Security Information & Event Management Blog | SIEM

Rounding out your SIEM Strategy with SNMP

Posted by Tony Perri on Dec 12, 2011 11:09:00 AM

MIB and SNMP traps have traditionally been used to track system health, performance and availability, but these network management tools are now finding their way into Information Security applications. Some security software vendors are now using a combination of SNMP and syslog data to identify potential security threats, linking their event management capability to take corrective action to isolate the security threats.

Read More

Topics: collect log data, end-user performance and availability, managing corporate IT security and compliance

6 Log Management Questions to Ask this Holiday Shopping Season

Posted by Tony Perri on Oct 5, 2011 10:17:00 PM

Recently, one of our customers reported that they are running upwards of 200 million messages per day through the CorreLog Enterprise Server – and this is just from the IBM z/OS mainframe!  The closer we get to December 25, the more that number will balloon upwards.  Collecting all of this data is certainly a necessity for compliance standards, forensic analysis and managing end-user performance and availability.  But how can they possible make sense of all the data filing through every minute? 

Read More

Topics: compliance standards, automated threat detection, collect log data, PCI DSS compliance, Log Management, security threat, enterprise SIEM system, end-user performance and availability, managing corporate IT security and compliance, indexing and storing data

Subscribe via Email

Connect with CorreLog