Solved

Does Kiwi Syslog analyze and store logs?

Posted on 2013-06-25
3
651 Views
Last Modified: 2013-12-07
Hello Everyone,

Does the Kiwi Syslog (enterprise) analyze data? Will I have to purchase different software to store and analyze my logs. I would like to run reports as well. I have looked online and I see that you can us SQL with the enterprise software but I am not sure if that is all that I will need.

Thanks in advance for your help
0
Comment
Question by:IT_Sherri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 80

Expert Comment

by:David Johnson, CD, MVP
ID: 39277346
It appears to at least from the product info page.
http://www.kiwisyslog.com/products/kiwi-syslog-server/product-features.aspx

grab the trial and see if it fits your liking.
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39277881
kiwi syslog really start off as a collection repository centrally. it has tool like log viewer for log viewing and perform the search but it is all driven by analyst themselves.  With Solarwinds Log and Event Mgr (LEM), that gives the analysis capability. The point is more from the SIEM perspective if log is collected and send over to SIEM to further digest and flagged alerts.

Gartner has a good paper on SIEM capability and use case, this include Solarwind. Primarily looking into area below.
-real time monitoring,
-threat intelligence,
-behaviour profiling,
-data and user monitoring,
-application monitoring,
-analytics,
-log mgmt and reporting
-deployment/support simplicity  
-use cases

Excerpt for Solarwind -

Log management and reporting: Log management capabilities are provided. Users indicate that predefined reports are very close to what is needed for compliance reporting, and that, when light customization is needed, it is easy to accomplish.

Deployment and support simplicity: SolarWinds provides technology that is well-suited to its target market, requiring only light customization through easy-to-use interfaces. SolarWinds does not provide on-site implementation support services to its customers, but is working to certify deployment service partners on SolarWinds LEM.

Use cases: SolarWinds LEM is well-suited to smaller enterprises that require effective threat monitoring and compliance reporting, with a technology that is easy to deploy and maintain. There is an especially good fit for small organizations that also need endpoint control functions.

http://new.dss.lv/f/Critical_Capabilities_for_Security_Information_and_Event_Management_-_2013_Q1Labs_IBM_Security_Systems.pdf
0
 

Author Comment

by:IT_Sherri
ID: 39278401
Thank you very much for the insight and a starting point to finding the software that I actually need
0

Featured Post

Register Today - IoT Current and Future Threats

Are you prepared to protect your organization from current and future IoT Threats?  Join our Wi-Fi expert in episode three of our webinar series for a look at the current state of Wi-Fi IoT and what may lie ahead. Register for our live webinar on April 20th at 9 am PDT!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question