Sie sind auf Seite 1von 2

Supported Products (Sample List) May 2011

LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications. Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from which Logs can be collected and managed is much broader that the list below. If you are seeking support for a log source type not listed below, support may exist or can be developed to meet your needs. For any custom log source or device not currently supported for full normalization, LogRhythm can collect, archive and manage those logs out-of-the-box. Furthermore, LogRhythm provides customers with the capability to create full normalization within the application. Alternatively, LogRhythm professional services can develop support for you.

Access Control

Cisco Secure ACS ConSentry NAC Imperva SecureSphere RSA SecureID ACE Server

Anti-Spam Anti-Virus

Proofpoint Spam Webfilter Spam Assassin Blue Coat ProxyAV Clam Antivirus ESET Nod32 Antivirus Kaspersky Antivirus McAfee EPolicy Orchestrator Sophos AntiVirus Enterprise Server Symantec Antivirus Corporate Edition TrendMicro OfficeScan Antivirus Server

Riverbed Appliance Siemens Radiology Information System SWIFT Tandem Trade Innovations Verint Application vsFTP

E-Mail Server

Content Inspection/Filter

Barracuda WebFilter Citrix Netscaler Code Green Networks Content Inspection Appliance IBM Websphere iPrism Web Filter Squid Cache WebDefend WebSense

Blackberry Enterprise Server IBM Lotus Domino Enterprise Server Kerio Mail Server Microsoft Exchange Postfix Secure Computing IronMail Sendmail Sun Java System Messaging Server Zimbra Email

Encryption

SafeNet DataSecure i116 Appliance Vormetric Encryption Technology

File Integrity Monitor


Tripwire

Customer Relations
Microsoft CRM IBM Informix Dynamic Server Microsoft SQL Server Oracle Database 10g Oracle Database 11g Oracle Database 9

Firewall

Application

Database

Bind DB2 Epicor Coalition Finacle Core Finacle Treasury Gene6 FTP Server Juniper Application Acceleration Appliance LogRhythm Agent Meridian Microsoft Windows Server Update Service PatchLink Princeton CardSecure ProFTPD

Data Loss Prevention


Fidelis XPS Windows DFS Replication IronPort Email Security Appliance McAfee Email Security Appliance McAfee GroupShield Exchange Tumbleweed Mailgate Server

Directory Services E-Mail Security

Applicure DotDefender Astaro Security Gateway Barracuda Spam Firewall Checkpoint Firewall Cisco ASA Cisco Firewall Services Module Cisco PIX Citrix Gateway Server Dialogic Media Gateway Fortinet Firewall Juniper Firewall Netscreen Firewall Nortel Firewall/VPN Palo Alto Firewall Sidewinder Firewall Sonic Wall Sygate Firewall Symantec Endpoint Protection Watchguard Firebox

2011

IDS/IPS

Active Scout IPS AirDefense WIPS AirMagnet Network Assurance Checkpoint IPS-1 Cisco AIP-SSM IPS Module Cisco IDSM-2 IDS Cisco NIDS Cisco Security Agent Enterasys Dragon IBM ISS Proventia Juniper IDS/IPS McAfee Intrushield IPS McAfee Network Access Control Network Chemistry RF Protect Snort Sonicwall firewall/IDS SourceFire IDS Tipping Point Top Layer IPS

Linux Mac OSX NCR Unix System V Novell NetWare Snare Windows Agent Solaris Suse Linux Ubuntu Linux Unix Tru64 Windows 2000 Server Windows 2000 Workstation Windows 2003 Server Enterprise Windows 2003 Server Standard Windows 2003 Workstation Windows 2008 Server Enterprise Windows Vista Workstation Windows XP Workstation

Unified Threat Manager Virtualization

Mcafee Secure Internet Gateway Microsoft Virtual Server 2005 VMWare ESX Server VMWare Virtual Machine

VOIP

Avaya VOIP Server Cisco Call Manager VOIP Server

VPN

Physical Security
BioPassword

IBM 4690 POS Controller XPient POS CCA Manager Citrix Presentation Server Defender Security Servers (DSS) Microsoft RAS Server

Point-Of-Sale

Aventail SSL/VPN Cisco VPN Concentrator F5 Firepass SSL/VPN Juniper Host Checker Juniper SSL/VPN Nortel Contivity Sonicwall SSL-VPN 2000

Load Balancer

Cisco ACE Load Balancer Cisco CSS Load Balancer Switch Cisco Global Site Selector Citrix NetScaler F5 BIG-IP Local Traffic Manager

Remote Access

Vulnerability Assessment
McAfee Foundstone

Network Management

Router

Bradford Campus Manager ForeScout Network Access Control Generic ISC DHCP Infoblox Keri Doors NetXtreme Microsoft DHCP Server Microsoft ISA Server MS System Center Essentials Microsoft System Center Operations Manager Microsoft System Management Server X-NetStat

Cisco Router Enterasys Router HP Procurve Router HP Router Juniper Router RUGGEDCOM RUGGEDROUTER WatchGuard Router

Apache Apache Tomcat Blue Coat Web Proxy Server Microsoft IIS

Web Server

Wireless Access

Airwave Management System Aruba 5000 OS Cisco Wireless Control System Cisco Aironet Access Point Symbol WAP WS2000 Wireless Switch

Storage

Equallogic SAN NetApp Filer

Wireless Access Point

Switch

Operating System
AIX AS/400 Server BSD Unix CentOS Linux Server Generic Linux HP OpenVMS HP-UX IBM iSeries IBM ZOS IRIX

Brocade FC Switch Cisco Switch Dell Powerconnect Switch Enterasys Switch Extreme Networks Black Diamond Switch Foundry Switch HP Procurve Switch Juniper Switch Nortel Passport Switch Nortel Switch

2011

Das könnte Ihnen auch gefallen