Log Management

Overview

Log management is driven by reasons of security, system and network operations (such as system or network administration) and regulatory compliance. The large amount of log data, sometimes up to a third of network traffic, presents a huge challenge for the administrator to retrospectively identify what is happening on the network. In order to effectively analyse large volumes of diverse logs a centralised aggregation point and simplified log reader is required. Integrated with event correlation log analysis provides business intelligence on Security Incident Management (SIM) and Security Event Management (SEM).

Consultancy and proof of concepts are essential in procuring the right solution. With full training and in depth experience we can advise, implement and install solutions that meet diverse business needs from compliance to individual use cases such as Internet Scraping.

 

 

Request callback Make an enquiry Receive newsletter?

'Following (our) initial meeting Sec-1 was requested to provide a Penetration Test for the Halcrow Group. The standard of report received has resulted in Sec-1 being the provider of choice for Penetration and Application Testing for the Halcrow Group and are retained for the foreseeable future.'

David Grant
Halcrow Group