McAfee Enterprise Log Manager

McAfee Enterprise Log Manager

Archiviazione, conservazione e gestione dei log

Agisci:
  • Contatta McAfee
    Pronto a fare un acquisto o vuoi chiarire dei dubbi prima di acquistare? Contatta un esperto McAfee. Disponibile dal lunedì al venerdì. Disponibile solo in inglese.
  • Trova un rivenditore
  • Contattaci
  • Telefonare: 00800 122 55624

Panoramica

McAfee Enterprise Log Manager consente la gestione automatizzata e l'analisi di log di ogni tipo, come i log di Windows Event, Database, Application e i Syslog. I log sono firmati e validati per garantire autenticità e integrità — un requisito per la conformità alla normativa. I set predefiniti di regole per la conformità e la reportistica semplificano la dimostrazione del rispetto della compliance e dell'attivazione delle policy da parte dell'azienda.

Utilizzando questo ambiente profondamente integrato di archiviazione, gestione e analisi dei log è possibile potenziare la propria sicurezza e incrementare in modo definitivo la capacità dell'azienda di rispondere alla conformità di più di 240 standard come PCI DSS, HIPAA/HITECH, NERC-CIP, FISMA, GLBA e SOX.

Gestione intelligente dei log — Enterprise Log Manager registra i log in modo intelligente, archiviando i log corretti per la conformità e analizzandoli per la sicurezza. Si possono conservare i log nel loro formato per tutto il tempo richiesto dalle esigenze specifiche di conformità. Finché i file di log non sono modificati, McAfee rispetta la chain of custody e l'impegno di non-repudiation.

Integrazione con Enterprise Security Manager — Enterprise Log Manager è una componente integrata e opzionale di McAfee Enterprise Security Manager. Una volta che Enterprise Log Manager ha archiviato i log, possono essere analizzati in profondità e normalizzati da Enterprise Security Manager. I dati di log sono resi immediatamente disponibili per effettuare controlli di sicurezza in tempo reale e per fornire risposte in caso di incidente.

Caratteristiche e vantaggi

Consente di rispettare i requisiti di conformità della conservazione dei log

Permette di archiviare e validare ogni tipo di log nel suo formato originale per tutto il tempo necessario alle esigenze di conformità richieste.

L'archiviazione e la conservazione si può adattare a seconda della source del log

Mette a disposizione pool di storage personalizzabili per assicurare che i log siano archiviati correttamente e per il periodo di tempo consentito.

Consente di analizzare e ricercare i log in modo efficace e appropriato

I log archiviati per rispetto della conformità possono essere differenziati dai log da analizzare per motivi di sicurezza.

I log possono essere archiviati in locale o su una SAN gestita

Sono disponibili opzioni di storage per ogni esigenza, fino a 7.5 TB di HDD utilizzabile sulle appliance, e fiber channel card opzionali per SAN ad alta velocità.

Permette di integrare la gestione dei log con la definizione del contesto

Con un clic è possibile accedere ai file del log originali e al record del log specifico da ogni punto durante il processo di gestione degli eventi.

Permette di sfruttare i casi di utilizzo

Gestione dei log e funzionalità di conservazione utili a supportare casi di utilizzo di livello avanzato, tra cui:

  • Impostazione e automatizzazione della registrazione dei dati e dei log secondo conformità
  • Definizione dell'impossibilità di rifiuto dell'evidenza
  • Impostazione di un registro di verifica per attività di amministrazione
  • Impostazione di un registro di verifica per attività e modifiche degli account degli utenti
  • Impostazione di reportistica automatica

Requisiti di sistema

Specifiche hardware ELM-6000 ELM-5600 ELM-4600
Frequenza di acquisizione 75,000 eventi al secondo 50.000 eventi al secondo 40.000 eventi al secondo
Prestazioni in attività analitiche 14 TB 8 TB 3 TB

Demo / Tutorial

Demo

Built for big security data, McAfee Global Threat Intelligence for McAfee Enterprise Security Manager (ESM) puts the power of McAfee Labs directly into the security monitoring flow using McAfee’s high-speed, highly intelligent security information and event management (SIEM) solution.

Premi / Recensioni

Gartner
McAfee è stata posizionata come leader da Gartner nel Quadrante Magico per SIEM grazie alla completezza della visione e alla capacità di esecuzione

Il mercato della gestione di eventi e informazioni sulla sicurezza (Security Information and Event Management, SIEM) è definito dall'esigenza del cliente di analizzare in tempo reale i dati degli eventi legati alla sicurezza al fine di gestire le minacce interne ed esterne e dalla necessità di raccogliere, archiviare, analizzare i dati dei log e creare rapporti ai fini di analisi approfondita e di conformità alle normative. I produttori che sono compresi nell'analisi di Gartner dispongono di tecnologie progettate per questo scopo, che promuovono e vendono attivamente agli uffici acquisti dei reparti della sicurezza.

Casi cliente

McAfee (English)

McAfee integrates NitroSecurity products into its portfolio, improving its SIEM offering.

In primo piano
  • Significantly shortens time to analyze security events from four to six days to less than 10 minutes
  • Decreases time to produce PCI compliance reports from eight to 12 hours to 10 minutes
  • Saves administrative time and manual maintenance while eliminating unnecessary activities
  • Facilitates disaster recovery and allows for proper use of virtual machines
  • Improves the organization’s overall security posture in the industry

Novità / Eventi

Risorse

Blueprint tecnologici

Optimize Log Management (English)

Deployment of McAfee Enterprise Security Manager and Enterprise Log Manager addresses the need for secure log collection, transport, handling, and storage, permitting your organization to prove non-repudiation and chain of custody of log records. Adding in McAfee Integrity Control ensures that the native log files being generated are a true and accurate record, preventing malicious users from interfering with the log generation process.

Achieve Situational Awareness (English)

The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.

Brochure

Focus on 5 - Threat Intelligence SIEM Requirements (English)

McAfee spoke with customers about integrating SIEM with Threat Intelligence and how it helped their effort to mitigate bad actors.

Focus on 5 - SIEM Requirements (English)

Learn about the top five issues with SIEM: Big Security Data, Content and User Awareness, Dynamic Context, Solution Customization, and Business Value.

Panoramiche sulle soluzioni

Set the Standard for a Vastly Improved Security Posture (English)

Learn how McAfee IT uses the McAfee SIEM with other McAfee products to provide the highest level of visibility and situational awareness to protect critical information and infrastructure, achieve PCI compliance, and leverage virtual machines in the McAfee security infrastructure.

Endpoint Aware SIEM (English)

When there are indications that an attack may have occurred, security analysts require immediate visibility into the state of systems. McAfee Enterprise Security Manager seamlessly integrates with McAfee Real Time to gather system state continuously, introducing unprecedented situational awareness.

Rapporti

SIEM: Keeping Pace with Big Security Data (English)

How Intelligent and scalable SIEM solutions help IT security professionals stay on top of an ever-evolving, data-driven environment. A report from McAfee and CIO.

Security Management 2.0—Time to Replace Your SIEM? (English)

This report takes a candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Pike Pulse Report: Smart Grid Cyber Security Governance, Risk Management, and Compliance (English)

This Pike Pulse report presents an analysis of the current governance, risk management, and compliance (GRC) vendors that are believed to be the best positioned for the future. McAfee scores the highest in assessment of GRC vendors for smart grid security.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM (English)

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]

Schede tecniche

McAfee Collector Plug-in (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Enterprise Log Manager

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

White paper

Security Management 2.5 – Replacing Your SIEM Yet? (English)

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2 (English)

Read SANS review of McAfee’s Enterprise Security Manager (ESM) 9.2 with a focus on fundamental SIEM features and capabilities to meet the demand for security and threat intelligence.

Security Information and Event Management (English)

McAfee EDB data management technology handles all of these SIEM/logging requirements. It is designed, implemented, maintained, and tested by our world-class in-house development team to meet the demanding requirements of SIEM/logging and leverage all of the capabilities of appropriate emerging technologies such as modern operating systems, multicore CPUs, solid state and RAM drives, and large amounts of main memory.

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation (English)

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Pike Research: Monitoring and Securing SCADA Networks (English)

This white paper examines cyber security issues for industrial control systems with a specific focus on security event monitoring as it applies to industrial control networks such as SCADA.

Need for Speed: Streamlining Response and Reaction to Attacks (English)

Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.

Log Management—The Foundation for Federal Security and Compliance (English)

In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support of an organization’s applicable and prospective security and compliance programs and initiatives.

La sfida dei Big Data della sicurezza

Questo documento discute della sfida posta dai Big Data e pone l'accento sui principali criteri che le aziende devono prendere in considerazione per elaborare le informazioni relative alla sicurezza alla luce dell'odierno panorama dinamico delle minacce.

Continuous Compliance: Is It a Reality? (English)

In this paper, we explore the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Comunità

Blog

  • Top 10 Reasons to Upgrade to ePO 5.1
    McAfee Enterprise - aprile 15, 2014

    Enterprises today are fighting an uphill battle when it comes to security. While there is a proliferation of security management and reporting tools available, the lack of integration and visibility can add more complexity and snags rather than less. Working between multiple security systems diverts attention from other tasks in addition to costing money and […]

    The post Top 10 Reasons to Upgrade to ePO 5.1 appeared first on McAfee.

  • Securing the Internet of Things with McAfee
    McAfee Enterprise - aprile 11, 2014

    With Google Glass, FitBit, smart cars, smart televisions, and more, it seems like the world is getting closer to the reality of the Internet of Things. In fact, according to IDC, the installed base of the Internet of Things will be approximately 212 billion “things” worldwide by 2020. Whether it’s wearable technology, household items, transportation […]

    The post Securing the Internet of Things with McAfee appeared first on McAfee.

  • Keeping Domain Controllers Safe
    Swaroop Sayeram - aprile 10, 2014

      I came across an excellent book titled, Assessing Network Security. It’s written by three Microsoft security researchers who understand Domain Controllers (DCs) inside out. I found it quite insightful and I strongly recommend it if you are in charge of IT Security. They describe DC security with a single sentence – “Defending the keys to […]

    The post Keeping Domain Controllers Safe appeared first on McAfee.

  • Microsoft Patch Tuesday: April 2014
    Doug Neuman - aprile 9, 2014

    Hello Everyone, For April’s edition of Patch Tuesday, we are presenting the final patches for the beloved Windows XP. Those of you still running Windows XP systems in your environment are highly recommended to speak with your McAfee sales team about Application Control. Application Control can provide your EOL systems protection against an unpatched vulnerability. […]

    The post Microsoft Patch Tuesday: April 2014 appeared first on McAfee.

  • Intel and McAfee Join Forces, Dazzle at Intel Security Innovation Summit
    Ken Kartsen - aprile 8, 2014

    Wow, what an incredible week we just wrapped up. In case you missed it, April 2nd was the Intel Security Through Innovation Summit, produced by FedScoop. We could not have been more thrilled with the outcome. Nearly 1,000 attendees came, including federal government and enterprise customers, McAfee and Intel personnel, partner companies and other DC-based […]

    The post Intel and McAfee Join Forces, Dazzle at Intel Security Innovation Summit appeared first on McAfee.

Minacce e rischi correlati