Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/24/2009
10:06 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Prism Microsystems Unveils Free, Full-Featured Log Search

EventTracker PULSE delivers in-depth IT intelligence to optimize operations, improve service delivery levels, accelerate troubleshooting, and simplify security forensic investigations

Columbia MD, Feb 23rd 2009 - Prism Microsystems, providers of comprehensive Security Information and Event Log Management (SIEM) technology, today announced the availability of EventTracker PULSE, a smart search-engine for log data that provides system administrators with valuable, network-wide insight for optimizing IT performance, improving availability and accelerating forensic investigations.

Available immediately as a free software download from http://pulse.prismmicrosys.com , EventTracker PULSE automates the real-time collection and long term archival of all log data from Windows (servers and workstations), Unix/Linux, Cisco devices, applications and any syslog source. A Google-like interface provides fast and easy searching across hundreds of gigabytes of data, allowing users to pinpoint critical data in a matter of seconds. The benefits of Log Search are limitless for operations and security. For instance, users can quickly identify root cause of service degradations or IT failures for remediation, or in the event of an internal breach, pinpoint who did what and when and plug security holes.

"Logs offer the potential to provide deep understanding on most aspects of IT, however, manually extracting actionable intelligence from voluminous, distributed and cryptic log data is impossible without system specific technical knowledge and large amounts of time to spare," said Steve Lafferty, VP of Marketing at Prism Microsystems. "EventTracker PULSE puts this information right into the hands of system administrators and empowers them to easily investigate activity across the IT infrastructure. The value in terms of time and cost savings alone is tremendous."

Unlike other free log search solutions, EventTracker PULSE is not a size limited version of an enterprise product. It offers multiple innovations to ease the search process including:

No limit on collection and archival of log data Real-time collection from Windows (servers and workstations), Unix/Linux, Cisco devices, applications and any syslog source Compressed (>90%), secure (SHA1) storage of collected log data Easy to use Google-like interface with options for free-form searching using keywords, exact phrases, operators, wildcard characters or a combination of all for complex queries Endless refine to extract precise matches from large volumes Hundreds of preconfigured knowledge categories One-click access to the Prism KnowledgeBase for helpful descriptions on over 20,000 events Agent-optional architecture; centralized agent configuration

Screenshots available at:

http://pulse.prismmicrosys.com/images/Pulse_screenshot1.jpg http://pulse.prismmicrosys.com/images/Pulse_screenshot2.jpg http://pulse.prismmicrosys.com/images/Pulse_screenshot3.jpg http://pulse.prismmicrosys.com/images/Pulse_screenshot4.jpg

About Prism Microsystems

Prism Microsystems delivers business-critical solutions to consolidate, correlate and detect changes that impact the performance, availability and security of an IT infrastructure. EventTracker, Prism's enterprise Security Information and Event Management (SIEM) solution offers a combination of powerful Log Management (Log Search, Analytics, Correlation, Reporting), Change Monitoring, USB tracking and Automatic Remediation. This high-value turnkey package helps optimize IT operations, defend IT assets from security threats and ensure compliance with multiple regulations. Visit www.prismmicrosys.com for further information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.