?
Solved

Does Kiwi Syslog analyze and store logs?

Posted on 2013-06-25
3
Medium Priority
?
659 Views
Last Modified: 2013-12-07
Hello Everyone,

Does the Kiwi Syslog (enterprise) analyze data? Will I have to purchase different software to store and analyze my logs. I would like to run reports as well. I have looked online and I see that you can us SQL with the enterprise software but I am not sure if that is all that I will need.

Thanks in advance for your help
0
Comment
Question by:IT_Sherri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 83

Expert Comment

by:David Johnson, CD, MVP
ID: 39277346
It appears to at least from the product info page.
http://www.kiwisyslog.com/products/kiwi-syslog-server/product-features.aspx

grab the trial and see if it fits your liking.
0
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 39277881
kiwi syslog really start off as a collection repository centrally. it has tool like log viewer for log viewing and perform the search but it is all driven by analyst themselves.  With Solarwinds Log and Event Mgr (LEM), that gives the analysis capability. The point is more from the SIEM perspective if log is collected and send over to SIEM to further digest and flagged alerts.

Gartner has a good paper on SIEM capability and use case, this include Solarwind. Primarily looking into area below.
-real time monitoring,
-threat intelligence,
-behaviour profiling,
-data and user monitoring,
-application monitoring,
-analytics,
-log mgmt and reporting
-deployment/support simplicity  
-use cases

Excerpt for Solarwind -

Log management and reporting: Log management capabilities are provided. Users indicate that predefined reports are very close to what is needed for compliance reporting, and that, when light customization is needed, it is easy to accomplish.

Deployment and support simplicity: SolarWinds provides technology that is well-suited to its target market, requiring only light customization through easy-to-use interfaces. SolarWinds does not provide on-site implementation support services to its customers, but is working to certify deployment service partners on SolarWinds LEM.

Use cases: SolarWinds LEM is well-suited to smaller enterprises that require effective threat monitoring and compliance reporting, with a technology that is easy to deploy and maintain. There is an especially good fit for small organizations that also need endpoint control functions.

http://new.dss.lv/f/Critical_Capabilities_for_Security_Information_and_Event_Management_-_2013_Q1Labs_IBM_Security_Systems.pdf
0
 

Author Comment

by:IT_Sherri
ID: 39278401
Thank you very much for the insight and a starting point to finding the software that I actually need
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I don't pretend to be an expert at this, but I have found a few things that are useful. I hope that sharing them here will help others, so they will not have to face some rather hard choices. Since I felt this to be a topic of enough importance and…
Check out what's been happening in the Experts Exchange community.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question