Summary: â€˘ All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web … Continue reading
Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO ofÂ EventTracker, visited to introduce himself and his company, and to discuss the need … Continue reading
EventTracker Enterprise 7.6 new features simplify the extraction of operational and security intelligence from machine data. COLUMBIA, MD, September 15, 2014 â€“ EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of the newest version of … Continue reading
Selecting a SIEM - Tips & Trends 2014 What's New in 7.5 EventTracker Log Manager Webinar SIEM Simplified Webinar Top 5 Threatscape 2013 continue...
EventTracker uses Knowledge Packs to assign meaning and severity to incoming data. This allows users to "make sense" of the often cryptic, high volume log messages. A Knowledge Pack may include definitions for Alerts, Reports, Dashboards, Smart Search Tokens, Behavior and Correlation rules, which are used in various EventTracker modules.
EventTracker's solutions helps to automate the steps required by each standard to insure compliance, and maintain it going forward. With EventTracker, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit ready reports.
A carefully curated collection of the latest threat intelligence from reliable sources formatted for easy import into EventTracker. Sources include FBI InfraGuard, US CERT, Internet Storm Center, dshield.org, abuse.ch, etc.
Log Knowledge Base
The EventTracker Knowledgebase is the largest searchable repository for detailed information about event logs generated by Windows/*nix/Cisco (syslog), Antivirus, Veritas, OpenManage, VMWARE, and more. The KB is a free service provided by Prism Microsystems.