TeskaLabs EPS Calculator

ENG: How big Log Management or SIEM solution does your organization need?

🇨🇿 Česká verze je níže / Czech version is below.

When it comes to strengthening the security of your IT environment, you must consider the terms Log Management and Security Information and Event Management, so called SIEM. These two are key cybersecurity solutions based on log collection and log analysis. A log is a record of the activity of any device or event in the IT infrastructure.

Specifically for this purpose, TeskaLabs has designed and developed Logman.io and TeskaLabs SIEM products that work with real-time data in multitenant environments, to help eliminate risks and their possible effects on the operation of your company. At TeskaLabs we have extensive experience in designing a wide range of solutions, from small projects to more massive and complex deployments.

You can find out more here: Case Study - TeskaLabs SIEM for large Czech government organization

In the pre-implementation phase, it is crucial to precisely tailor the size the Log Management and SIEM solutions to the project at hand, because the robustness of the solution is dependent upon adequate storage capacity to run it efficiently. Two two main metrics employed here are the so-called events per second (EPS) and the volume of data (GB/day) that is required to be processed in a given IT infrastructure.

Events per second (EPS) defines the number of events or processes that take place in a given time on any device or application in the IT infrastructure. The number of EPS is unique for each IT infrastructure.

TeskaLabs EPS calculator tool not only calculates the number of EPS and GB/day of your IT infrastructure, but it also allows you to request a consultation for preferred Log Management and SIEM solution. Our experienced team will help you start your journey to a more secure IT environment.

Try the calculator!

CZ: Jak velké Log Management nebo SIEM řešení potřebuje vaše organizace?

Pokud uvažujete nad posílení vaší bezpečnosti vašeho IT prostředí, tak se nevyhnete pojmům Log Management a SIEM. Jedná se o systémy kybernetické bezpečnosti založené na správě logů a jejich analýze. Log je záznam aktivity jakéhokoli zařízení či události v IT infrastruktuře.

TeskaLabs pro tyto účely navrhla a vyvinula produkty Logman.io a TeskaLabs SIEM, které pracují s daty v reálném čase a v multitenantních prostředích a pomáhají tak eliminovat rizika a jejich možné dopady na chod vaší společnosti. V TeskaLabs máme bohaté zkušenosti s navrhováním takových řešení od malých až po opravdu velká nasazení.

Více se můžete dozvědět zde: Případová studie - TeskaLabs SIEM pro velkou státní organizaci

Ve fázi předimplementační analýzy a správného dimenzování Log Management a SIEM řešeních není snadný, ale velmi důležitý úkol, který ovlivňuje robustnost Log Mangement a SIEM řešení a také velikost potřebného uložiště k jeho efektivnímu provozu. Dvěma hlavními měřítky jsou tzv. události za sekundu (EPS) a také objem dat (GB/den), které jsou potřebné ke zpracovávání v dané IT infrastruktuře.

Události za sekundu (EPS) definují počet událostí nebo procesů, které proběhnou za daný čas na jakémkoli zařízení a aplikaci dané IT infrastruktury. Počet EPS je pro každou IT infrastrukturu jedinečný.

Nástroj TeskaLabs EPS kalkulačka vám umožní výpočet počtu EPS a GB/den vaší IT infrastruktury a také vám umožní si vyžádat konzultaci na žádoucí Log Management a SIEM řešení. Náš zkušený tým vám tak pomůže započít cestu k bezpečnějšímu IT prostředí.

Vyzkoušejte EPS kalkulačku!

About the Author

Jan Fousek

Marketing Specialist at TeskaLabs




You Might Be Interested in Reading These Articles

Custom Made vs. Off-The-Shelf Mobile Apps – The Issue of Security

In October 2015, Blakely Thomas-Aguilar did a great article on mobile security statistics on the VMware AirWatch blog that can and will send shivers down your spine. For example, she found that there was an increase of 18% in the number of Android vulnerabilities between 2011 and 2015.

Continue reading ...

mobile security

Published on July 26, 2016

The World of Mobile Apps Is Not As Secure As You Think

Mobile app startup companies are notorious for cutting corners. One of the first things that is cut is security. After all, they have the big guys like Comcast, AT&T, and Verizon to protect mobile users, right? Wrong! All the way down the line. TechCrunch's article about security for mobile devices is an interesting theory on the state of security on the Internet. Although, they do hit the mark in the article about how companies fix the problem after the fact of the security breach.

Continue reading ...

startup security

Published on January 13, 2015

Key Areas and Best Practices to Focus for Mobile API Security

With APIs (Application Programming Interfaces) becoming a crucial factor in any web or mobile application, security feels more like a journey than a destination. Of all the constituents that encompass an application, API gateway offers easy access points for a hacker to break in and steal your data. A single error in API can cause immense problems for any organization using your API.

Continue reading ...

security mobile development

Published on November 22, 2016