Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:36 AM
Dark Reading
Dark Reading
Products and Releases

SNARE SIEM Server Version 6.0 Includes a Comprehensive Query Builder And Modern Browser User Interface

Allows for custom configuration of agent event log objective-setting and monitoring capabilities

Littleton, CO – March 6, 2013 The newly released Version 6.0 of the SNARE Server brings a range of new functionality and ease of use with simplified navigation, a dynamic point-and-click web browser interface, drag & drop menus, pop-up windows, tabbed pages, and interactive updates. SNARE Server Version 6.0 takes the complexity out of security information and event management (SIEM), while still providing deep configuration and log inspection facilities.

The SNARE Server is used to define, administer and monitor complex security objectives with a simple web interface in an easy-to-use language. The SNARE Server allows for custom configuration of agent event log objective-setting and monitoring capabilities, including: logins/logoffs, password expiration, as well as unauthorized access to computer systems, sensitive files, account privileges and the Internet.

The SNARE Server has the ability to monitor user and system activity on enterprise networks. It can receive event log data directly from a wide variety of operating systems, routers, firewalls, switches, application servers, authentication systems and arbitrary syslog sources. Hardware and software that utilize the industry standard syslog protocol can send log event data directly to the SNARE Server. The SNARE Server can collect from a very wide range of log-producing applications with the assistance of the SNARE and Epilog agents for Windows, Linux, MacOS, Solaris, and other Unix operating systems.

SNARE Server Version 6.0 features include:

Tailored Objectives

User/Group Administration

Agent Configuration and Checking

Agent Remote Control

IOS Access Controls

Click-Through Detailed Analysis

PIX Firewall Reporting

Network Device Reporting

Email Reporting

The SNARE Server includes over 100 different reports, spread among a wide range of categories, including administrative activity, sensitive file monitoring, user login activity, web proxy access, firewall and router monitoring, user and group checks and many more. Comprehensive reports can be viewed from the web interface interactively and/or automatically emailed to security individuals on a daily, weekly or monthly basis. SNARE Agents for Windows and MS-SQL Agents are available with the SNARE Server or can stand alone and support 3rd party SIEM solutions. To request a trial, documentation or a price quote for the server or agents, go to: www.snarealliance.com/freetrial-pricequote

About SNARE Alliance, LLC

SNARE Alliance is a security software value added sales and service organization and an authorized supplier of SNARE Servers and Enterprise Agents in the United States. SNARE Alliance offers fast and cost effective ways to learn about and purchase SNARE software and support. SNARE software purchased through SNARE Alliance includes an annual maintenance agreement and customer service support. SNARE Alliance is backed by product licensing, software maintenance and second level technical support from Intersect Alliance, the author and architect of SNARE. To learn more, visit: www.snarealliance.com/snare-server

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "This is the last time we hire Game of Thrones Security"
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-09
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
PUBLISHED: 2019-12-09
SQL injection vulnerability in Accentis Content Resource Management System before the October 2015 patch allows remote attackers to execute arbitrary SQL commands via the SIDX parameter.
PUBLISHED: 2019-12-09
Cross-site scripting (XSS) vulnerability in Accentis Content Resource Management System before October 2015 patch allows remote attackers to inject arbitrary web script or HTML via the ctl00$cph_content$_uig_formState parameter.
PUBLISHED: 2019-12-09
Stack-based buffer overflow in the m2m1shot_compat_ioctl32 function in the Samsung m2m1shot driver framework, as used in Samsung S6 Edge, allows local users to have unspecified impact via a large data.buf_out.num_planes value in an ioctl call.
PUBLISHED: 2019-12-09
Off-by-one error in the readBuf function in listener.cpp in libcapsinetwork and monopd before 0.9.8, allows remote attackers to cause a denial of service (crash) via a long line.