Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

10/15/2014
05:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Alert Logic Introduces ActiveWatch For Alert Logic Log Manager

New managed service debuts.

Houston, TX – October 2, 2014 — Alert Logic (www.alertlogic.com), a leading provider of Security-as-a-Service solutions for the cloud, today announced the availability of Alert Logic ActiveWatch for Log Manager, a managed service that delivers 24×7 analytics and monitoring of a company’s log data, identifying potential security and compliance issues that could impact their organization.

Every day, applications, operating systems, security software, and a host of other technologies are generating vast amounts of log data, both important and mundane. These logs hold the key to keeping a company’s IT infrastructure and business applications secure, enabling them to close compliance gaps and identify system vulnerabilities. The challenge is in being able to pull the critical few pieces of information from the massive amounts of log data that contain normal activity. Without the right tools to find these critical pieces of information, as well as the people who can understand, interpret, and act on them, a company’s IT infrastructure remains at risk.

“Alert Logic ActiveWatch for Log Manager enables businesses to turn daily log data into security intelligence that helps to protect and ensure the compliance of their IT infrastructure,” said Dave Colesante, SVP of Platform & Technology Services for Alert Logic. “By providing up-to-date correlation rules and threat intelligence, relationships between seemingly disparate events in log data can easily be identified. Alert Logic ActiveWatch for Log Manager not only identifies security issues, but also provides businesses with the recommended steps needed to resolve the issue, at a price organizations of any size can afford.”

Alert Logic ActiveWatch for Log Manager contains a correlation rules library that eliminates the complex and challenging job of creating and managing correlation rules. Scenario-based rules are continuously updated and fed into the solution by a specialized team of Alert Logic security and compliance experts. Additionally, the service includes up-to-date, critical threat intelligence and security content creation. With the ever-increasing threat of compromise and breach, it is no longer a viable option to let an organization’s vast amount of log data lay dormant.

“Alert Logic ActiveWatch for Log Manager not only identifies security issues from that valuable log data, but also satisfies the daily log review requirements of PCI DSS 3.0, which makes our service truly dual purpose,” said Colesante.

Built on the award winning Alert Logic Log Manager cloud-based log management solution, the ActiveWatch for Log Manager managed service provides:

  • Dedicated 24×7 security monitoring by certified experts,
  • Incident identification through advanced analytics of log data from a variety of sources, such as network devices, operating systems, applications, and other security products,
  • Up-to-date security intelligence, managed and maintained by Alert Logic,
  • A correlation rules library designed to identify the most common threat vectors and security issues, and
  • Detailed information regarding incident origins, as well as detailed issue resolution recommendations.

“Alert Logic ActiveWatch for Log Manager saves businesses the time and expense of deploying and maintaining a 24×7 security monitoring function in-house, and the large capital expense associated with purchasing and maintaining technologies used to derive actionable intelligence from log data,” said Ben Matheson, Chief Marketing Officer, Alert Logic. “With a pay-as-you-go subscription, businesses can leverage the intervention and expertise of Alert Logic’s compliance and security experts, along with Alert Logic’s market-leading analytics, log management technology and monitoring service.”

 

Additional Resources Available:
Blog
@alertlogic
 on Twitter
LinkedIn

 

About Alert Logic

Alert Logic provides security and compliance for cloud, hybrid, and on-premises infrastructure, allowing customers to benefit from deep security insight and continuous protection at a lower cost than legacy security offerings.  Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure is deployed.  Alert Logic partners with the leading cloud platforms and hosting providers to protect over 2,700 organizations worldwide.  Built for cloud scale, our patented platform manages petabytes of data, analyzes over 400 million security events monthly, and identifies more than 50,000 incidents a month that are managed by our security operations team. Alert Logic is based in Houston, Texas, and was founded in 2002.  Alert Logic recently expanded internationally by establishing UK offices in London and Cardiff.  For more information, please visit www.alertlogic.com.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16531
PUBLISHED: 2019-09-20
LayerBB before 1.1.4 has multiple CSRF issues, as demonstrated by changing the System Settings via admin/general.php.
CVE-2019-9717
PUBLISHED: 2019-09-19
In Libav 12.3, a denial of service in the subtitle decoder allows attackers to hog the CPU via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c has a complex format argument to sscanf.
CVE-2019-9719
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-9720
PUBLISHED: 2019-09-19
A stack-based buffer overflow in the subtitle decoder in Libav 12.3 allows attackers to corrupt the stack via a crafted video file in Matroska format, because srt_to_ass in libavcodec/srtdec.c misuses snprintf.
CVE-2019-16525
PUBLISHED: 2019-09-19
An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code.