Page All:
Page 1
Perimeter E-Security Launches SaaS-Based Log Management Solution
Simple Pricing and Ease of Deployment Allows Companies to Effortlessly Secure Their Networks and Comply with Regulations
MILFORD, Conn., Sept. 27, 2011 /PRNewswire/ -- Perimeter E-Security, the leading provider of security as a service, today unveiled a new SaaS-based Log Management solution, which allows organizations to secure their networks and comply with regulations that require log data to be collected, reviewed, and archived securely. The solution introduces a unique, "per-device" pricing model, eliminating the complexity of traditional variable pricing models. Perimeter's Log Management solution complements the Company's current service offerings, such as intrusion detection and vulnerability assessment, and will add an extra layer of security and compliance to its network security suite.
"Every company needs to centralize and monitor their security, server and device logs. It's a security best practice, and financial regulations and mandates such as PCI-DSS increasingly require it. But today's log management solutions are hard to buy and complex to deploy. Customers shouldn't have to figure out 'events-per-second,' or use a crystal ball to size their capacity needs," said Andrew Jaquith, CTO of Perimeter E-Security. "Our new SaaS Log Management solution leaves old-world shrink-wrapped security far behind. Customers just need to answer two simple questions: how many devices do you have and how long do you want to keep the logs for? Customers can increase their security and meet their obligations in less than a week."
Perimeter's Log Management solution collects logs from customer devices and infrastructure with a thin, lightweight collector appliance that is centrally managed from the Perimeter's Security Operations Center. Logs are collected without agents by the appliance and then compressed, encrypted and forwarded to highly secure and redundant data centers for processing and storage. Customers can log into a web portal to perform real-time searches or run easy-to-read reports, such as for audit and compliance purposes, or log events, making collecting and analyzing log data simple and less time consuming.
Highlights of Perimeter's Log Management solution include the following:
-- Detects threats and defend networks from security breaches and attacks
with a cost-effective SaaS solution
-- Reduces hassle and cost of installing traditional and complex security
monitoring products
-- Perimeter's Security Operation Center allows security experts to assist
organizations in detecting and remediating attacks
-- Easily collects logs across the whole organization and safely stores
event logs in Perimeter's SAS70 Type II data centers
-- Patented 7-factor threat scenario modeling allows events to be
accurately identified and correlated
-- Log Management web portal offers around-the-clock access to dynamic
reports and flexible search tools for powerful analysis, forensic
capabilities, and compliance reports
Perimeter E-Security is the only enterprise security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise.
About Perimeter
Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit http://www.perimeterusa.com.
Join Our CommunityBlog: http://www.perimeterusa.com/blogTwitter: http://www.twitter.com/PerimeterNews Facebook: http://www.facebook.com/perimeterusaLinkedIn: http://www.linkedin.com/groupRegistration?gid109606
CONTACT:Maggie Duquin Nolan / Sharon OhBrainerd Communicators212-986-6667nolan@braincomm.com / oh@braincomm.com
SOURCE Perimeter E-Security
Perimeter E-Security
Web Site: http://www.perimeterusa.com
Perimeter E-Security Launches SaaS-Based Log Management Solution
Simple Pricing and Ease of Deployment Allows Companies to Effortlessly Secure Their Networks and Comply with Regulations
MILFORD, Conn., Sept. 27, 2011 /PRNewswire/ -- Perimeter E-Security, the leading provider of security as a service, today unveiled a new SaaS-based Log Management solution, which allows organizations to secure their networks and comply with regulations that require log data to be collected, reviewed, and archived securely. The solution introduces a unique, "per-device" pricing model, eliminating the complexity of traditional variable pricing models. Perimeter's Log Management solution complements the Company's current service offerings, such as intrusion detection and vulnerability assessment, and will add an extra layer of security and compliance to its network security suite.
"Every company needs to centralize and monitor their security, server and device logs. It's a security best practice, and financial regulations and mandates such as PCI-DSS increasingly require it. But today's log management solutions are hard to buy and complex to deploy. Customers shouldn't have to figure out 'events-per-second,' or use a crystal ball to size their capacity needs," said Andrew Jaquith, CTO of Perimeter E-Security. "Our new SaaS Log Management solution leaves old-world shrink-wrapped security far behind. Customers just need to answer two simple questions: how many devices do you have and how long do you want to keep the logs for? Customers can increase their security and meet their obligations in less than a week."
Perimeter's Log Management solution collects logs from customer devices and infrastructure with a thin, lightweight collector appliance that is centrally managed from the Perimeter's Security Operations Center. Logs are collected without agents by the appliance and then compressed, encrypted and forwarded to highly secure and redundant data centers for processing and storage. Customers can log into a web portal to perform real-time searches or run easy-to-read reports, such as for audit and compliance purposes, or log events, making collecting and analyzing log data simple and less time consuming.
Highlights of Perimeter's Log Management solution include the following:
-- Detects threats and defend networks from security breaches and attacks
with a cost-effective SaaS solution
-- Reduces hassle and cost of installing traditional and complex security
monitoring products
-- Perimeter's Security Operation Center allows security experts to assist
organizations in detecting and remediating attacks
-- Easily collects logs across the whole organization and safely stores
event logs in Perimeter's SAS70 Type II data centers
-- Patented 7-factor threat scenario modeling allows events to be
accurately identified and correlated
-- Log Management web portal offers around-the-clock access to dynamic
reports and flexible search tools for powerful analysis, forensic
capabilities, and compliance reports
Perimeter E-Security is the only enterprise security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise.
About Perimeter
Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit http://www.perimeterusa.com.
Join Our CommunityBlog: http://www.perimeterusa.com/blogTwitter: http://www.twitter.com/PerimeterNews Facebook: http://www.facebook.com/perimeterusaLinkedIn: http://www.linkedin.com/groupRegistration?gid109606
CONTACT:Maggie Duquin Nolan / Sharon OhBrainerd Communicators212-986-6667nolan@braincomm.com / oh@braincomm.com
SOURCE Perimeter E-Security
Perimeter E-Security
Web Site: http://www.perimeterusa.com