Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:36 AM
Dark Reading
Dark Reading
Products and Releases

SNARE SIEM Server Version 6.0 Includes a Comprehensive Query Builder And Modern Browser User Interface

Allows for custom configuration of agent event log objective-setting and monitoring capabilities

Littleton, CO – March 6, 2013 The newly released Version 6.0 of the SNARE Server brings a range of new functionality and ease of use with simplified navigation, a dynamic point-and-click web browser interface, drag & drop menus, pop-up windows, tabbed pages, and interactive updates. SNARE Server Version 6.0 takes the complexity out of security information and event management (SIEM), while still providing deep configuration and log inspection facilities.

The SNARE Server is used to define, administer and monitor complex security objectives with a simple web interface in an easy-to-use language. The SNARE Server allows for custom configuration of agent event log objective-setting and monitoring capabilities, including: logins/logoffs, password expiration, as well as unauthorized access to computer systems, sensitive files, account privileges and the Internet.

The SNARE Server has the ability to monitor user and system activity on enterprise networks. It can receive event log data directly from a wide variety of operating systems, routers, firewalls, switches, application servers, authentication systems and arbitrary syslog sources. Hardware and software that utilize the industry standard syslog protocol can send log event data directly to the SNARE Server. The SNARE Server can collect from a very wide range of log-producing applications with the assistance of the SNARE and Epilog agents for Windows, Linux, MacOS, Solaris, and other Unix operating systems.

SNARE Server Version 6.0 features include:

Tailored Objectives

User/Group Administration

Agent Configuration and Checking

Agent Remote Control

IOS Access Controls

Click-Through Detailed Analysis

PIX Firewall Reporting

Network Device Reporting

Email Reporting

The SNARE Server includes over 100 different reports, spread among a wide range of categories, including administrative activity, sensitive file monitoring, user login activity, web proxy access, firewall and router monitoring, user and group checks and many more. Comprehensive reports can be viewed from the web interface interactively and/or automatically emailed to security individuals on a daily, weekly or monthly basis. SNARE Agents for Windows and MS-SQL Agents are available with the SNARE Server or can stand alone and support 3rd party SIEM solutions. To request a trial, documentation or a price quote for the server or agents, go to: www.snarealliance.com/freetrial-pricequote

About SNARE Alliance, LLC

SNARE Alliance is a security software value added sales and service organization and an authorized supplier of SNARE Servers and Enterprise Agents in the United States. SNARE Alliance offers fast and cost effective ways to learn about and purchase SNARE software and support. SNARE software purchased through SNARE Alliance includes an annual maintenance agreement and customer service support. SNARE Alliance is backed by product licensing, software maintenance and second level technical support from Intersect Alliance, the author and architect of SNARE. To learn more, visit: www.snarealliance.com/snare-server

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.