SIEM as a Service (SIEMAAS)
Event collection:
The Extreme Networks Security Information and Event Manager (SIEM) product combines best-in-class detection methodologies with behavioral analysis and information from third party vulnerability assessment tools to provide the industry’s most intelligent security management solution. Extreme Networks siem delivers actionable information to effectively manage the security posture for organizations of all sizes. The challenge created by most threat detection systems is the volume of information they generate making it difficult to determine which vulnerabilities requires an immediate, high priority response. The Extreme Networks SIEM solution addresses this challenge and provides powerful tools that enable the security operations team to proactively manage complex IT security infrastructures.
The Extreme Networks SIEM solution portfolio features appliances for quick and easy setup. The Extreme Networks SIEM solution complements its appliances with the Virtual Flow (VFlow) Collector. This virtual flow collector appliance enables application layer traffic monitoring and security intelligence in a virtual infrastructure. Available Extreme Networks SIEM solution components include:
• SIEM Base Appliance
• Flow Anomaly Processor
• Event Processor
• Network Behavioral Flow Sensors
• Virtual Flow Collector
• SIEM Console Manager
Event collection and management:
• Goes beyond traditional security information and event managers and network behavioral analysis products to deliver threat management, log management, compliance reporting, and increased operational efficiency
• Collects and combines network activity data, security events, logs, vulnerability data, and external threat data into a powerful management dashboard that intelligently correlates, normalizes, and prioritizes greatly improving remediation and response times, and greatly enhancing the effectiveness of IT staff
• Baselines normal network behavior by collecting, analyzing, and aggregating network flows from a broad range of networking and security appliances including JFlow, NetFlow, and SFlow records. It then discerns network traffic patterns that deviate from this norm, flagging potential attacks or vulnerabilities anomalous behavior is captured and reported for correlation and remediation.
• Tracks extensive logging and trend information, and generates a broad range of reports for network security, network optimization, and regulatory compliance purposes; report templates are provided for COBIT, GLB, HIPAA, PCI, and Sarbanes Oxley.
Secure Log Management
Businesses must comply with a wide variety of governmental and trade regulations in order to maintain business operations. Many of these regulations, and industry best practices, require the regular or weekly review of security event logs from appropriate network security tools that can issue alerts as needed. Although compliance with industry mandates is a near consistent top 10 CIO priority, companies also want to strengthen their threat monitoring and existing threat identification intelligence capabilities to help reduce risk, reaction time and response to identified security issues to keep their information and assets safe.FBA Technologies, Chennai & Madurai.C.Noor IbrahimContact no: +91 72007 - 51000, 99401 - 20194
Ad posted 60 days ago SEE LATEST ANNOUNCEMENTS
Report this ad as:
Write review
Leave your comments on this ad
Offensive messages and spam will be removed
You're not sending an SMS, type the entire word without spelling errors

Related ads