Secure
Data Security
Data Security Platforms produce detailed security event logs that are easy to integrate with Security Information and Event Management (SIEM) systems to produce compliance and security reports. These security information logs produce an auditable trail of permitted and denied access attempts from users and processes, delivering unprecedented insight into file access activities. Logging occurs at the file system level, removing the opportunity of stealthy access to sensitive data. These security information logs can report unusual or improper data access and accelerate the detection of insider threats, hackers and the presence of advanced persistent threats (APT) that are past the perimeter security.
Security Intelligence
Increased visibility — Capture granular logs of all file access attempts that include user, group, process, enacted policy, and attempts by a root user to imitate another user.
SIEM and log collection — Export security information logs in all major log formats: Syslog RFC5424, CEF and LEEF.
SIEM integration — Fast and easy integration of leading SIEM providers with Splunk , analysis with out-of-the-box dashboards and reports.
Compliance and audit reporting — Compliance reporting with consistent logs across Windows, Linux, and Unix servers.