LogLogic releases next-generation security event management platform

Guy Churchward, the firm's CEO, said that large enterprises have a huge challenge in gathering, storing and processing data from their IT infrastructure.

"They have widely distributed, complex systems that are constantly changing, yet still need to meet compliance mandates, improve their security stance and understand the workings of their IT operations", he said.

"With LogLogic 5, we enable 360 Insight, allowing companies to establish a streamlined approach for managing all of their IT data across all devices, regardless of whether they're physical, virtual or cloud based", he added.

According to LogLogic, most businesses today have deployed a variety of analytics solutions throughout their distributed enterprise – such as SIEM, compliance, service level agreement and network monitoring tools – but often these tools duplicate collection and storage efforts, and rarely share information.

In addition, says the firm, SIEM solutions focus on gathering and processing only a subset of all IT data, leaving companies both insecure and non-compliant.

With 360 Insight, however, the company says that situation changes, as the security-monitoring platform operates as a WAN-aware, store-and-forward, encrypted, compressed IT data transport analysis system.

With v5 of its software, LogLogic says that users can now streamline their IT data collection and analysis processes by using the LogLogic 5 system as the central IT data management engine across all devices, analytics agents and deployment options.

Churchward went on to say that, over the past year, his firm has been delivering on a technology roadmap that includes the idea of an 'extreme log fabric', which provides businesses with total visibility and control over all their IT data.

"Our initial releases delivered massive data ingest and market-leading performance capabilities. LogLogic 5 further enhances this roadmap by offering comprehensive 360 insight into all forms of IT data from one unified place", he said.

What’s hot on Infosecurity Magazine?