ALERT LOGIC LOG MANAGER & LOG REVIEW

Similar documents
WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

SIEMLESS THREAT DETECTION FOR AWS

SIEMLESS THREAT MANAGEMENT

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

TRUE SECURITY-AS-A-SERVICE

Symantec Security Monitoring Services

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

Accelerate Your Enterprise Private Cloud Initiative

SIEM Solutions from McAfee

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Netwrix Auditor for SQL Server

Unlocking the Power of the Cloud

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

Industrial Defender ASM. for Automation Systems Management

Custom hosting solutions orchastrated for your needs.

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

PROTECT AND AUDIT SENSITIVE DATA

locuz.com SOC Services

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Netwrix Auditor Competitive Checklist

TRIPWIRE VIA PLATFORM PROTECTING YOUR DATA WITH INTEGRATED SECURITY CONTROLS

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Maximizing IT Security with Configuration Management WHITE PAPER

Securing the Cloud Today: How do we get there?

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Run the business. Not the risks.

Automating the Top 20 CIS Critical Security Controls

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Network Security Protection Alternatives for the Cloud

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

EMC Ionix IT Compliance Analyzer Application Edition

Telos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Service Provider Consulting

White Paper Server. Five Reasons for Choosing SUSE Manager

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Evolved Backup and Recovery for the Enterprise

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

THE HYBRID CLOUD. Private and Public Clouds Better Together

SOLUTION BRIEF RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD

Mitigating Risks with Cloud Computing Dan Reis

Intermedia s Private Cloud Exchange

Managed Security Services - Endpoint Managed Security on Cloud

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

AWS Reference Design Document

University of Pittsburgh Security Assessment Questionnaire (v1.7)

SOX/COBIT Framework. and Netwrix Auditor Mapping. Toll-free:

THE TRIPWIRE NERC SOLUTION SUITE

by Cisco Intercloud Fabric and the Cisco

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

INTELLIGENCE DRIVEN GRC FOR SECURITY

Qualys Cloud Platform

NETWRIX GROUP POLICY CHANGE REPORTER

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations

Hitachi Unified Compute Platform Pro for VMware vsphere

The case for cloud-based data backup

SEVONE END USER EXPERIENCE

Cloud Computing, SaaS and Outsourcing

Backup & Recovery on AWS

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Secret Server HP ArcSight Integration Guide

McAfee Database Security

MEETING ISO STANDARDS

RED HAT CLOUDFORMS. Chris Saunders Cloud Solutions

Core Services for ediscovery Perfection

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past

Hybrid Cloud Data Protection & Storage

Comprehensive Database Security

SYMANTEC DATA CENTER SECURITY

Cisco Cloud Application Centric Infrastructure

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide

For Australia January 2018

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

SECURITY PRACTICES OVERVIEW

Security from the Inside

Best Practices for PCI DSS Version 3.2 Network Security Compliance

Simplifying Security for IBM i and IBM Security QRadar

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Deliver Data Protection Services that Boost Revenues and Margins

UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE

Netwrix Auditor for Active Directory

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

WHITEPAPER. MemSQL Enterprise Feature List

Total Cost of Ownership: Benefits of ECM in the OpenText Cloud

Imperva Incapsula Website Security

The Why, What, and How of Cisco Tetration

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Total Cost of Ownership: Benefits of the OpenText Cloud

Google Cloud & the General Data Protection Regulation (GDPR)

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

For USA & Europe January 2018

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Commvault Cloud Solutions

Transcription:

SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure management best practice, and is essential in achieving compliance. Log management is becoming more complex as companies transition from on premises data centers to public cloud environments. In today s cloud first environment, solving your log management needs with yesterday s technology is not viable. You need an approach to log management that delivers deep insight into your security and compliance posture without the headache of bringing yet another product in-house. Log sources are more numerous and more varied. Infrastructure is moving from traditional hosted and on-premises deployments into the cloud, requiring new deployment models for virtual and elastic cloud environments. Compliance mandates such as PCI DSS, HIPAA and Sarbanes-Oxley have added new log management deliverables. Meanwhile, strategic projects compete for limited IT resources. How will your organization meet these challenges? The Alert Logic Security-as-a-Service approach to log management solves these challenges by making log management simple to implement, easy to afford and almost effortless to manage.

ALL YOUR INFRASTRUCTURE - ALL YOUR DATA - ALL TOGETHER If your IT infrastructure is spread across in-house, hosted and cloud deployments, your log management needs to be there too. Alert Logic Log Manager collects, aggregates and normalizes log data whether it originates in your own data center, a hosted environment or the cloud. A powerful web interface gives you a unified view into all of your data, with tools to rapidly uncover the insight and alerts you need to remain secure and compliant. Flexible data collection options physical appliances, remote collectors with lightweight agents or agentless methodology, and cloud native APIs provide low-impact deployment options for all of your infrastructure. GET INSIGHT FAST WITH AN INTUITIVE WEB INTERFACE FEATURING SUPER-RESPONSIVE SEARCH. Log Manager provides hundreds of pre-built reports, saved views, and dashboards to meet many of your security and compliance requirements on day one. Searching takes flight with an interface that predicts and suggests queries and makes it easy to change and refine queries mid-stream. Turn data into action: It s easy to correlate events and set automatic alerts and reporting to enable rapid response to security events.

GET RESULTS, NOT IMPLEMENTATION AND MANAGEMENT HEADACHES. SECURITY-AS-A-SERVICE DELIVERY MEANS THAT YOU RE UP AND RUNNING FAST. Onboarding and provisioning in minutes. Access virtual appliances and agents quickly through the Log Manager interface. Subscription pricing model means no upfront costs or capital expenditures, and flexibility to scale with your growth. Rich APIs for deep integration into management systems, simplifying ongoing ordering, provisioning, billing and support. UNDER THE HOOD, YOU VE GOT THE POWER TO HANDLE YOUR BIGGEST DATA REQUIREMENTS. With multiple petabytes of log data under management, Alert Logic has built the systems that support the massive volumes of log data that your systems and devices generate. The Alert Logic back-end grid processes log data rapidly to give you rapid access to data. Log data is stored securely for a full year to protect against unauthorized loss, access or modification in our SSAE 16 Type II verified data centers. (Longer storage periods are available.) GET A VIRTUAL TEAM WITH LOG REVIEW Log Review reporting provides daily event log monitoring by our dedicated team of security professionals. With Log Review, log analysis is never delayed or sidetracked by competing priorities. Log Review also includes integrated review and case management capabilities. Track and report on incident trends across your entire enterprise, including services hosted outside of your perimeter. Built-in workflow and case management tools provide an auditable trail of any suspicious findings and give a historical perspective of your entire security and compliance operation. MEET YOUR KEY PCI DSS COMPLIANCE REQUIREMENTS Log Manager and Log Review help meet PCI DSS requirements 10.2, 10.3, 10.5, 10.6 and 10.7: Analyze event log data for potential security incidents, such as account lockouts, failed logins, new user accounts and improper access attempts. Identify incidents that warrant investigation and send notifications to you for review. Provide daily reports mapped to the PCI DSS standard. Create an incident audit trail for auditors and regulators.

FEATURES AND CAPABILITIES Easy to use web interface with intuitive search interface TECHNOLOGY Thousands of parsers available with new log format support added frequently Cloud storage with offsite replication for disaster recovery Advanced correlation capabilities EVENT CORRELATION AND NOTIFICATION Designed to detect suspicious activity Rule based automatic alerts and notification PCI-specific rules to comply with requirement 10.6 Certified security analysts and researchers INTEGRATED MANAGED SECURITY SERVICES 24x7 state-of-the-art Security Operations Center Monitoring, analysis and expert guidance capabilities Customized alerting and escalation procedures Dozens of dashboards and reports ANALYSIS AND REPORTING Custom reporting capabilities Audit-ready reports Single web-based console for entire environment Report scheduling, creation and review SSAE 16 audited data centers PCI Level 2 audited vendor COMPLIANCE SUPPORT PCI Approved Scanning Vendor (ASV) Storage and archival of incident analysis and cases Support for multiple compliance mandates PCI DSS, HIPAA, SOX, GLBA, cobit, etc.

SECURITY-AS-A- SERVICE DELIVERY Rapidly deploy across your environment and scale as needed Subscription model with minimal capital expenditure No hidden costs Subscription is all-inclusive ENVIRONMENTS WE PROTECT Alert Logic delivers Security-as-a-Service, protecting your critical data across public cloud, private cloud, on-premises, managed hosting/co-lo and hybrid environments. Alert Logic has built deep integrations into the leading public cloud platforms including Amazon Web Services and Microsoft Azure. PRIVATE CLOUD HOSTED PUBLIC CLOUD ON-PREMISES 2016 Alert Logic, Inc. All rights reserved. Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or servicemarks of Alert Logic, Inc. All other trademarks listed in this document are the property of their respective owners. 816US