As the log management leader, LogLogic has built an extensible open log management platform. The acquisition of Exaprotect will enable LogLogic to expand its product offerings into security event and security change configuration management. This presentation has more details about how we stack up.
What Are The Drone Anti-jamming Systems Technology?
Preso: LogLogic Agrees to Acquire Exaprotect
1. LogLogic Signs a Definitive Agreement to Buy Exaprotect Pat Sueltz | April 22, 2009
2.
3.
4.
5.
6.
7. LogLogic Delivers Value in a Tough Economy Traditional SIEM LogLogic Compliance Management Database Security Management Log Management Change Management Log Management Compliance Reports Security Event Management Security Event Management Change Management Bundled solution One stop shop Do more with less Time to value
8. The Three Steps to Security Management Maturity 1 2 3 What’s important? Security Event Management Compliance Management What to do? Change Management Database Security What’s going on? Log Management Database Activity Monitoring
9. Open Log Management Platform Accelerates Integration of new Log Powered Applications Contextual Data Network Servers Database Applications LogLogic Compliance Manager Partner Applications Correlation LogLogic Security Event Manager Open APIs LogLogic Database Security Manager Customer Applications Security Asset Identity Configuration Open Log Management Platform LogLogic Change Manager
10. Available Today: Log Powered Applications Working Together LogLogic Change Manager LogLogic Database Security Manager LogLogic Security Event Manager “ access to HR data” 1 (Privileged) User Activity Periodic Review 3 4 “ and sends e-mail” Prioritize Alert Prevention Investigation 2 LogLogic Compliance Manager Networks Servers Databases Applications
11. Towards Automated Management and Prevention Indexed Information Normalized Information Semantic Information Contextual Information Action Actionable Information – Alerts, Reports, Portals, etc. Log Files Data Information Recommendation Prediction Action
12. And Fine Grain Monitoring and Prevention Network Systems Applications Transactions Information Traditional SIEM Database Activity Monitoring Sensitive Data Privileged Users Applications Host Sensor Transaction Records. Customer Data. Financial Records. Intellectual Property. Personally Identifiable Information. Shared Memory DBMS
13. Fine Grain Monitoring Enables Accurate Prevention Sensitive Information Network Systems Applications Transactions Information Data Information Recommend Prediction Action Fine grain monitoring. More accurate prevention. What are the logs saying? What to do about it?