Perimeter E-Security Offers Hosted Log Management Solution with Simple Pricing Model
Log Management, including Security Information Event Management (SIEM) is considered essential when it comes to IT best practices, and for regulated industries it’s a requirement when it comes to compliance. Log management isn’t very complex in theory, but managing increasingly complex networks, and an ever-growing number of applications and virtual servers, log management can pose a challenge for many organizations.
Perimeter E-Security, a provider of SaaS-based security services, hopes to simplify the log management process with a new SaaS-based Log Management solution that gives organizations a simple way to secure their networks and comply with regulations that require log data to be collected, reviewed, and archived securely.
Offered in a “per-device” pricing model, Perimeter’s log management solution simplifies the costs, and often complex pricing models that come with many log management solutions.
“Every company needs to centralize and monitor their security, server and device logs. It’s a security best practice, and financial regulations and mandates such as PCI-DSS increasingly require it. But today’s log management solutions are hard to buy and complex to deploy. Customers shouldn’t have to figure out ‘events-per-second,’ or use a crystal ball to size their capacity needs,” said Andrew Jaquith, CTO of Perimeter E-Security and a SecurityWeek columnist.
Perimeter’s Log Management solution collects logs from customer devices and infrastructure via a lightweight collector appliance that is centrally managed from the Perimeter’s Security Operations Center. Logs are collected without agents by the appliance and then compressed, encrypted and forwarded to highly secure and redundant data centers for processing and storage. Customers can log into a web portal to perform real-time searches or run easy-to-read reports, such as for audit and compliance purposes, or log events, making collecting and analyzing log data simple and less time consuming.
Perimeter’s Log Management solution includes the following:
• Detects threats and defend networks from security breaches and attacks with a cost-effective SaaS solution
• Reduces hassle and cost of installing traditional and complex security monitoring products
• Perimeter’s Security Operation Center allows security experts to assist organizations in detecting and remediating attacks
• Collects logs across the whole organization and safely stores event logs in Perimeter’s SAS70 Type II data centers
• 7-factor threat scenario modeling allows events to be accurately identified and correlated
• Log Management web portal offers 24/7 access to dynamic reports and flexible search tools for powerful analysis, forensic capabilities, and compliance reports
Perimeter’s Log Management solution adds to the company’s other service offerings, including intrusion detection and vulnerability assessment solutions.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million
- Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan
- Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform
- Watch Now: Cloud & Data Security Summit Sessions
- Watch on Demand: 2023 CISO Forum Sessions
- Virtual Event Today: CISO Forum 2023 – Register to Join
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
Latest News
- Stealthy APT Gelsemium Seen Targeting Southeast Asian Government
- Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role
- 900 US Schools Impacted by MOVEit Hack at National Student Clearinghouse
- City of Dallas Details Ransomware Attack Impact, Costs
- In-the-Wild Exploitation Expected for Critical TeamCity Flaw Allowing Server Takeover
- Predator Spyware Delivered to iOS, Android Devices via Zero-Days, MitM Attacks
- Researchers Discover Attempt to Infect Leading Egyptian Opposition Politician With Predator Spyware
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
