Chapter 1: Introduction to SureLog
As Information Technology (IT) becomes the center of today‘s wired enterprise, organizations are under increasing pressure to implement best practices to better control growing security, risk, and compliance challenges. These challenges include internal and external threats, operational issues, intellectual property protection, privacy, and even regulatory mandates. Even though there has been a great emergence of network security centers and risk management groups to help remedy this situation, they have discovered that no one tool completely integrates security, risk, and compliance. As a result, numerous organizations are forced to bundle tools from multiple vendors to achieve their security and compliance goals. However, these techniques result in disparate silos of data that are costly and complex to manage. SureLog software attempts to resolve this issue for its customers.
For custom or non-supported data types, SureLog includes a universal parser to map anydata feed into a data store. Once the data is collected, full record fidelity is maintained to ensure the forensic and evidentiary capabilities of the data. From there, the data is encrypted -a best practice required by numerous regulations including PCI. Finally, the stored data is compressed at a rate of 15:1 to control storage costs. SureLog's correlation engine is unmatched in the industry because it correlates not just log data, but all other data types that are collected and parsed. SureLog also provides over 1,000 security and compliance metrics-based reports, letting users quickly gain visibility into infrastructure activities across lines of business, locations, and applications. These reports are viewable from a secure onscreen portal or they can exported into HTML, PDF, and various other formats.