• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

SIEM

Security Information and Event Management

EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, object access auditing, event correlation, real-time alerting, log forensics, and log retention.

SIEM Whitepaper
siem-sclogo"Provides solid SIEM functionality at a reasonable cost"
- SC Magazine

EventLog Analyzer SIEM Capabilities

Log Data Aggregation
EventLog Analyzer aggregates logs from heterogeneous sources (Windows systems, Unix/Linux systems, Applications, Databases, Routers, Switches and other Syslog devices) at a central place. EventLog Analyzer using its Universal Log Parsing and Indexing (ULPI) technology allows you to decipher any log data regardless of the source & log format.
Log Forensics
EventLog Analyzer makes forensic investigation very easy by allowing you to use its powerful log search functionality to search on both the raw and formatted logs and instantly generate forensic reports based on the search results.
EventLog Analyzer enables network administrators to search the raw logs to pinpoint the exact log entry which caused the security activity, find the exact time at which the corresponding security event had happened, who initiated the activity and also, the location from where the activity originated.
Event Correlation and Alerting
Correlation of events and production of alerts in real-time allows network administrators to proactively keep their network secure from threats. With EventLog Analyzer you can configure rules and scripts to correlate events based on threshold conditions or anomalous events and notify in real-time for any threshold violations or network anomalies.
EventLog Analyzer’s powerful correlation engine comes bundled with over 70 out-of-the-box correlation rules that cover user access, user logins, file integrity, user creation, group policies, unintended software installations and more
Read More
File Integrity Monitoring
EventLog Analyzer facilitates real time file integrity monitoring (FIM) by protecting sensitive data and meeting compliance requirements. With EventLog Analyzer's file integrity monitoring capability, security professionals can now centrally track all changes happening to their files and folders such as when files and folders are created, accessed, viewed, deleted, modified, renamed and much more.
Log Analysis
EventLog Analyzer performs log analysis in real-time and displays the analyzed log data into easy to understand charts, graphs and reports. Users can easily drill down through log data shown on the dashboard to get more insights and do a root cause analysis within minutes.
User Monitoring
Exhaustive reports are provided for user monitoring by EventLog Analyzer. This enables tracking suspicious behavior of users including privileged administrative users (PUMA).
You get precise information of user access such as which user performed the action, what was the result of the action, on which server it happened and track down the user workstation from where the action was triggered.
Object Access Auditing
EventLog Analyzer lets you know what actually happened to your files and folders - who accessed them, deleted them, edited them, moved them, where the files and folders went, etc. EventLog Analyzer provides object access reports in user friendly formats (PDF and CSV) and sends alerts when your sensitive files / folders are accessed by unauthorized people in real-time via sms or email.
You get precise information of object access such as which user performed the action, what was the result of the action, on which server it happened and track down the user workstation/network device from where the action was triggered.
Compliance Reports
Compliance is the core of SIEM and with EventLog Analyzer organizations can meet regulatory compliance requirements by monitoring and analyzing log data from all the network devices and applications. EventLog Analyzer allows you to generate pre-defined/canned compliance reports such as PCI DSS, FISMA, GLBA, SOX, HIPAA, etc.
EventLog Analyzer also provides a value added feature to customize existing compliance reports and also allows users to generate new compliance reports to help comply with growing new regulatory acts demanding compliance in future. Case Study: Read how TRA generated ISO 27001 Compliance report to meet their compliance requirements.
Log Data Retention
EventLog Analyzer retains historical log data to meet compliance requirements, for conducting log forensic investigation and internal audits. All retained log data is hashed & time-stamped to make it tamper-proof. EventLog Analyzer retains all machine generated logs - system logs, device logs & application logs to a centralized repository.
 
展开