Upload
britton-stone
View
218
Download
1
Tags:
Embed Size (px)
Citation preview
1
Visualizer for FirewallGraphical Business Intelligence
Display & Analysis Tool
2
Visualizer Helps you Understand & Implement Security
“With Visualizer, understanding and implementing security is easy!”
65
Or get an analysis of security data in graphical user-friendly format.
…and create a security rule based on an actual event.
4
3
With Visualizer you can easily isolate a single event
out of millions of log entries…
2
“To create a security rule, I have to actually write a program”…
1
“There are millions of log entries – it’s so hard to find a specific entry.”
3
• Business Intelligence product for presentation, investigation and analysis of security warehouse log data and query output from:
• Firewall- to analyze network accesses• Audit- to analyze QAUDJRN system journal events• AP-Journal – to analyze the log of business-critical data fields
which were accessed or changed• User Profile Reports- to analyze all User Profile information
• Instantaneous “Slice & Dice” response, regardless of database size
• Pinpoints exceptions and trends, easily finds the “needle in the haystack”
Visualizer Features
4
Nightly Maintenance Job Audit
Statistics File
FirewallStatistics
File
Firewall Audit
Visualizer
How Visualizer obtains Audit & Firewall Data
Daily Log Files Daily Log Files
5
Accessing Visualizer from the iSecurity GUI
6
Filter Audit Log Data
No. of Entrieson each Date
Graphical display of most frequent Dates
Visualizer’s workspace
Lower tabs for
“slice and dice’
7
Supports 3D/2D, Vertical and Horizontal Graphs
8
Visualizer Firewall Example: Sort all Servers by Quantity, Filter by 2 SQL Servers
9
Filter by IPs relevant for investigation/interrogation
10
Add filter for relevant Libraries
11
Add Filter for most frequent Objects
12
Add Filter for Date Range
13
Select 3 Rejected Accesses; click “Drill to Data”
Click “Drill to Data”
14
View Firewall log records, select one and click on Create Detection Rule
15
New Detection Rule pre-populated with data from actual Firewall log event
Note Varying Conditions
16
Print a Report in HTML
17
Please visit us at www.razlee.com
Thank You !