• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

Real-Time Event Correlation

Prevent Security Breaches at the Earliest Using EventLog Analyzer's Correlation Engine

Real Time Event CorrelationReal-time event correlation is all about proactively dealing with threats. Data breaches are on ​the rise and hackers use highly targeted attacks to intrude upon enterprise networks and steal sensitive data. Protecting your network data from attackers involves detecting security threats at its early stage. Security investigators need to determine whether a suspicious event or chain of security events that had happened on the network is a potential security threat or not.

Manually investigating events across the network from various log sources and correlating them to formulate an attack pattern will be a herculean task for the security investigators.

To effortlessly identify the possible intrusions in the network, you need to have an automated effective correlation engine that gives a complete scope of any security incident by building relationships between events happening across your network infrastructure.

Detecting Threats with EventLog Analyzer Correlation Engine

Rules Based Event Correlation ​EventLog Analyzer's correlation engine effectively connects security incidents from a wide array of log sources in your network. It comes bundled with over 70 out-of-the-box correlation rules that cover user access, user logins, file integrity, user creation, group policies, unintended software installations and more. With this out-of-the-box correlation rules IT security professionals can detect and identify anomalies as and when they happen without any hassles of manual intervention.

The IT security professionals are notified in real time during any threshold violations or network anomalies by an SMS or email.

Creating Attack Patterns with the Correlation Rule Builder

Search Based Event CorrelationEventLog Analyzer's correlation rule builder can baseline the 'normal' network behavioral patterns by specifying the levels for each individual correlation rules.It allows you to create attack patterns that are prone to occur at your ​network infrastructure with its simple easy to use interface. All you have do is drag and drop the predefined rules to formulate attack patterns.

Once the rule is formulated, the correlation engine analyzes & correlates the logs collected across your network based on the set of defined rules, looks for a significant symptom that can lead to a potential attack and alerts you in real-time via email or SMS and hence you can proactively react to the breach.

What's so Special with EventLog Analyzer's correlation engine?

The correlation engine,

  • Increases efficiency by automating the process of correlating millions of log data collected every day
  • Helps you to create as many alert patterns as possible that are relevant to your environment, with a simple drag and drop from the predefined rules thus identifying the security threat at the right time.
  • Is flexible. Allows you to specify the threshold limits for individual rules in an attack pattern thus encompassing the slow long time attack attempts and also weeds out false positives.
  • Has the capability to run custom remediation scripts to carry out some action to mitigate the threats without manual intervention

A Typical use case scenario

In most of the password attacks and application layer attacks, the hackers try to get into the system with the known user account and then creates a backdoor account which is often a privileged user account that can enable the security data breach.
With EventLog Analyzer's correlation rule builder, you can easily create these kinds attack pattern by selecting and correlating the predefined set of rules.

ela_correlation-use-case

 
展开