Sie sind auf Seite 1von 4

TECHNICAL DATASHEET

Automate Log Compliance,


Simplify Security Event Management
TecForte Log Radar
R TM

Highlights :
Log Radar is a robust and easy-to-use Security Information and Event Management
TM

Get up-to-date network overview by viewing (SIEM) software solution that provides essential real-time security intelligence to help
real-time log details on interactive dashboards decipher hacker/virus behavior, combat security threats and meet regulatory compliance
requirements across the entire IT infrastructure.
Web-based Centralized Management Console
Log Radar provides powerful security intelligence across heterogenous network devices
TM

Log Consolidation from heterogeneous sources that have an impact on an organization’s security framework.
-e.g. Windows Servers, Firewall, IDS/IPS, VPN
Log Processing, Heterogeneous Endpoints, Multiple Locations
Normalization of logs instantly deciphers raw Incident Management
HQ
logs into easily understandable language
Raw Logs Firewall
Router

Identifies the root cause of non-conforming


IPS
activities promptly and effectively Filtered Logs
TM
External Log Storage

Upholds top service level performance with Normalized Events


instant alert upon threat identifications Windows Server

Aggregated Events
Analyzes your Windows Server and PC logs and VPN Firewall

identifies possible brute force attacks Correlated Alerts Switch


Spam Firewall

Automated sorting and categorization of Incidents


attacks naming convention from heteroge-
neous sources
INTERNET

Simplifies Standard Compliance with


Log Radar TM

200+built-in report templates for ISO 27002 , TM


Regional Office 2
Regional Office 1
PCI DSS, HIPAA, SOX etc.
Log Radar automatically collects and correlates logs from variety of heterogeneous
TM

Flexibility of generating distributed reports at multi-vendor network devices including routers, switches, firewalls, VPNs, IDS/IPS
multiple branches, as well as centralized reports systems, proxy servers, spyware, antivirus, SPAM and content filtering web security
at HQ appliances. This information helps to eliminate false positives, identify security breaches
and corporate violations, improve security operations and delivers the necessary tools to
Frees up technical human resource with meet ISO27001, SOX, HIPAA and PCI DSS compliance.
computerized processing of security log
Log Radar helps minimize incident response time and maximize the ability to take
TM

Accepts SYSLOG and SNMP integration preventative actions by providing advanced security event monitoring, correlation and
historical reporting. The end result improves security operations and protects IT assets by
helping organizations centrally manage information risk and take proactive steps to
minimize security breaches and meet compliance mandates.

All Rights Reserved. TecForte © 2010


TECHNICAL DATASHEET LOG RADAR
TM

Real-time Monitoring and Alerting Automated Asset Discovery Security Reporting


Heterogeneous Real-time Monitoring Reporting Portal with Powerful Drilldown
Monitors security event data across the entire Access to over 300+ interactive reports.
network in real-time.
Correlated Reporting
Real-time Correlated Alerting Offers a holistic view and understanding
Allows the creation and definition of any of hacker and virus activity by correlating data
number of alerts to reduce false positives and across all network devices instead of looking at
identify blended attacks. each device data separately.

Real-time Event Manager Intrusion and Rules-based Reporting


Presents a view of security event data from Attack and rules-based reports provides a
various heterogeneous and multi-vendor comprehensive understanding of the
network devices. Prioritizes the actions based intrusions and rule violations.
on business impact of each event, allowing for
corrective actions before an incident occurs. Protocol and Web Usage Reporting
Supported Systems & Devices Provides a firm handle on protocol and web
Monitoring Dashboard usage patterns.
Provides a quick, consolidated view of the Log Radar provides out-of-the-box support
TM

environment. for a broad range of heterogeneous SPAM, Spyware and Antivirus Reporting
endpoints, including support for: Generates reports on malware activities.
Web-based Interactive Dashboard • Microsoft Servers and workstations Vulnerability Reporting
• Antivirus / Antispam products Integrates and reports on vulnerability
• Firewall / Web Filtering products data derived from your network.
• VPN products
• IDS / IPS Content Categorization Reporting
• Routers and Switches Generates reports to help understand web
usage patterns.
Log Radar can be easily extended to monitor
TM

other products, systems and devices. Please Automated Report Generation and Distribu-
contact us for more information on how Log tion
Radar can assist in supporting your environ-
TM

HTML display, and automatic e-mail distribu-


ment and specific requirements. tion of reports in PDF, Excel formats.

Compliance Management Advanced Security Intelligence Top Attackers Report

Log Archiving for Compliance Event Drilldown


Automatically compresses, encrypts and Provides advanced on the-fly event drill-down
archives log files for investigative analysis and with correlation and analysis of significant
regulatory compliance. security events to enable quick resolution of
security incidents.
Compliance Monitoring
Provides centralized monitoring and alert User-definable Event and Threat-Level
correlation for real-time investigation of Classifications
security incidents with regulatory compliance Classify events and threat levels based on
implications. unique requirements.

Compliance Reports
Offers detailed reports specific to ISO27002, Recommended System Requirements:
SOX, HIPAA and PCI DSS.
Model
Model Requirements
Scalable Search
Searches hundreds of GB of log data across Processor Intel Xeon Quad Core 2.5 GHz or higher
multiple devices to aid in investigative Memory 4 GB
analysis.
Operation System Server 2003 64 - bit
Activity Investigation
Disk Space for Application 390 MB
Identifies anomalies and employee corporate
policy violations. Disk Space for Logs Subject to traffic volume and log rotation policy

All Rights Reserved. TecForte © 2010


Network and System Log Management
in Government Ministries and Agencies

Governments around the world are continuously seeking for effective and sustainable ICT practice to the keep its
computer systems in top notch condition. In many ways, a Government environment is much more complex than
any corporate environment, as there is a strong need to balance the freedom to information and internet with
national security.

“34% of total security incidents reported by As new computer threats and risks are being discovered,
the Government Ministries and Agencies there is a valid reason for the Government Ministries, Agen-
could not be investigated due to the lack in cies and GLCs to continue adding layer upon layer of security
log activation & management.” solutions to beef up its defenses. – However, with this addi-
tion of more and more system devices and security products
- According to MAMPU (Malaysian Administrative comes the responsibility of managing them! - And monitor-
Modernisation and Management Planning Unit)
ing such a highly complex security measures and its enor-
- GCERT (Government Computer Emergency Response mous amount of Network and System Logs have been recog-
Team): Reference: MAMPU 702-11/1/7 Jld. 3 (48)] nized by Governments in the world to be one of the biggest
headaches in today’s ICT security management!

A Central Network and System Log Management


Application is required to eliminate human-intensive, “With the recognition of the critical impor-
complex and costly log management process; and to tance in ICT security, MAMPU encourages use
deliver a clear and comprehensive ministry-wide of locally developed security products are
overview of the entire network & system security preferred over foreign makes to help spur
condition in real time. Furthermore, the application local ICT security development.”
would assist to collect electronic evidence, probe
deeper and solve technical problems to help the - (MyMIS 2.6)
judicial process and national security.

Main Function of Log Radar TM

Central Network and System Log Management System

Log Radar is enabling the ICT administrator to regain full control over their ICT Security Systems by delivering
TM

tremendous value and insight towards maintaining security health, rapid threat identification and improved system
availability & uptime – via centralized log data collection, analysis and correlation.

» To comply to MAMPU policies in log management and pass stringent system audits
» To strengthen on Government’s effort to battle internal abuse and external hacking
» To increase productivity, integrity, availability of its computer network infrastructure
» To mitigate guesswork and fire-fighting in the current security controls

All Rights Reserved. TecForte © 2010


About TecForte
R

TecForte is a Malaysia based R&D centre for


R

Central Security Management Solution (since


2004). Its pioneer status has also won the
award of MSC status. Log Radar has been
TM

implemented by Malaysia Custom Immigra-


tion & Quarantine (CIQ) Complex, MAVCAP,
TOT Thailand, Central Bank of Thailand,
TelBru (Telekom of Brunei), etc. Currently, it is
undergoing world class security certification,
CC EAL2.

TecForte Sdn Bhd Tel : +6(03) 2264 3164


Parcel No 2A-13-2, Plaza Sentral Phase II. Fax : +6(03) 2264 3064
Online and Phone Support Available
Jalan Stesen Sentral 5, Kuala Lumpur Sentral Email : info@tecforte.com
50470 Kuala Lumpur, Malaysia URL : www.tecforte.com All Rights Reserved. TecForte © 2010

Das könnte Ihnen auch gefallen