Log Security management

Posted on 2011-04-24
Medium Priority
Last Modified: 2016-03-28
Could anyone suggest a product to Log Security management, which will able to be automated collection, analysis, alerting, auditing, reporting and secure storage of all logs.
Question by:ashraf2002
LVL 35

Expert Comment

by:Ernie Beek
ID: 35457190
Looking at what you want, perhaps a combination of splunk and nagios might be interesting: http://www.splunk.com/view/SP-CAAABDJ
LVL 10

Accepted Solution

ujitnos earned 2000 total points
ID: 35457942
On corporate level, use RSA enVision or ArcSight.

Expert Comment

by:Naomi Goldberg
ID: 41464432
You can find real user reviews of all the major log security management solutions at IT Central Station: https://www.itcentralstation.com/categories/security-information-and-event-management-siem

Users interested in this category also read reviews for LogRhythm.  This user writes, "We have made this the foundation of our security intelligence within our organization. It has allows us to detect and remediate Advanced Persistent Threats." You can read the full user review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-34255-by-srmgrnwkops481.

Hope you find this helpful!

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question