Architecture Series Change Management Series Compliance Series Enterprise Seriescontinue...
Safeguarding the IT environment has become an increasingly difficult challenge as cyber attackers have become more sophisticated and prolonged in their efforts to steal valuable information. How can Threat Intelligence help? (more…)
Shellshock, Windows & EventTracker Energy Sector: Highly Valuable & Highly Vulnerable Selecting a SIEM - Tips & Trend 2014 Configuration Assessment continue...
EventTracker uses Knowledge Packs to assign meaning and severity to incoming data. This allows users to "make sense" of the often cryptic, high volume log messages. A Knowledge Pack may include definitions for Alerts, Reports, Dashboards, Smart Search Tokens, Behavior and Correlation rules, which are used in various EventTracker modules.
EventTracker's solutions helps to automate the steps required by each standard to insure compliance, and maintain it going forward. With EventTracker, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit ready reports.
A carefully curated collection of the latest threat intelligence from reliable sources formatted for easy import into EventTracker. Sources include FBI InfraGuard, US CERT, Internet Storm Center, dshield.org, abuse.ch, etc.
Log Knowledge Base
The EventTracker Knowledgebase is the largest searchable repository for detailed information about event logs generated by Windows/*nix/Cisco (syslog), Antivirus, Veritas, OpenManage, VMWARE, and more. The KB is a free service provided by Prism Microsystems.