20
SECURE LOG MANAGEMENT

SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Embed Size (px)

Citation preview

Page 1: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

SECURE LOG MANAGEMENTSECURE LOG

MANAGEMENT

Page 2: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

BalaBit - the company

How we do system logging

When syslogs are not enough

Page 3: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

BalaBit - company profile

Page 4: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Our products

Zorp proxy level firewall

syslog-ng OSE

syslog-ng Premium Edition

syslog-ng Store Box

Shell Control Box

Page 5: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Is there any problem

with log management?

Page 6: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Securing from the

bottom UP

Page 7: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Hostsecurity

Page 8: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Transport

security

Page 9: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Storage

security

Page 10: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

syslog-ng has it all!on-line collection

TCP and TLS TCP transport

mutual authentication

“logstore” - secure log storage

Indexing

PatternDB and Artificial Ignorance

Page 11: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

STOP

What else?

Page 12: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Video report

Page 13: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Those we

KNOW

about

Page 14: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

WHO?

Page 15: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

HOW?

Page 16: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough
Page 17: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Extra control over

secure communication

Page 18: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Gatewayauthentication

Page 19: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

4-eyes

authorization

Page 20: SECURE LOG MANAGEMENT. BalaBit - the company How we do system logging When syslogs are not enough

Thank you for your attention!