Access "Security Event Management"
This article is part of the August 2006 issue of Special manager's guide: Monitoring identities
SECURITY EVENT MANAGEMENT Eventia Analyzer 2.0, Eventia Reporter Check Point Software Technologies Price: Starts at $25,000 @exb @exe Firewall managers have long drowned in security logs, ignoring or disabling them because of the lack of good analysis tools. Security event management (SEM) products address this by receiving raw log data and pulling out the interesting, useful information. Check Point's Eventia Analyzer is a vendor-agnostic tool for receiving firewall, Unix and Windows OS logs, and then analyzing them and creating alerts and reports that identify the most critical security events on your network. Interoperability B Eventia's support is strongest for Check Point security products--all are included and contain built-in business intelligence rules for almost everything a Check Point product could log, ranging from system integrity measures, such as high CPU usage, to traditional security events, such as forged packets. Nonetheless, the SEM market demands multivendor support, and Check Point has done a good job of adding support for some of the ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
- What's a Hot Pick?
-
Single Sign-On Explained
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
1 is the loveliest number -
It's a Dirty Job...
SERVICES But someone has to handle vulnerability management. Giving it to an outsourcer seems like an easy solution, but enterprises need to first understand the gritty details.
-
Security Event Management
Check Point Software Technologies' Eventia Analyzer 2.0 and Eventia Reporter
-
Web Application Break-In
THREATS It's time to protect online assets from increasing attacks.
-
Buyers look for demonstrable success in innovative companies
Cool Tech Ain't Enough.
-
Akonix Systems' Akonix A-Series Product Review
In this product review, get information on instant messaging (IM) Akonix Systems' Akonix A-Series appliance. Get tips on configuration, installation, reporting and policy control.
-
Vendor Security Product News and Updates
Learn about the latest products and security updates from vendors like Crossbeam, Airmagent and Marshal. Get pricing information as well as setup and installation tips.
-
- At Your Service: August 2006 managed services security news
- Events: Information security conferences for August 2006
-
User authentication options: Using two factor authentication for security
Discover how using two-factor authentication can improve organizational security. Weigh your authentication options and choose the right product for your enterprise.
-
Three Pitfalls to Avoid
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
3 strikes, you're out -
IDP/Network Access Control
ForeScout Technologies' CounterACT
-
Secure Reads: Steganography and the art of covert communication
Read a quick review of the book, Hiding in Plain Sight: Steganography and the Art of Covert Communication.
-
Instant Messaging: Symantec IM Manager 8.0
Symantec's IM Manager 8.0
-
Columns
-
Editor's Desk: Consolidation is in
Synergistic Solutions
-
Layer 8: Personal devices put enterprise data at risk
Creeping Consumerization
-
Perspectives: Frame security as a business concept
Security efforts are considered operational, even when CISOs manage to interact with executives.
-
Ping: Heidi Kujawa
Heidi Kujawa
-
Editor's Desk: Consolidation is in
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO