Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Perimeter E-Security Launches Hosted Log Management Solution

Perimeter E-Security Offers Hosted Log Management Solution with Simple Pricing Model

Log Management, including Security Information Event Management (SIEM) is considered essential when it comes to IT best practices, and for regulated industries it’s a requirement when it comes to compliance. Log management isn’t very complex in theory, but managing increasingly complex networks, and an ever-growing number of applications and virtual servers, log management can pose a challenge for many organizations.

Perimeter E-Security Offers Hosted Log Management Solution with Simple Pricing Model

Log Management, including Security Information Event Management (SIEM) is considered essential when it comes to IT best practices, and for regulated industries it’s a requirement when it comes to compliance. Log management isn’t very complex in theory, but managing increasingly complex networks, and an ever-growing number of applications and virtual servers, log management can pose a challenge for many organizations.

Perimeter E-Security, a provider of SaaS-based security services, hopes to simplify the log management process with a new SaaS-based Log Management solution that gives organizations a simple way to secure their networks and comply with regulations that require log data to be collected, reviewed, and archived securely.

Perimeter E-Security LogoOffered in a “per-device” pricing model, Perimeter’s log management solution simplifies the costs, and often complex pricing models that come with many log management solutions.

“Every company needs to centralize and monitor their security, server and device logs. It’s a security best practice, and financial regulations and mandates such as PCI-DSS increasingly require it. But today’s log management solutions are hard to buy and complex to deploy. Customers shouldn’t have to figure out ‘events-per-second,’ or use a crystal ball to size their capacity needs,” said Andrew Jaquith, CTO of Perimeter E-Security and a SecurityWeek columnist.

Perimeter’s Log Management solution collects logs from customer devices and infrastructure via a lightweight collector appliance that is centrally managed from the Perimeter’s Security Operations Center. Logs are collected without agents by the appliance and then compressed, encrypted and forwarded to highly secure and redundant data centers for processing and storage. Customers can log into a web portal to perform real-time searches or run easy-to-read reports, such as for audit and compliance purposes, or log events, making collecting and analyzing log data simple and less time consuming.

Perimeter’s Log Management solution includes the following:

• Detects threats and defend networks from security breaches and attacks with a cost-effective SaaS solution

• Reduces hassle and cost of installing traditional and complex security monitoring products

Advertisement. Scroll to continue reading.

• Perimeter’s Security Operation Center allows security experts to assist organizations in detecting and remediating attacks

• Collects logs across the whole organization and safely stores event logs in Perimeter’s SAS70 Type II data centers

• 7-factor threat scenario modeling allows events to be accurately identified and correlated

• Log Management web portal offers 24/7 access to dynamic reports and flexible search tools for powerful analysis, forensic capabilities, and compliance reports

Perimeter’s Log Management solution adds to the company’s other service offerings, including intrusion detection and vulnerability assessment solutions.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Ex-NSA chief Paul Nakasone has been appointed founding director of the Institute for National Defense and Global Security at Vanderbilt University.

Garo Doudian has joined NextGen Healthcare as Chief Information and Security Officer (CIO/CISO).

Denmark-based cybersecurity solutions firm Heimdal announced the appointment of Jesper Frederiksen as its new CEO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...