Check Point Goes CSI On Data Logs

Check Point Goes CSI On Data Logs

December 6th, 2006: Security firm Check Point has beefed up the forensic capabilities of its Eventia Suite by including new integrated features that it claims reduce the cost and complexity of security data analysis and reporting.

Comprised of Eventia Analyzer and Eventia Reporter, Eventia Suite is a security information and event management (SIEM) solution that Check Point says reduces the cost and complexity of security log analysis and reporting. 

According to Check Point, Analyzer provides centralised, real-time correlation of log data from Check Point products and third-party network and security devices, while Reporter’s centralised reporting system provides consistent presentation of data from desktop to perimeter security, increasing visibility into security posture across the enterprise.

The company says that data overload and compliance are causing headaches for enterprises across the globe. It claims that security information and event management (SIEM) solutions such as Eventia Suite are a potent tincture for IT administrators by helping them analyse raw log data from multiple security devices across the network, automatically prioritising data for action.

Check Point claims that this automation saves thousands of man hours usually lost scrolling through and analysing logs by 80 percent.

“Today many companies have infrastructures in place in which their layered architecture does not integrate all the security devices and management systems they have deployed,” said Scott McKinnel, Country Manager Australia and New Zealand, Check Point Software Technologies.  “Eventia Suite frees up the IT manager’s time to focus on threats that pose the greatest risk.

“Eventia Suite gives customers with complex security environments the flexibility of centralised global analysis and reporting for their entire network.”

Check Point says that Eventia Suite support for Provider-1 will enable Service Providers to offer seamless event management services to their customers, and large enterprises to have better visibility into security posture across their network, as well as scalable reporting for a large distributed security network.

Comment on this story

Business Solution: