Our system provides Real-Time Log Monitoring along with an intuitive Information Systems Activity Review.
Real Time Monitoring: millions of logs are consolidated and run through into a system that looks for that needle in the haystack that, if present, requires immediate attention. Our data security analysts watch the alerts coming from this system in real time, 24x7x365.
Information Systems Activity Review: You will receive detailed daily reports reviewed by information security data analysts. This helps you address problems as they occur. When it’s time for your committee meetings, you will download trend reports to help identify any problems visible over time.
Example of our easy-read Interactive Daily Reports
We consolidate, monitor, report on, and respond in real-time to logs from your servers, firewalls, workstations, active directory, spyware defense, and anti-malware systems, Microsoft Exchange servers, core processors, and on-line banking systems. Any device or application that generates logs in syslog format can be filtered through our system and analyzed.
Visualization: We can also bring in logs, reports, comma delimited data from any of your authentication systems, from critical applications including Internet Banking systems, Mortgage Origination applications, Core Applications, Teller Applications, etc. Imagine the implications: we have a “Put a Watch” capability that allows you to monitor asset-centric and user-centric reports. The impact of this on “access management” as well as “segregation” will make your auditor smile! Consider how this system can facilitate your need to perform periodic access reviews. Imagine watching, in real time, as a terminated employees access is disabled across platforms. Consider mitigating vendor risk by being able to watch what they do while traversing your network.
Meanwhile, our data security analysts watch your system in real time, and react to emergency events 24x7x365. Our database allows custom queries as well as queues up correlation opportunities, trend information, troubleshooting reports, etc.
You see only what you need to see, when you need to see it!
Check out our SIEM Datasheet for more detailed information on what the infotex ELM System can do for you!
The infotex SIEM System features:
- Competitive Pricing!
- 24 x 7 x 365 Real Time Monitoring!
- Daily Reporting of Actionable Events!
- Trend Reporting – Pushed to you!
- Completely Customized!
- Tuning Process Evolved Since 2005!
- Health Reporting!
- Signature Set Based On Best Practices, FFIEC Guidelines, HIPAA, PCI’s DSS, and CobiT!
- When is a Firewall Not Enough?
Call us for pricing and a demo: (800) 466-9939 x808
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.
Intelligence agencies from five nations contributed to the new advisory… An article review. For the first time, the cybersecurity divisions of the nations in the “Five Eyes” alliance (The United States, United Kingdom, Canada, Australia and New Zealand) have released a joint advisory concerning incident response. The report, available here, does not provide a complete […]
PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex has just hired Nathan Harrell, to be a new Engagement Coordinator to assist with all communications between both current and prospective Clients. “We’re really excited to have Nate joining the team to help us keep the channels of communication open!” says Bryan […]
A Webinar-Movie Short Back by popular demand! Our Board Awareness Training program continues with this movie, entitled Vulnerability Management for Directors, that can be presented directly to your board of directors.
Nearly half of all companies expect a security issue due to telecommuting… An article review. A few months ago we discussed a warning from the Department of Homeland Security regarding hackers taking advantage of the business disruptions caused by COVID-19, and according to an article shared with us by our friend Wes Pollard it appears […]