Sumo Logic Solution: Security and Compliance

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Mucho Big Data y La Seguridad para cuándo?

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Scalability in Log Management

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

RAVEN, Network Security and Health for the Enterprise

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Security Information & Event Management (SIEM)

Log management & SIEM: QRadar Security Intelligence Platform

IBM QRadar Security Intelligence April 2013

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

FISMA / NIST REVISION 3 COMPLIANCE

IBM Security QRadar SIEM Product Overview

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

10 Reasons Your Existing SIEM Isn t Good Enough

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

McAfee Security Information Event Management (SIEM) Administration Course 101

Ecom Infotech. Page 1 of 6

How To Manage Sourcefire From A Command Console

Security Event Management. February 7, 2007 (Revision 5)

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Automate PCI Compliance Monitoring, Investigation & Reporting

Secret Server Qualys Integration Guide

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

IBM Security Intelligence Strategy

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

SANS Top 20 Critical Controls for Effective Cyber Defense

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

How To Manage Security On A Networked Computer System

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Real-Time Database Protection and. Overview IBM Corporation

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

IT Security & Compliance. On Time. On Budget. On Demand.

End-user Security Analytics Strengthens Protection with ArcSight

McAfee Network Security Platform

On-Premises DDoS Mitigation for the Enterprise

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

Trend Micro. Advanced Security Built for the Cloud

ALERT LOGIC FOR HIPAA COMPLIANCE

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

August Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Extreme Networks Security Analytics G2 Vulnerability Manager

QRadar Security Intelligence Platform Appliances

Bridging the gap between COTS tool alerting and raw data analysis

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

PCI Compliance for Cloud Applications

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Meeting PCI Data Security Standards with

IBM Security QRadar QFlow Collector appliances for security intelligence

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Vistara Lifecycle Management

IBM QRadar as a Service

Caretower s SIEM Managed Security Services

How to Develop a Log Management Strategy

IBM Software Choosing the right virtualization security solution

Securing your IT infrastructure with SOC/NOC collaboration

Securing SharePoint 101. Rob Rachwald Imperva

PCI DSS Reporting WHITEPAPER

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Breaking down silos of protection: An integrated approach to managing application security

Transcription:

NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS

Today s security challenges demand a new approach to security management. Sensitive information is at a greater risk, from more directions, using more sophisticated attacks. Compliance drivers are also evolving - mandating greater security, and imposing more severe penalties to compensate for these challenges. How can you meet these challenges, and stay ahead of growing threats and increasing compliance requirements? NitroView rises to the occasion by integrating key information security functions into a single cohesive solution, using a patented high-speed data management and analysis engine to improve the breadth of analysis while reducing the Mean Time to Remediate (MTTR) from hours to just seconds. The result is greater visibility into all of the relevant aspects of your information infrastructure. This means better threat detection capabilities to prevent data loss, as well as more accurate and complete compliance reports to prevent failed audits and fines. Instead of deploying several different solutions for log management, event management, data loss prevention and compliance, these and other functions are consolidated into a single, tightly integrated security and compliance management solution. Industry s Fastest Database It wasn t easy. Combining security functions such as Log Management, Compliance Reporting, Event Management, Threat Management, Policy Management, and even Configuration Management into a single pane of glass required massive information collection. It required a database architecture capable of capturing and processing hundreds of thousands of security events per second from a multitude of devices. It required moving beyond logs into direct monitoring of networks, databases, and even application payload information. It required innovations in data storage and retrieval, in order to provide real-time reporting while at the same time scaling to a new order of magnitude of billions of security data records. But we did it. Hundreds of man-years of R&D have turned into the fastest, most integrated security and compliance management solution available- NitroView from NitroSecurity.

NitroView Enterprise Security Manager & Enterprise Log Manager NitroView Enterprise Security Manager (ESM) is the first and only Content Aware Security Information and Event Management system (SIEM). Built on top of the world s fastest data collection, management and analytics engine, NitroView ESM is able to look deeper into network and application activity - all the way to the actual information stored within an application s payload. By analyzing this data for anomalies and trends, and correlating it against information collected from over 200 third party log and event sources, NitroView ESM is able to detect a broader range of threats, with fewer false positives. In addition, NitroView ESM uses context provided from network flows, vulnerability scanners, identity management and authentication management systems to make sense of all that information, helping security analysts be more effective. Deepest Log Management Integration NitroView ESM is also the first SIEM to fully integrate Log Management functionality with the NitroView Enterprise Log Manager (ELM). With one log collection facility, central management of log storage and retention, and a single interface for all event management and log management features, this isn t a bolt-on integration, but true single pane of glass security management. Jump directly from any event to the relevant record in the source log file with a single click, perform text searches, or adjust log filter, storage and retention parameters - all from within the NitroView ESM console. Integration Fully integrated Enterprise Log Management for log retention and compliance Fully integrated Database Activity Monitoring for the detection and protection of sensitive information Fully integrated Application and Protocol content analysis for data leakage and fraud detection Fully integrated Intrusion Prevention for active protection against network attacks, exploits and vulnerabilities Compliance Customizable dashboards to support real-time compliance management Monitor and log data access by identity, roles and privileges Detect sensitive data within application content Over 300 pre-built real-time dashboards and reports for key compliance requirements, including PCI-DSS, HIPAA, NERC-CIP, FISMA, GLBA and SOX. Fully integrated log management with flexible storage and retention by log type or source to support specific compliance audit trail requirements

Threat Management Customizable dashboards to support real-time incident response and forensics Real-time drill-down into events, network activity, assets, and vulnerabilities collected from over 200 third party sources Visualized context using auto baselines, network topology overlays, and even geo-location services Over 200 pre-built correlation rules for the detection of larger incidents and threats Network topology, user identity, and geo-location context for easy location of threats both inside and outside of your company Log Management Collect, hash, and store any log file, in any format, in tamper-proof storage system for chain of custody Filter log contents upon collection, and/or fully parse logs for deeper analysis Flexible storage allows on appliance storage and/or network attached storage, with a Fiber Channel SAN option for maximum storage, scale, and performance Integrated IT search capability Flexible Deployment Options Scalable from all in one installations with full ESM and ELM functionality in a single appliance, to highly distributed, hierarchical deployments of specialized collection and management appliances. NitroView ESM ESM/ELM all in one appliances for smaller non-distributed networks ESM 4000 models for small to mid-size networks ESM 5000 models for mid to large networks ESM X5 models for extremely large networks NitroView Receiver models for distributed collection of logs, events, and network flows NitroView ELM ESM/ELM all in one appliances for smaller non-distributed networks ELM 4000 models for small to mid-size networks ELM 5000 models for mid to large networks

NitroView Monitoring and Deep Packet Inspection When you have the fastest, most scalable SIEM, you have the capacity to easily collect all relevant security information from your network infrastructure. That s why NitroSecurity offers a variety of purpose-built appliances, which perform deep packet inspection to provide maximum visibility into what s happening in your network. Each NitroView monitoring appliance can be used on its own, or as a fully integrated component of NitroView Enterprise Security Manager, supplementing the hundreds of third party log and event sources already supported by NitroView ESM. NitroView Application Data Monitor NitroView Database Monitor Monitor and log all database activity and session detail Discover databases, and whether sensitive data is stored on them Detect all access to sensitive data: from users, applications, malware, utilities, back-doors, queries, LAMP scripting, and ODBC. Trigger alerts based on database activities and commands, and on pattern-matching within queries and results Rebuild full session details from any event, from login to logoff Supports DB2, Oracle, MS SQL, MySQL, Informix, and SyBase databases Fully decode and inspect the contents of application traffic, documents, and protocols Monitor application content and trigger alerts based on application content to detect policy violations, data leakage, and fraud Capture and log session detail around all triggered events Supports over 400 applications and protocols

NitroGuard IPS In-line network monitoring to detect and prevent intrusion attempts, exploits, and other attacks Open source syntax, but with a highly optimized engine Centralized policy management for easy protection of larger networks Adaptive protection leveraging the full analytical power of NitroView Integrated network flow collection for added context around threat activity FIPS 140-2, Level 2 Validated Certifications Flexible Deployment Options Purpose-built appliances for network, data base and application monitoring NitroView DBM DBM 2000 models for networks with light to moderate database activity DBM 4000 models for networks with heavy database activity DBM Agents for direct database server monitoring (optional) NitroView ADM ADM 1000 models for lower bandwidth network content monitoring ADM 2000 models for higher bandwidth network content monitoring NitroGuard IPS IPS 1000 models for 100-500Mbps intrusion prevention IPS 2000 models for 500Mbps 1Gbps intrusion prevention IPS 4000 models for multi-gigabit intrusion prevention IPS 5000 models for 10Gbps intrusion prevention Common Criteria EAL 3 augmented with Flaw Remediation Certified

You Won t Believe Your Eyes Blazing speed. Massive scale. Unmatched integration. NitroView is the fastest, most integrated security and compliance management solution available. But don t just take our word on itbecause seeing is believing. Contact us today to learn more and schedule a convenient web demo. Contact Information 1-888-LOG-SIEM www.nitrosecurity.com twitter/nitrosecurity linkedin.com/companies/nitrosecurity youtube.com/user/nitrosecurity NITROVIEW DBM Database Activity Monitor Database Log Generation Session Audit NITROVIEW ESM Unified Visibility Correlation & Analysis Compliance Reporting Policy Management NITROVIEW ADM Application Data Monitor Layer 7 Decode Full Meta-Data Collection network core untrusted network NITROVIEW ELM Log Management Compliant Log Storage trusted network NITROGUARD IPS Intrusion Prevention Firewall Flow Collection Corporate Headquarters 230 Commerce Way, Suite 325 Portsmouth, NH 03801, USA Main Phone: 603.766.8160 Main Fax: 603.766.8169 www.nitrosecurity.com Virginia Field Sales Office 12030 Sunrise Valley Drive, Suite 180 Reston, VA 20191, USA Main Phone: 603.766.8160 Main Fax: 703.860.7404 012010