About Us | Contact Us
View Cart

By Vigilize | Monday, January 1, 2007 - Leave a Comment

Our system provides Real-Time Log Monitoring  along with an intuitive Information Systems Activity Review.

Real Time Monitoring:  millions of logs are consolidated and run through into a system that looks for that needle in the haystack that, if present, requires immediate attention.  Our data security analysts watch the alerts coming from this system in real time, 24x7x365.

Information Systems Activity Review:  You will receive detailed daily reports reviewed by information security data analysts.  This helps you address problems as they occur.  When it’s time for your committee meetings, you will download trend reports to help identify any problems visible over time.

Example of our easy-read Interactive Daily Reports

We consolidate, monitor, report on, and respond in real-time to logs from your servers, firewalls, workstations, active directory, spyware defense, and anti-malware systems, Microsoft Exchange servers, core processors, and on-line banking systems. Any device or application that generates logs in syslog format can be filtered through our system and analyzed.

Visualization:  We can also bring in logs, reports, comma delimited data from any of your authentication systems, from critical applications including Internet Banking systems, Mortgage Origination applications, Core Applications, Teller Applications, etc.  Imagine the implications:  we have a “Put a Watch” capability that allows you to monitor asset-centric and user-centric reports.  The impact of this on “access management” as well as “segregation” will make your auditor smile!  Consider how this system can facilitate your need to perform periodic access reviews.  Imagine watching, in real time, as a terminated employees access is disabled across platforms.  Consider mitigating vendor risk by being able to watch what they do while traversing your network.

Meanwhile, our data security analysts watch your system in real time, and react to emergency events 24x7x365.  Our database allows custom queries as well as queues up correlation opportunities, trend information, troubleshooting reports, etc.

You see only what you need to see, when you need to see it!

Check out our SIEM Datasheet for more detailed information on what the infotex ELM System can do for you!

 


The infotex SIEM System features:

Call us for pricing and a demo:  (800) 466-9939 x808


REFERENCES AND TESTIMONIALS


Related Articles
Latest News
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Over Seven Billion Usernames Have Been Leaked in Breaches Since 2011… An article review. An unfortunate fact of modern life seems to be the inevitable announcement of new data breaches, and if you’ve lost track of how many breaches you’ve had to perform a risk assessment on you’re probably not alone…but just how much personal […]
    Or, the risk of email hypnosis . . . And the other implications of complacency! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Now that the pandemic is coming to an end, most of us are returning to our daily commutes.  Are you finding […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    Machine learning is here to stay, so how do we assess its risk? An article review. When it comes to assessing technology risk, there seems to be as many methods as there are attack vectors… but what happens when an entirely new field opens up?  When it comes to machine learning (ML) there aren’t many […]
    You’ve heard it from every MSSP you’ve met: the definition of a SIEM is in the eye of the beholder. But at infotex, we are not talking about the database – an asset whose definition is continuously evolving. We’re talking about the way three teams collaborate in an overall Technology Risk Monitoring process. And whether […]
    A new study shows organizations are responding to cyber attacks faster than ever, so why is that bad news? An article review. When it comes to cyber attacks, the sooner an organization can begin to respond to an attack the better, so the results of a new study showing a drop in the amount of […]
    …a Crash Course of Security Measures The first article by Sara Fultz, Creative Assistant of infotex! Introduction: As the managing partner of infotex, I am proud to introduce the “debut article” for Sara Fultz.  I told Sara “write an article showing us what you’ve learned that the technical staff will appreciate.” As I read her […]
    infotex Programming Coordinator, Michael Hartke, introduces a high level overview of the upcoming update to the infotex SIEM. Look for more movies in the coming months informing our Clients, and those just now learning about us, about the SIEM and its features and functions.
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.