Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:00 PM
Dark Reading
Dark Reading
Products and Releases

Alert Logic Introduces ActiveWatch For Alert Logic Log Manager

New managed service debuts.

Houston, TX – October 2, 2014 — Alert Logic (www.alertlogic.com), a leading provider of Security-as-a-Service solutions for the cloud, today announced the availability of Alert Logic ActiveWatch for Log Manager, a managed service that delivers 24×7 analytics and monitoring of a company’s log data, identifying potential security and compliance issues that could impact their organization.

Every day, applications, operating systems, security software, and a host of other technologies are generating vast amounts of log data, both important and mundane. These logs hold the key to keeping a company’s IT infrastructure and business applications secure, enabling them to close compliance gaps and identify system vulnerabilities. The challenge is in being able to pull the critical few pieces of information from the massive amounts of log data that contain normal activity. Without the right tools to find these critical pieces of information, as well as the people who can understand, interpret, and act on them, a company’s IT infrastructure remains at risk.

“Alert Logic ActiveWatch for Log Manager enables businesses to turn daily log data into security intelligence that helps to protect and ensure the compliance of their IT infrastructure,” said Dave Colesante, SVP of Platform & Technology Services for Alert Logic. “By providing up-to-date correlation rules and threat intelligence, relationships between seemingly disparate events in log data can easily be identified. Alert Logic ActiveWatch for Log Manager not only identifies security issues, but also provides businesses with the recommended steps needed to resolve the issue, at a price organizations of any size can afford.”

Alert Logic ActiveWatch for Log Manager contains a correlation rules library that eliminates the complex and challenging job of creating and managing correlation rules. Scenario-based rules are continuously updated and fed into the solution by a specialized team of Alert Logic security and compliance experts. Additionally, the service includes up-to-date, critical threat intelligence and security content creation. With the ever-increasing threat of compromise and breach, it is no longer a viable option to let an organization’s vast amount of log data lay dormant.

“Alert Logic ActiveWatch for Log Manager not only identifies security issues from that valuable log data, but also satisfies the daily log review requirements of PCI DSS 3.0, which makes our service truly dual purpose,” said Colesante.

Built on the award winning Alert Logic Log Manager cloud-based log management solution, the ActiveWatch for Log Manager managed service provides:

  • Dedicated 24×7 security monitoring by certified experts,
  • Incident identification through advanced analytics of log data from a variety of sources, such as network devices, operating systems, applications, and other security products,
  • Up-to-date security intelligence, managed and maintained by Alert Logic,
  • A correlation rules library designed to identify the most common threat vectors and security issues, and
  • Detailed information regarding incident origins, as well as detailed issue resolution recommendations.

“Alert Logic ActiveWatch for Log Manager saves businesses the time and expense of deploying and maintaining a 24×7 security monitoring function in-house, and the large capital expense associated with purchasing and maintaining technologies used to derive actionable intelligence from log data,” said Ben Matheson, Chief Marketing Officer, Alert Logic. “With a pay-as-you-go subscription, businesses can leverage the intervention and expertise of Alert Logic’s compliance and security experts, along with Alert Logic’s market-leading analytics, log management technology and monitoring service.”


Additional Resources Available:
 on Twitter


About Alert Logic

Alert Logic provides security and compliance for cloud, hybrid, and on-premises infrastructure, allowing customers to benefit from deep security insight and continuous protection at a lower cost than legacy security offerings.  Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure is deployed.  Alert Logic partners with the leading cloud platforms and hosting providers to protect over 2,700 organizations worldwide.  Built for cloud scale, our patented platform manages petabytes of data, analyzes over 400 million security events monthly, and identifies more than 50,000 incidents a month that are managed by our security operations team. Alert Logic is based in Houston, Texas, and was founded in 2002.  Alert Logic recently expanded internationally by establishing UK offices in London and Cardiff.  For more information, please visit www.alertlogic.com.


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.