Introducing the WhatsUp Log Management Suite
Use WhatsUp Log Management to automatically collect, store, archive, back-up, analyze and report on Syslog, Windows events logs, or W3C logs generated by Web Application Servers, Load Balancers, Firewalls, Proxy Servers or Content Security appliances. Add Event Log Monitoring to secure your network and protect key information.
With WhatsUp Log Management, you will reduce exposure to security breaches, malware, loss or damage, and protect your organization against costly financial penalties and legal liabilities.
With WhatsUp Log Management Software you can:
Automatically collect, store, archive and backup all log files
- Multi-year data storage
- Cryptographic hashing
|
Use Event Archiver
|
Monitor Windows event & Syslog data in real-time to receive alerts and notifications at the first sign of trouble
|
Use Event Alarm
|
Filter, Analyze and Report on Log Data to verify the success of internal security policies, and demonstrate regulatory compliance
Generate compliance-centric reports for IT personnel, security and compliance officers, and even law enforcement agencies
|
Use Event Analyst
|
Spot check and review log files much faster to quickly respond to an emergency incident
|
Use Event Rover
|
Who should try WhatsUp Log Management Suite?
IT managers, System Administrators, Compliance Officers or Security Personnel: Who would like to protect access to key information - such as employee or patients records, credit card information, or classified information
- Who need to meet and demonstrate compliance with regulations such as SOX, GBLA, PCI, HIPAA, FISMA, MiFID, Basel II and others
- Who would like to be immediately notified of suspicious activity and respond faster to security threats
- Who are looking to eliminate tedious manual log collection tasks, reduce errors and save time
- Who need to keep archived log data for multiple years for compliance or auditing purposes
Benefits of WhatsUp Gold Log Management
Log management should be a key component of your infrastructure management strategy. With a log management solution, you can:
- Track, alert and report on commonly audited event types (e.g. Access and permission changes to Files, Folders, and Objects containing financial, customer or compliance data, object access attempts, login failures, etc) to quickly detect unauthorized activity and security threads.
- Facilitates log file collection, archiving, analysis and reporting to meet regulatory compliance mandates imposed by HIPAA, SOX, FISMA, PCI, MiFID, Basel II and others.
- Automatically watch over log files, immediately sending out alert notifications the moment specific events happen anywhere in the network. With advance warning, you can rapidly initiate investigation and triage processes and block offenders.
- Automate the process of collecting, storing and archiving log files across your infrastructure. You will ensure complete accuracy, and save time and effort eliminating manual log file collection tasks.
- Compliance-centric reporting ensures that vital information is always at hand for regulatory submissions, auditors or security officers, or management queries.
Compliance Regulations
As an IT professional, government contractor or compliance officer, you are responsible for keeping your business applications and infrastructure up and running as well as ensuring that they are secure and protected. Your senior management depends on you to take the necessary steps to meet and report on regulatory compliance standards like:
- PCI DSS (Payment Card Industry – Data Security Standards) guidelines - for businesses that are a merchant or provider organization that handles or stores customer credit card data
- SOX (Sarbanes Oxley) - for US public companies and accounting firms or are becoming part of one through an acquisition or merger
- GLBA (Gramm-Leach-Bliley Act) - for financial institutions, mandating a policy and written information security plan be in place a policy to protect the information from foreseeable threats in security and data integrity
- FISMA (Federal Information Security Management Act) - for Federal agencies or contracting organizations that provide services to the Government
- FERPA (Family Educational Rights and Privacy Act) – for US-based educational institutions to secure access to student records
- NISPOM (National Industrial Security Program Operating Manual) - for organizations that have access to and work with classified data
- HIPAA (Health Insurance Portability and Accountability Act) - for any employer, medical provider and insurance company in the United States, to maintain privacy and security of protected health information
- Basel II Accord - for banking institutions located outside the United States, laying down broad recommendations on how your management needs to maintain operational oversight of all financial applications, data and reporting
- MA Privacy Law - for any employer that does business with Massachusetts residents or has employees residing in Massachusetts, to protect and maintain the privacy of their personal information
- Other examples are:
- FERC - Federal Energy Regulation Commission
- NERC - North American Electric Reliability Corporation
- CIP - Critical Infrastructure Protection
While you know that vital information relating to network security is available in your log files right now, dealing with the volume of data constantly being generated from across your infrastructure is impossible without the right tools.
WhatsUp Gold Compliance Notes
- Awarded the US Army’s Certificate of Networthiness (CoN): Cert #201004611
--Complete confidence that the WhatsUp Gold family meets strict security, sustainability and interoperability requirements
- Document and prove compliance for key compliance initiatives (I.E. HIPAA, SOX, MiFID, etc.) with out-of-the-box, point-and-click reporting
- Protect archived logs via cryptographic hashing (key for evidentiary use)
- Identify unauthorized events immediately (i.e. access to folders containing sensitive data)
- Collect automatically Syslog, Windows Event or W3C/IIS log files across your entire infrastructure
- Store log data as long as you need to -- multi-year data storage capabilities help you comply with key regulations
- Analyze and extract the right information across thousands of log entries
- Report on critical errors or compliance-centric failures right from a WUG dashboard