Resources

See All

Blog

EventTracker and Poodle

Summary: • All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web … Continue reading

See All

Media Coverage

EventTracker 7.6: Digging Into Detials for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to introduce himself and his company, and to discuss the need … Continue reading

See All

Case Studies

A case study written by The 451 Group  shows how EventTracker’s SIEM Simplified service supplements the IT department of a financial organization.

Phreesia provides tablets to doctors offices, uses EventTracker for HIPAA compliance; Mobile Productivity is a leader in automotive repair, uses EventTracker for PCI-DSS compliance.

See All

Press Releases

EventTracker Announces 7.6 with Smart Search

EventTracker Enterprise 7.6 new features simplify the extraction of operational and security intelligence from machine data. COLUMBIA, MD, September 15, 2014 – EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of the newest version of … Continue reading

See All

White Papers

Architecture Series
Change Management Series
Compliance Series
Enterprise Series

continue...

 

How to Succeed at SIEM

In our latest newsletter featuring original research from Gartner’s Security & Risk Management Summit, learn what tools and skills you need to make a SIEM implementation successful.

  1. (required)
  2. (required)
  3. (required)
  4. (required)
  5. (valid email required)
 

cforms contact form by delicious:days

See All

Webcasts & Archived Webinars

Industry Trends
Compliance
Driving Business ROI

continue...
See All

Newsletters

Laying Traps for External Information Thieves

by Randy Franklin Smith Wouldn’t it be nice if you detect when an external threat actor, who’s taken over one of your users’ endpoints, goes on a poaching expedition through all the information that user has access to on your … Continue reading

EventTracker Updates

See All

Latest Videos

Selecting a SIEM - Tips & Trends 2014
What's New in 7.5
EventTracker Log Manager Webinar
SIEM Simplified Webinar
Top 5 Threatscape 2013

continue...

Knowledge Center

EventTracker uses Knowledge Packs to assign meaning and severity to incoming data. This allows users to "make sense" of the often cryptic, high volume log messages. A Knowledge Pack may include definitions for Alerts, Reports, Dashboards, Smart Search Tokens, Behavior and Correlation rules, which are used in various EventTracker modules.
Learn more

Compliance Center

EventTracker's solutions helps to automate the steps required by each standard to insure compliance, and maintain it going forward. With EventTracker, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit ready reports.
Learn more

Threat Center

A carefully curated collection of the latest threat intelligence from reliable sources formatted for easy import into EventTracker. Sources include FBI InfraGuard, US CERT, Internet Storm Center, dshield.org, abuse.ch, etc.
Learn more

Log Knowledge Base

The EventTracker Knowledgebase is the largest searchable repository for detailed information about event logs generated by Windows/*nix/Cisco (syslog), Antivirus, Veritas, OpenManage, VMWARE, and more. The KB is a free service provided by Prism Microsystems.
Learn more