Feeds:
Posts
Comments

Posts Tagged ‘SIEM’

Scalability, made easy.

LogInspect 5 can scale into any organization – big or small, locally based or operating globally.
And while all organizations have a similar need to invest in a SIEM solution, each has a unique set of operational conditions with specific requirements that dictate the scope of implementation.
A network might be highly segmented due to security policies or geographic distribution, mandating specific collection capabilities. Budget and staffing limitations can also require an incremental approach.

SIEM
LogInspect 5 is dynamic, adaptable and scalable to the specific needs of your organisation.

  • Accommodates today – and tomorrow.

IT executives can be assured that the solution they invest in today can adapt to accommodate their future organizational needs.
LogInspect 5’s dynamic enterprise architecture is flexible enough to meet multiple and changing requirements – from the easily scalable to broader collection capabilities.

  • Centralized Threat Analysis System.

Thanks to the Centralized Threat Analysis System (CTAS), LogInspect 5 can deploy any combination of hardware and software appliances on a multitude of servers.
Searching, alarming, and incident managing and reporting are consolidated on one single interface. Just apply the search or report to the suitable LogInspect 5 repositories.

  • Truly designed for Big Data.

•Based on NoSQL technologies – for ultimate performance.
•Lowered overhead thanks to tagged data rather than the indexed data of the traditional, expensive   performance of an SQL database.
•A “Document” database structure.
•Digests billions of logs on a daily basis.
•Log data is stored and normalized in one single and fast process.

  • Built-in scaling.

•Supports hardware appliances based on standard servers.
•Supports VMware and Hyper V.
•Dynamic repository architecture ensures easy scalability for multiple sites and optimised   performance.

  • Fully supports on existing infrastructures.

•SAN storage architectures.
•Existing load balancers.
•Co-exists with existing backup solutions.
•Full redundancy architecture for highest availability.

Advertisements

Read Full Post »

SIEM

Fast and precise remediation

LogInspect 5 (product now called Logpoint) collects, analyzes and monitors all events in an infrastructure – around the clock.
This means you can enjoy full transparency across the board, optimizing your IT operations while increasing availability and reducing operational costs.
Quick and accurate.
Should your IT operation still experience an interruption, LogInspect 5 allows you to quickly and more accurately find the exact cause of the problem – launching the necessary remediation while at the same time monitoring the components in question.
The cause… and the solution.
Errors, irregularities and poor performance can be a result of misconfigured systems, a lack of patches and software updates, system changes and irregularities in the infrastructure. LogInspect 5 helps you get an accurate overview of the true source thanks to several unique features:
Secure, centralized log archive. Automatically analyze log messages in real time.
• Safe and secure (signed) log repositories.
• Agent-based and agent-free log collection.
• Play-back for historic data and/or off-line data.
Customised Dashboards. Enjoy powerful visibility and clarity.
• Out-of-the box Dashboards for the most common alerts and security monitoring.
• Easy to create, personalized widgets within multiple Dashboards.
• Perma-linking for easily integrating into existing monitoring applications.
• Dashboard designs can easily be shared internally.
Advanced database monitoring.
• Performance and availability metrics from any database log.
• Trigger alerts based on commands and activities.
• Policy violation detection.
• Inspect application traffic content.

Read Full Post »

Scalability, made easy.

LogInspect 5 (now called Logpoint) can scale into any organization – big or small, locally based or operating globally.
And while all organizations have a similar need to invest in a SIEM solution, each has a unique set of operational conditions with specific requirements that dictate the scope of implementation.
A network might be highly segmented due to security policies or geographic distribution, mandating specific collection capabilities. Budget and staffing limitations can also require an incremental approach.

screen_dump_appl
LogInspect 5 is dynamic, adaptable and scalable to the specific needs of your organisation.

  • Accommodates today – and tomorrow.

IT executives can be assured that the solution they invest in today can adapt to accommodate their future organizational needs.
LogInspect 5’s dynamic enterprise architecture is flexible enough to meet multiple and changing requirements – from the easily scalable to broader collection capabilities.

  • Centralized Threat Analysis System.

Thanks to the Centralized Threat Analysis System (CTAS), LogInspect 5 can deploy any combination of hardware and software appliances on a multitude of servers.
Searching, alarming, and incident managing and reporting are consolidated on one single interface. Just apply the search or report to the suitable LogInspect 5 repositories.

  • Truly designed for Big Data.

•Based on NoSQL technologies – for ultimate performance.
•Lowered overhead thanks to tagged data rather than the indexed data of the traditional, expensive   performance of an SQL database.
•A “Document” database structure.
•Digests billions of logs on a daily basis.
•Log data is stored and normalized in one single and fast process.

  • Built-in scaling.

•Supports hardware appliances based on standard servers.
•Supports VMware and Hyper V.
•Dynamic repository architecture ensures easy scalability for multiple sites and optimised   performance.

  • Fully supports on existing infrastructures.

•SAN storage architectures.
•Existing load balancers.
•Co-exists with existing backup solutions.
•Full redundancy architecture for highest availability.

Read Full Post »

« Newer Posts