SlideShare una empresa de Scribd logo
1 de 14
LogLogic Signs a Definitive Agreement to Buy Exaprotect Pat Sueltz | April 22, 2009
Legal Disclaimer ,[object Object]
A Break-through in Security Management ,[object Object],[object Object],[object Object]
Company Backgrounders ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Founded in 2002 170+ employees  900+ customers  200+ partners Proven ability to execute  Strong patent portfolio +
Even Better Together  Most complete security management suite Unifying historically disparate point solutions Closing the security management loop Extensible Open Log Management Platform + ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Complementary Intellectual Property ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Intellectual Property ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],+
LogLogic Delivers Value in a Tough Economy Traditional SIEM LogLogic Compliance Management Database Security Management Log  Management Change Management Log  Management Compliance Reports Security Event Management Security Event Management Change  Management Bundled solution One stop shop Do more with less Time to value
The Three Steps to Security Management Maturity 1 2 3 What’s important? Security Event Management Compliance Management What to do? Change Management Database Security What’s going on? Log Management Database Activity Monitoring
Open Log Management Platform Accelerates Integration of new Log Powered Applications Contextual Data Network Servers Database Applications LogLogic  Compliance Manager Partner Applications Correlation LogLogic Security Event Manager Open APIs LogLogic Database Security Manager Customer Applications Security Asset Identity Configuration Open Log Management Platform LogLogic Change Manager
Available Today:  Log Powered Applications Working Together LogLogic Change Manager LogLogic Database  Security Manager LogLogic Security Event  Manager “ access to HR data” 1 (Privileged) User Activity Periodic Review 3 4 “ and sends e-mail” Prioritize Alert Prevention Investigation 2 LogLogic Compliance Manager Networks Servers Databases Applications
Towards Automated Management and Prevention Indexed Information Normalized Information Semantic Information Contextual Information Action Actionable Information –  Alerts, Reports, Portals, etc. Log Files Data Information Recommendation Prediction Action
And Fine Grain Monitoring and Prevention Network Systems Applications Transactions Information Traditional SIEM    Database Activity Monitoring Sensitive Data Privileged Users Applications Host Sensor Transaction Records. Customer Data. Financial Records. Intellectual Property. Personally Identifiable Information. Shared Memory DBMS
Fine Grain Monitoring Enables Accurate Prevention Sensitive Information Network Systems Applications Transactions Information Data Information Recommend Prediction Action Fine grain monitoring. More accurate prevention. What are the logs saying? What to do about it?
Questions? ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
prekubatortto
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
boldonjames
 

La actualidad más candente (20)

GDPR and Russian FL152 Data Privacy Compliance
GDPR and Russian FL152 Data Privacy ComplianceGDPR and Russian FL152 Data Privacy Compliance
GDPR and Russian FL152 Data Privacy Compliance
 
How to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your applicationHow to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your application
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
 
Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data Classification
 
Six Key Components to Achieving GDPR Security Requirements
Six Key Components to Achieving GDPR Security RequirementsSix Key Components to Achieving GDPR Security Requirements
Six Key Components to Achieving GDPR Security Requirements
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility Personal data on the blockchain and GDPR compatibility
Personal data on the blockchain and GDPR compatibility
 
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
Cleaning up Redundant, Obsolete and Trivial Data to Reclaim Capacity and Mana...
 
Audit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of SecurityAudit Log Protection: Avoiding a False Sense of Security
Audit Log Protection: Avoiding a False Sense of Security
 
Building a strong security strategy
Building a strong security strategyBuilding a strong security strategy
Building a strong security strategy
 
Practical privacy protection
Practical privacy protectionPractical privacy protection
Practical privacy protection
 
Tuga it 2018 advanced data governance
Tuga it 2018   advanced data governanceTuga it 2018   advanced data governance
Tuga it 2018 advanced data governance
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Hallwaze security snapshot
Hallwaze security snapshotHallwaze security snapshot
Hallwaze security snapshot
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
 

Similar a Preso: LogLogic Agrees to Acquire Exaprotect

LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheet
jordagro
 

Similar a Preso: LogLogic Agrees to Acquire Exaprotect (20)

Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheet
 
Logs = Accountability
Logs = AccountabilityLogs = Accountability
Logs = Accountability
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Monitoring modern applications using Elastic
Monitoring modern applications using ElasticMonitoring modern applications using Elastic
Monitoring modern applications using Elastic
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
Sure log full
Sure log fullSure log full
Sure log full
 
Web Proxy Log Analysis and Management 2007
Web Proxy Log Analysis and Management 2007Web Proxy Log Analysis and Management 2007
Web Proxy Log Analysis and Management 2007
 
Fluency® - www.fluencysecurity.com
Fluency® - www.fluencysecurity.com Fluency® - www.fluencysecurity.com
Fluency® - www.fluencysecurity.com
 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Preso: LogLogic Agrees to Acquire Exaprotect

  • 1. LogLogic Signs a Definitive Agreement to Buy Exaprotect Pat Sueltz | April 22, 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. LogLogic Delivers Value in a Tough Economy Traditional SIEM LogLogic Compliance Management Database Security Management Log Management Change Management Log Management Compliance Reports Security Event Management Security Event Management Change Management Bundled solution One stop shop Do more with less Time to value
  • 8. The Three Steps to Security Management Maturity 1 2 3 What’s important? Security Event Management Compliance Management What to do? Change Management Database Security What’s going on? Log Management Database Activity Monitoring
  • 9. Open Log Management Platform Accelerates Integration of new Log Powered Applications Contextual Data Network Servers Database Applications LogLogic Compliance Manager Partner Applications Correlation LogLogic Security Event Manager Open APIs LogLogic Database Security Manager Customer Applications Security Asset Identity Configuration Open Log Management Platform LogLogic Change Manager
  • 10. Available Today: Log Powered Applications Working Together LogLogic Change Manager LogLogic Database Security Manager LogLogic Security Event Manager “ access to HR data” 1 (Privileged) User Activity Periodic Review 3 4 “ and sends e-mail” Prioritize Alert Prevention Investigation 2 LogLogic Compliance Manager Networks Servers Databases Applications
  • 11. Towards Automated Management and Prevention Indexed Information Normalized Information Semantic Information Contextual Information Action Actionable Information – Alerts, Reports, Portals, etc. Log Files Data Information Recommendation Prediction Action
  • 12. And Fine Grain Monitoring and Prevention Network Systems Applications Transactions Information Traditional SIEM Database Activity Monitoring Sensitive Data Privileged Users Applications Host Sensor Transaction Records. Customer Data. Financial Records. Intellectual Property. Personally Identifiable Information. Shared Memory DBMS
  • 13. Fine Grain Monitoring Enables Accurate Prevention Sensitive Information Network Systems Applications Transactions Information Data Information Recommend Prediction Action Fine grain monitoring. More accurate prevention. What are the logs saying? What to do about it?
  • 14.