ENG: How big Log Management or SIEM solution does your organization need?
🇨🇿 Česká verze je níže / Czech version is below.
When it comes to strengthening the security of your IT environment, you must consider the terms Log Management and Security Information and Event Management, so called SIEM. These two are key cybersecurity solutions based on log collection and log analysis. A log is a record of the activity of any device or event in the IT infrastructure.
Specifically for this purpose, TeskaLabs has designed and developed Logman.io and TeskaLabs SIEM products that work with real-time data in multitenant environments, to help eliminate risks and their possible effects on the operation of your company. At TeskaLabs we have extensive experience in designing a wide range of solutions, from small projects to more massive and complex deployments.
You can find out more here: Case Study - TeskaLabs SIEM for large Czech government organization
In the pre-implementation phase, it is crucial to precisely tailor the size the Log Management and SIEM solutions to the project at hand, because the robustness of the solution is dependent upon adequate storage capacity to run it efficiently. Two two main metrics employed here are the so-called events per second (EPS) and the volume of data (GB/day) that is required to be processed in a given IT infrastructure.
Events per second (EPS) defines the number of events or processes that take place in a given time on any device or application in the IT infrastructure. The number of EPS is unique for each IT infrastructure.
TeskaLabs EPS calculator tool not only calculates the number of EPS and GB/day of your IT infrastructure, but it also allows you to request a consultation for preferred Log Management and SIEM solution. Our experienced team will help you start your journey to a more secure IT environment.
CZ: Jak velké Log Management nebo SIEM řešení potřebuje vaše organizace?
Pokud uvažujete nad posílení vaší bezpečnosti vašeho IT prostředí, tak se nevyhnete pojmům Log Management a SIEM. Jedná se o systémy kybernetické bezpečnosti založené na správě logů a jejich analýze. Log je záznam aktivity jakéhokoli zařízení či události v IT infrastruktuře.
TeskaLabs pro tyto účely navrhla a vyvinula produkty Logman.io a TeskaLabs SIEM, které pracují s daty v reálném čase a v multitenantních prostředích a pomáhají tak eliminovat rizika a jejich možné dopady na chod vaší společnosti. V TeskaLabs máme bohaté zkušenosti s navrhováním takových řešení od malých až po opravdu velká nasazení.
Více se můžete dozvědět zde: Případová studie - TeskaLabs SIEM pro velkou státní organizaci
Ve fázi předimplementační analýzy a správného dimenzování Log Management a SIEM řešeních není snadný, ale velmi důležitý úkol, který ovlivňuje robustnost Log Mangement a SIEM řešení a také velikost potřebného uložiště k jeho efektivnímu provozu. Dvěma hlavními měřítky jsou tzv. události za sekundu (EPS) a také objem dat (GB/den), které jsou potřebné ke zpracovávání v dané IT infrastruktuře.
Události za sekundu (EPS) definují počet událostí nebo procesů, které proběhnou za daný čas na jakémkoli zařízení a aplikaci dané IT infrastruktury. Počet EPS je pro každou IT infrastrukturu jedinečný.
Nástroj TeskaLabs EPS kalkulačka vám umožní výpočet počtu EPS a GB/den vaší IT infrastruktury a také vám umožní si vyžádat konzultaci na žádoucí Log Management a SIEM řešení. Náš zkušený tým vám tak pomůže započít cestu k bezpečnějšímu IT prostředí.
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market
In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.
Published on August 08, 2017
Security Architect Jiri Kohout: It's up to Us to Define How Secure The Internet Will Be
The security of connected applications, IoT, or mobile platforms, is based not only on secure development, but also on widespread knowledge about info security. Every user should have minimum knowledge about security. Every public tender should demand security of the final product or service.
Published on September 15, 2015
Snap to It: Mobile Secure Gateway Is In Your Future
The enterprise world is changing. In the past, enterprises built their IT infrastructure as isolated data fortresses and did everything they could to prevent outsiders from accessing their data. But now they need to open that fortress to allow communication via mobile technologies. And this hole is where hackers strike.
Published on July 07, 2015