Effective management of security events with SIEM
Security events can help prevent and detect attack being launched within your network or system. Every application, system or device generates and logs events into a file. Several type of events can be registered such as application events, systems events, and security events.
.
Once an attacker compromises a system or network, he deletes all evidence in order to make the investigation very hard. One of the primary action performed by hacker is the deletion of log file. That is why CAPTOSEC helps you protect those files by implementing mechanisms to authenticate the source, encrypt and remote backup the security events log files.
To achieve all these goals, we design, develop, implement and maintain a centralized logs management system that:
+ collects security events from different applications, systems and devices
+ correlates and centralizes security events
+ alerts security administrator or manager according to severity
+ offers a graphical web interface to monitor security events
+ securely backups security log files on remote servers
+ shows how to mitigate security risks
+ securely backups security log files on remote servers
We use tools, technologies and software such as Syslog, Syslog-ng, OSSEC, SNMPv3, Logcheck, etc.
+ Logs retention Policy according to regulatory requirements
+ SIEM requirements
+ SIEM vendor selection criteria
+ List of the sources of security events & logs
+ Implementation of SIEM solutions (OpenEYES, other)
+ Tuning of SIEM