Analytics

9/2/2009
05:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LogLogic Simplifies Security Change Management

LogLogic Security Change Manager 8.1 automates processes and allows security, network, and IT operations teams to collaborate more closely

SAN JOSE, Calif. — September 1, 2009 — LogLogic', the log and security management leader, today announced general availability of the latest release of its LogLogic Security Change Manager appliance that integrates easily with SEM solutions from LogLogic or other vendors as well as third-party CRM and ticketing solutions. LogLogic's unique multi-vendor solution leads the industry's move towards consolidating security event and change management giving customers better security through improved IT infrastructure visibility and control across collaborating teams.

LogLogic's Security Change Manager is designed to benefit medium to large enterprises, MSSP, ISP and service providers who need to automate security policy management and change management across large or complex networks of routers, firewalls, switches, VPNs and IPSs in homogenous or heterogeneous vendor environments, including Checkpoint, Cisco, Fortinet and Juniper. A single console can automate the design and implementation of rules for large networks or small networks with complex policies and frequent changes.

"While it is good to identify security incidents using correlation of LogLogic Security Event Manager, it is even better to respond to security incidents and prevent future attacks by rolling out firewall policy changes through pre-defined response plans with LogLogic Security Change Manager," said Dominique Levin, EVP of Marketing and Strategy, LogLogic. " We're focused on giving our customers better visibility and control. Research shows that organizations experience more security breaches because of manual errors in routine daily networking management tasks than from any external threat. Automation not only saves time and money, but also eliminates manual errors."

LogLogic Security Change Manager automates the often time-consuming and error-prone manual process of designing and generating network security rule changes. It takes advantage of a unique high-level, policy-based approach with an advanced drag-and-drop topology interface that automatically orders, optimizes and pushes the rules to the devices affected by the rule change.

According to Forrester Research's July 2009 report titled "TechRadar For Security & Risk Professionals: Network Threat Mitigation, Q3 2009": "PCI DSS Requirement 1.1.6 mandates that firewall and router configurations be reviewed at least every six months. Many companies are unable to meet this compliance requirement without automating the task.

Companies dinged by auditors will provide the first push in the acceptance of these tools. Ultimately, Forrester anticipates a nearly ubiquitous adoption of this technology in some form, as nearly every organization has firewalls that will need to be audited."

The latest release of LogLogic Security Change Manager simplifies and improves email notification integration with any third party CRM or ticketing solution, enabling visibility to multi-tiered approval, change request approval and deployment status. According to Forrester Research's July 2009 report titled "Market Overview: Firewall Auditing Tools": "With its acquisition of Exaprotect, LogLogic is the first vendor to directly tie firewall auditing capability into its SIM technology. LogLogic has fully integrated LogLogic [Security] Change Manager (formerly Exaprotect's Solsoft ChangeManager) with LogLogic Open Log Management Platform to provide an overall network and security device management tool."

For example, customers can create pre-built response plans that would allow them with a single click to deploy new firewall rules when a threat such as unauthorized FTP traffic is detected. LogLogic customers use Security Change Manager to automate configurations on networks large and small:

  • AT&T relies on LogLogic Security Change Manager to run more than 3,200 firewalls from one single server.
  • Verizon Wireless took advantage of a flexible API to automate its IP blacklist to write new rule sets for 10,000 IP addresses in under 15 minutes.
  • The United States Postal Service slashed the time required to manage constant daily updates to network devices by 73 percent.

    LogLogic Security Change Manager 8.1 is available today with entry-level pricing starting at $35,000. For more information visit www.loglogic.com/products/security-change-management/

    About LogLogic LogLogic' (www.loglogic.com) is the leader in log and security management solutions. Supported by more than 200 partners and trusted by more than 1,000 customers worldwide, LogLogic solutions provide visibility and control to any IT infrastructure so that organizations can significantly improve security, compliance and network performance. LogLogic's open log management platform enables customers to collect, search and store massive amounts of IT log data from a myriad list of devices and applications for a comprehensive fingerprint of past and current activity, through one convenient, easy-to-use web-based user console. LogLogic's business applications correlate user activities and event data in real-time for a uniquely integrated approach to security event management, database security management, security change management and compliance management, resulting in improved accountability and lower costs for organizations of all sizes.

    Check out LogLogic products at www.loglogic.com/logpower and follow LogLogic on Twitter at www.twitter.com/loglogic.

    Media Contact Ray George Page One PR, for LogLogic Tel: +1.415.321.2344

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Russia Hacked Clinton's Computers Five Hours After Trump's Call
    Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
    Tips for the Aftermath of a Cyberattack
    Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
    Why We Need a 'Cleaner Internet'
    Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    5 Emerging Cyber Threats to Watch for in 2019
    Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-11486
    PUBLISHED: 2019-04-23
    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
    CVE-2019-11487
    PUBLISHED: 2019-04-23
    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hu...
    CVE-2018-7576
    PUBLISHED: 2019-04-23
    Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
    CVE-2018-8825
    PUBLISHED: 2019-04-23
    Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute arbitrary code (local).
    CVE-2019-10688
    PUBLISHED: 2019-04-23
    VVX products using UCS software version 5.8.0 and earlier with Better Together over Ethernet Connector (BToE) application version 3.8.0 and earlier uses hard-coded credentials to establish a connection between the host application and device.