TeskaLabs EPS Calculator

ENG: How big Log Management or SIEM solution does your organization need?

🇨🇿 Česká verze je níže / Czech version is below.

When it comes to strengthening the security of your IT environment, you must consider the terms Log Management and Security Information and Event Management, so called SIEM. These two are key cybersecurity solutions based on log collection and log analysis. A log is a record of the activity of any device or event in the IT infrastructure.

Specifically for this purpose, TeskaLabs has designed and developed Logman.io and TeskaLabs SIEM products that work with real-time data in multitenant environments, to help eliminate risks and their possible effects on the operation of your company. At TeskaLabs we have extensive experience in designing a wide range of solutions, from small projects to more massive and complex deployments.

You can find out more here: Case Study - TeskaLabs SIEM for large Czech government organization

In the pre-implementation phase, it is crucial to precisely tailor the size the Log Management and SIEM solutions to the project at hand, because the robustness of the solution is dependent upon adequate storage capacity to run it efficiently. Two two main metrics employed here are the so-called events per second (EPS) and the volume of data (GB/day) that is required to be processed in a given IT infrastructure.

Events per second (EPS) defines the number of events or processes that take place in a given time on any device or application in the IT infrastructure. The number of EPS is unique for each IT infrastructure.

TeskaLabs EPS calculator tool not only calculates the number of EPS and GB/day of your IT infrastructure, but it also allows you to request a consultation for preferred Log Management and SIEM solution. Our experienced team will help you start your journey to a more secure IT environment.

Try the calculator!

CZ: Jak velké Log Management nebo SIEM řešení potřebuje vaše organizace?

Pokud uvažujete nad posílení vaší bezpečnosti vašeho IT prostředí, tak se nevyhnete pojmům Log Management a SIEM. Jedná se o systémy kybernetické bezpečnosti založené na správě logů a jejich analýze. Log je záznam aktivity jakéhokoli zařízení či události v IT infrastruktuře.

TeskaLabs pro tyto účely navrhla a vyvinula produkty Logman.io a TeskaLabs SIEM, které pracují s daty v reálném čase a v multitenantních prostředích a pomáhají tak eliminovat rizika a jejich možné dopady na chod vaší společnosti. V TeskaLabs máme bohaté zkušenosti s navrhováním takových řešení od malých až po opravdu velká nasazení.

Více se můžete dozvědět zde: Případová studie - TeskaLabs SIEM pro velkou státní organizaci

Ve fázi předimplementační analýzy a správného dimenzování Log Management a SIEM řešeních není snadný, ale velmi důležitý úkol, který ovlivňuje robustnost Log Mangement a SIEM řešení a také velikost potřebného uložiště k jeho efektivnímu provozu. Dvěma hlavními měřítky jsou tzv. události za sekundu (EPS) a také objem dat (GB/den), které jsou potřebné ke zpracovávání v dané IT infrastruktuře.

Události za sekundu (EPS) definují počet událostí nebo procesů, které proběhnou za daný čas na jakémkoli zařízení a aplikaci dané IT infrastruktury. Počet EPS je pro každou IT infrastrukturu jedinečný.

Nástroj TeskaLabs EPS kalkulačka vám umožní výpočet počtu EPS a GB/den vaší IT infrastruktury a také vám umožní si vyžádat konzultaci na žádoucí Log Management a SIEM řešení. Náš zkušený tým vám tak pomůže započít cestu k bezpečnějšímu IT prostředí.

Vyzkoušejte EPS kalkulačku!

About the Author

Jan Fousek

Marketing Specialist at TeskaLabs




You Might Be Interested in Reading These Articles

Why You Need Security Audit for Your Point-­of-­Sale (POS) System

It’s clear that POS systems are a source of important and valuable data, and have the power to either speed up the progress or to stop the development of a company, depending on whether or not they are used. POS data is a business asset. Despite this vital importance, such an asset is not afforded the protection it deserves.

Continue reading ...

mobile security pos

Published on March 07, 2017

5 Cyber Threats eCommerce Websites Should Watch Out For

There are innumerable advantages to eCommerce. Businesses can make sales outside of business hours; they can reach customers over their own personal social media pages, and take advantage of people being more inclined to spend while they’re on the couch with a glass of wine rather than harassed in the changing room of a crowded store. However, with all of these advantages, there are also some inherent threats that could annihilate a business’ reputation.

Continue reading ...

security

Published on May 02, 2017

The World of Mobile Apps Is Not As Secure As You Think

Mobile app startup companies are notorious for cutting corners. One of the first things that is cut is security. After all, they have the big guys like Comcast, AT&T, and Verizon to protect mobile users, right? Wrong! All the way down the line. TechCrunch's article about security for mobile devices is an interesting theory on the state of security on the Internet. Although, they do hit the mark in the article about how companies fix the problem after the fact of the security breach.

Continue reading ...

startup security

Published on January 13, 2015