SNARE SIEM 6.1.0 Released With Event Log Agent Management ConsoleSNARE SIEM 6.1.0 Released With Event Log Agent Management Console
SNARE's Agent Management Console allows users to synchronize the configuration of SNARE Windows Agents from a single point that can simulcast event logs
July 8, 2013
Littleton, CO – July 8, 2013 SNARE Server v6.1.0 release includes many new security and agent management features, including an Agent Management Console.
The Agent Console uses a "cloneable" objectives design that enables the user to pull the configuration from an existing compatible SNARE Enterprise Agent and push it out to other compatible Enterprise Agents, enabling a wider set of agents to be managed under a single objective. Other features include the ability to include specific hosts in the management functionality, regardless of whether they currently report log data to the SNARE Server, and limiting agents by hostname and version filters.
The Agent Management Console allows an IT or network security manager or systems administrator to:
● Pull the current configuration from a SNARE Master Agent to compare against the managed SNARE Enterprise Agent configurations, either by filtering agents that report event logs to the SNARE Server by hostname and/or version, or by specifying non-reporting agents manually by IP or IP range.
● Specify the type of agent to be managed (to ensure configurations aren't corrupted by passing the wrong configuration).
● Establish a schedule to run the configuration check.
● Push the master configuration out to each of the managed agents to sync configurations against the Master Agent.
● Send email alerts when agents are un-contactable and/or have a different configuration.
Other new features of SNARE Server v 6.1.0
●New Correlation - Multi-Table Search Objective
●TCP HTTP Collection Server for browser-based agent support.
●New Web Browser Agent Objectives for Firefox and Chrome.
●Updated Account Flags Objective to support finer control over the flag filtering options.
●SNMP Trap Collection
●Sophos Web Log Event support.
●SonicWall SSL VPN Log Event support.
●New Threshold Output Module
For more information, a free trial or a price quote go to: http://www.snarealliance.com/free-trial, call 720-209-3780 or email [email protected].
About SNARE Alliance, LLC: SNARE Alliance is a security software value added sales and service organization and an authorized supplier of SNARE Servers and Enterprise Agents in the United States. SNARE Alliance offers fast and cost effective ways to learn about and purchase SNARE software and support, including an online shopping cart. SNARE software purchased through SNARE Alliance includes an annual maintenance agreement and customer service support. SNARE Alliance is backed by product licensing, software maintenance and second level technical support from Intersect Alliance, the author and architect of SNARE. To learn more, visit: www.snarealliance.com/
About Intersect Alliance International Pty.: Intersect Alliance is a team of leading information technology security specialists. In particular, Intersect Alliance are noted leaders in key aspects of IT Security, including host intrusion detection. IA solutions have and continue to be used in the most sensitive areas of Government and business sectors. The Intersect Alliance business strategy includes demonstrating a commitment and expertise in IT security by releasing open source products such as SNARE, and the proprietary SNARE Server and SNARE Enterprise Agent. Intersect Alliance intend to continue to release tools that enable users, administrators and clients worldwide to achieve a greater level of productivity and effectiveness in the area of IT Security, by simplifying, abstracting and/or solving complex security problems.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper