Access "Product review: LogLogic LX"
This article is part of the November 2007 issue of Comparing seven top integrated endpoint security suites
LOG MANAGEMENT LogLogic's LX REVIEWED BY PHORAM MEHTA LogLogic Price: Starts at $50,000 Although device logs can contain a wide variety of information, little attention was given to the review and management of these logs until regulations like SOX, HIPAA and PCI made it mandatory. Now companies are finding there is far more to gain from reviewing and auditing logs than just compliance. LogLogic offers enterprise-class appliances for analyzing and archiving log data that enable organizations to achieve compliance, while offering decision support and improved availability. We reviewed the LX 2010, one of the LX family of appliances for real-time log data collection and analysis. (The ST series interfaces with NAS and WORM devices for mass storage.) Installation/Setup B+ LX 2010 is a beast of an appliance with a 2 TB RAW (1 TB in RAID 10) storage capacity, dual 2.4 AMD Opteron processors and 4 GB of memory. The setup is as simple as it gets, supported by a hardened Linux kernel, MySQL database, Apache Web server and Java. The only thing left for the user is ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Honeyclients bring new twist to honeypots
Honeyclients are unpatched web browsers that actively seek malicous websites.
-
Product review: LogLogic LX
Learn about LogLogic's LX event log management product installation, configuration and reporting features in this review.
-
Lumigent Audit DB 6.0 product review
Lumigent Audit DB 6.0 is evaluated on its configuration, installation, monitoring and reporting capabilities.
-
Product review: Seven integrated endpoint security products
Information Security magazine evaluates seven integrated endpoint security suites on their management capabilities, reporting, ability to detect and block malware, detecting and thwarting exploit attempts, and integration of the various desktop security capabilities in one package.
-
Web 2.0 application development techniques introduce new information security risks
Ajax, Java and other dynamic application coding methods have pulled computing power over to the client, introducing new risks and resurrecting old ones.
-
Product review: Paraben's P2 Enterprise Shuttle
Paraben's P2 Enterprise Shuttle
-
Honeyclients bring new twist to honeypots
-
-
Everdream 7.5 product review: Data encryption, malware protection
In this product review, learn how Everdream 7.5 can improve your desktop security strategy with Everdream Software as a Service (SaaS), desktop data encryption and antimalware coverage features.
-
ZENworks Endpoint Security Management 3.5 product review
Novell's ZENworks Endpoint Security Management 3.5 is evaluated on its configuration and management, policy control and reporting capabilities. It offers the ability to control applications, protocols and removable storage devices. It also delivers encryption to files and folders, and network access control to ensure protection levels are current.
-
SIEM market, log management tools need a standardized log format
Security information and event management (SIEM) systems and log management tools would benefit from standardized log formats.
-
Remote computer access to files and systems must secure
Organizations are overhauling strategies to meet the challenges of the mobile workforce. Companies need to be strategic when evaluating the best secure remote computer access technology they deploy.
-
Product review: Workshare Professional 5
Workshare's Workshare Professional is a document lifecycle management platform that allows an organization to control where documents are sent, manages changes and provides audit capabilities. It also integrates with Microsoft Office 2007 but is tied to specific email platforms.
-
Everdream 7.5 product review: Data encryption, malware protection
-
Columns
-
E-discovery forces security organizations to prepare for eventual litigation
The updated Federal Rules of Civil Procedure elevates understanding of e-discovery requirements to a high priority.
-
Bruce Schneier, Marcus Ranum debate the realities of cyberwar
Cyberwar: Myth or Reality?
-
Interview: CISO builds information security program from scratch
Commonwealth of Pennsylvania CISO Bob Maley built his information security program from scratch.
-
Information security officers need to sharpen their risk management skills
Information security managers should adopt a risk management skill set and move their career paths toward a strategic position, rather than strictly an operational one.
- Viewpoint: Don't blame generation gaps for poor home security
-
E-discovery forces security organizations to prepare for eventual litigation
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO