Analytics
5/17/2016
04:34 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

EventTracker Adds Unlimited Acquisition Model for Log Manager

The scalable log management solution is now available in several pricing models.

COLUMBIA, MD – May 16, 2016 -EventTracker, a leading provider of comprehensive and co-managed SIEM solutions, today announced a new unlimited acquisition model for its EventTracker Log Manager offering. Available immediately, customers can now purchase EventTracker Log Manager for an unlimited number of log sources per year.

EventTracker Log Manager is a proven, scalable log management solution that provides network and system administrators with early threat detection, operational awareness and the ability to demonstrate compliance with industry regulations and internal security policies. EventTracker Log Manager allows administrators to monitor systems and components and delivers real-time alerting and in-memory correlation.

Available for installation on premises or in the cloud, the unlimited version of EventTracker Log Manager can process 10,000 events per second and support log collection from thousands of log sources. It contains out-of-the-box reports and alerts for security monitoring and compliance requirements, such as PCI-DSS, HIPAA and ISO27001. Log Manager also has a powerful feature for event filtering that reduces false positives, allowing customers to collect the logs and retain them for forensic purposes.

“Though SIEM and log management solutions are becoming mainstream security products, most of the available options require companies to choose the number of systems they want to monitor at contract engagement. The inherent inflexibility of having to know all of the systems that require monitoring, now and in the future, is a difficult call for many customers that ultimately forces them to implement a SIEM solution on a limited number of systems,” said Jagat Shah, CTO, EventTracker. “EventTracker’s new, unlimited offering of Log Manager removes that barrier, allowing customers to collect logs from a large number of systems and have high data throughput.”

For more information and pricing, visit http://www.eventtracker.com/etlm/

 About EventTracker

EventTracker enables its customers to stop attacks and pass IT audits. EventTracker's award-winning product suite includes EventTracker Security Center and EventTracker Log Manager which transform high-volume, cryptic log data into actionable and prioritized intelligence to optimize IT operations, detect and deter costly security breaches, and comply with multiple regulatory mandates. EventTracker clients include government agencies, commercial enterprises, and the healthcare and financial sectors. 

In addition to best-in-class product features, EventTracker offers SIEM Simplified, a professional services engagement to guarantee successful outcomes. EventTracker's experienced staff assumes as much or as little responsibility for all SIEM-related tasks as clients require including planning, scoping, and installing the implementation, as well as performing run, watch and tune functions of the implementation on each client's behalf. EventTracker's team includes experts in various technologies including Windows, Cisco, VMware, Checkpoint and many security solutions such as Snort, McAfee, Imperva, etc.

As the only SIEM vendor to own both product and service delivery functions, EventTracker’s solutions are tailored to customer need, resulting in superior quality at competitive pricing to the SME market. Visit www.eventtracker.com for more information. Follow us on Twitter @logtalk.

###

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Be a unicorn, not a donkey...
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.