ENG: How big Log Management or SIEM solution does your organization need?
🇨🇿 Česká verze je níže / Czech version is below.
When it comes to strengthening the security of your IT environment, you must consider the terms Log Management and Security Information and Event Management, so called SIEM. These two are key cybersecurity solutions based on log collection and log analysis. A log is a record of the activity of any device or event in the IT infrastructure.
Specifically for this purpose, TeskaLabs has designed and developed Logman.io and TeskaLabs SIEM products that work with real-time data in multitenant environments, to help eliminate risks and their possible effects on the operation of your company. At TeskaLabs we have extensive experience in designing a wide range of solutions, from small projects to more massive and complex deployments.
You can find out more here: Case Study - TeskaLabs SIEM for large Czech government organization
In the pre-implementation phase, it is crucial to precisely tailor the size the Log Management and SIEM solutions to the project at hand, because the robustness of the solution is dependent upon adequate storage capacity to run it efficiently. Two two main metrics employed here are the so-called events per second (EPS) and the volume of data (GB/day) that is required to be processed in a given IT infrastructure.
Events per second (EPS) defines the number of events or processes that take place in a given time on any device or application in the IT infrastructure. The number of EPS is unique for each IT infrastructure.
TeskaLabs EPS calculator tool not only calculates the number of EPS and GB/day of your IT infrastructure, but it also allows you to request a consultation for preferred Log Management and SIEM solution. Our experienced team will help you start your journey to a more secure IT environment.
CZ: Jak velké Log Management nebo SIEM řešení potřebuje vaše organizace?
Pokud uvažujete nad posílení vaší bezpečnosti vašeho IT prostředí, tak se nevyhnete pojmům Log Management a SIEM. Jedná se o systémy kybernetické bezpečnosti založené na správě logů a jejich analýze. Log je záznam aktivity jakéhokoli zařízení či události v IT infrastruktuře.
TeskaLabs pro tyto účely navrhla a vyvinula produkty Logman.io a TeskaLabs SIEM, které pracují s daty v reálném čase a v multitenantních prostředích a pomáhají tak eliminovat rizika a jejich možné dopady na chod vaší společnosti. V TeskaLabs máme bohaté zkušenosti s navrhováním takových řešení od malých až po opravdu velká nasazení.
Více se můžete dozvědět zde: Případová studie - TeskaLabs SIEM pro velkou státní organizaci
Ve fázi předimplementační analýzy a správného dimenzování Log Management a SIEM řešeních není snadný, ale velmi důležitý úkol, který ovlivňuje robustnost Log Mangement a SIEM řešení a také velikost potřebného uložiště k jeho efektivnímu provozu. Dvěma hlavními měřítky jsou tzv. události za sekundu (EPS) a také objem dat (GB/den), které jsou potřebné ke zpracovávání v dané IT infrastruktuře.
Události za sekundu (EPS) definují počet událostí nebo procesů, které proběhnou za daný čas na jakémkoli zařízení a aplikaci dané IT infrastruktury. Počet EPS je pro každou IT infrastrukturu jedinečný.
Nástroj TeskaLabs EPS kalkulačka vám umožní výpočet počtu EPS a GB/den vaší IT infrastruktury a také vám umožní si vyžádat konzultaci na žádoucí Log Management a SIEM řešení. Náš zkušený tým vám tak pomůže započít cestu k bezpečnějšímu IT prostředí.
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
Making Automated Mobility Safe
Autonomous vehicles are still working their way into the modern automotive marketplace. However, they are growing more common each year. Many agree, this is an innovative change, and it’s estimated that there will be more autonomous vehicles on the road in the coming years.
Published on July 15, 2019
Industrial IoT Security: Cyber Security Implications for IT-OT Convergence
In June 2017, two information security firms researching the 2016 hack of the electricity grid in Ukraine announced that they had identified the malicious code used to shut down power stations and leave thousands of households and businesses in darkness for several hours. The malware used to target the Kiev power grid has been named Industroyer, and it serves as a sobering reminder about the dangers faced by the Industrial Internet of Things (IIoT).
Published on September 05, 2017
How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market
In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.
Published on August 08, 2017