contents | software | |||||||
| Analyzer 2.0 Supports Endpoint and Network Security Devices Check Point Software Technologies Ltd. has announced that Eventia Analyzer 2.0 has extended support to the endpoint and correlates data for anti-virus applications, personal firewalls and operating systems. Eventia Analyzer 2.0 offers native support and integration with the full range of Check Point security products as well as major third party security solutions, and scales to support complex service-provider and large-enterprise environments. By automating the correlation of raw security data, Eventia Analyzer 2.0 is an easy-to-use security event management solution. SEM solutions, such as Eventia Analyzer 2.0, help relieve the burden placed on IT administrators by analyzing data from multiple security devices across the network and automatically prioritizing the data for immediate action. Eventia Analyzer 2.0 provides centralized, real-time correlation of log data from Check Point perimeter, internal, web and endpoint security products - as well as third party security devices - and turns volumes of raw data into actionable information to empower security administrators to make informed decisions on their security deployment. By automating the aggregation and correlation of security data and events, Eventia Analyzer 2.0 not only reduces the amount of information that needs to be reviewed but also isolates and prioritizes real security threats. Eventia Analyzer 2.0 is powerful, yet easy to fine tune. The product delivers robust core functionality that can be deployed in days, is optimized for the Check Point environment, but can support heterogeneous devices from companies of all sizes - including service providers. The new capabilities are: - Seamless integration with Check Point and third party products - Integration with the entire line of Check Point Software solutions and major third-party security devices provides better event detection, prevention and out-of-the-box value. Eventia Analyzer 2.0 extends support to Check Point Integrity endpoint security products, as well as Microsoft Windows operating systems and anti-virus applications, providing a unified view of logs for better event detection and prevention. - Support for large distributed environments - Global and customer level correlation capabilities allow service providers to offer seamlessly integrated SEM services to their customers, and gives large enterprises better visibility into the security posture across their network. - User-definable event response - Customers can tailor event definitions for each unique network environment and behavior. write your comments about the article :: © 2006 Computing News :: home page |