Suche senden
Hochladen
SOC/NOC Convergence by Spire Research
•
4 gefällt mir
•
1,922 views
A
AccelOps
Folgen
SANS presentation on SOC/NOC Convergence presented by Spire Security and AccelOps
Weniger lesen
Mehr lesen
Technologie
Business
Melden
Teilen
Melden
Teilen
1 von 23
Empfohlen
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
IBMGovernmentCA
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric Approach
Salahuddin Khawaja
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
TEO LT, AB
Infrastructure Services Market 2009
Infrastructure Services Market 2009
Dr. Jimmy Schwarzkopf
Sense of security - Virtualisation Security for Regulated Environments
Sense of security - Virtualisation Security for Regulated Environments
Jason Edelstein
Improving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
Jeffrey Nick
Jeffrey Nick
guestb8e086
Empfohlen
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
IBMGovernmentCA
Securing Mobile - A Business Centric Approach
Securing Mobile - A Business Centric Approach
Salahuddin Khawaja
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
TEO LT, AB
Infrastructure Services Market 2009
Infrastructure Services Market 2009
Dr. Jimmy Schwarzkopf
Sense of security - Virtualisation Security for Regulated Environments
Sense of security - Virtualisation Security for Regulated Environments
Jason Edelstein
Improving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
Jeffrey Nick
Jeffrey Nick
guestb8e086
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
Andris Soroka
Network Monitoring & Alarming
Network Monitoring & Alarming
Anuson K
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
Priyanka Aash
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
Stephen Tsuchiyama
Noc and soc deck
Noc and soc deck
kevin_donovan
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
SIEM and SOC
SIEM and SOC
Abolfazl Naderi
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform
SIEM Primer:
SIEM Primer:
Anton Chuvakin
Landscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
Anton Chuvakin
Elastic - ELK, Logstash & Kibana
Elastic - ELK, Logstash & Kibana
SpringPeople
Network Operations Center - Marlabs
Network Operations Center - Marlabs
Marlabs
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
NETWORK OPERATION CENTER
NETWORK OPERATION CENTER
Rolando Rodriguez
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
Monitoring and Log Management for
Monitoring and Log Management for
Sematext Group, Inc.
Image processing Presentation
Image processing Presentation
Valia koonambaikulathamma college of engineering and technology
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
vkn13
CDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOE
Jon Duke, MD, MS
Information Management on Mobile Steroids
Information Management on Mobile Steroids
John Mancini
Weitere ähnliche Inhalte
Andere mochten auch
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
Andris Soroka
Network Monitoring & Alarming
Network Monitoring & Alarming
Anuson K
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
Priyanka Aash
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
Stephen Tsuchiyama
Noc and soc deck
Noc and soc deck
kevin_donovan
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
SIEM and SOC
SIEM and SOC
Abolfazl Naderi
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform
SIEM Primer:
SIEM Primer:
Anton Chuvakin
Landscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
Anton Chuvakin
Elastic - ELK, Logstash & Kibana
Elastic - ELK, Logstash & Kibana
SpringPeople
Network Operations Center - Marlabs
Network Operations Center - Marlabs
Marlabs
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
NETWORK OPERATION CENTER
NETWORK OPERATION CENTER
Rolando Rodriguez
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
Monitoring and Log Management for
Monitoring and Log Management for
Sematext Group, Inc.
Image processing Presentation
Image processing Presentation
Valia koonambaikulathamma college of engineering and technology
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
vkn13
Andere mochten auch
(20)
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
Network Monitoring & Alarming
Network Monitoring & Alarming
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
Noc and soc deck
Noc and soc deck
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
SIEM and SOC
SIEM and SOC
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
SIEM Primer:
SIEM Primer:
Landscape of Web Identity Management
Landscape of Web Identity Management
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
Elastic - ELK, Logstash & Kibana
Elastic - ELK, Logstash & Kibana
Network Operations Center - Marlabs
Network Operations Center - Marlabs
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
NETWORK OPERATION CENTER
NETWORK OPERATION CENTER
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Monitoring and Log Management for
Monitoring and Log Management for
Image processing Presentation
Image processing Presentation
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
Ähnlich wie SOC/NOC Convergence by Spire Research
CDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOE
Jon Duke, MD, MS
Information Management on Mobile Steroids
Information Management on Mobile Steroids
John Mancini
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
Colloquium
SmartData - Monetizing Data Assets
SmartData - Monetizing Data Assets
Ed Dodds
How to succeed in the cloud
How to succeed in the cloud
Spiceworks Ziff Davis
Infor EAM ASE
Infor EAM ASE
ricardorodalves
Строим сообщество ( или общество единомышленников ) в Интернете . Web -2 нам ...
Строим сообщество ( или общество единомышленников ) в Интернете . Web -2 нам ...
Dmitry Tseitlin
Summary HIMSS Preparation Briefing
Summary HIMSS Preparation Briefing
Paul Woudstra
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Cisco Public Relations
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
Jeff Johnson
CeBIT-Preview Hamburg
CeBIT-Preview Hamburg
FujitsuSiemensComputers
Preventing CRM failures
Preventing CRM failures
Michael Krigsman
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Sverige
When where why cloud
When where why cloud
reshmaroberts
When Where Why Cloud
When Where Why Cloud
reshmaroberts
What is an information professional?
What is an information professional?
John Mancini
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
John Mancini
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
OW2
Scala in our BRMS
Scala in our BRMS
scalaconfjp
Agile BI : meeting the best of both worlds from departmental and enterprise BI
Agile BI : meeting the best of both worlds from departmental and enterprise BI
Jean-Michel Franco
Ähnlich wie SOC/NOC Convergence by Spire Research
(20)
CDS in Regenstrief's New Gopher CPOE
CDS in Regenstrief's New Gopher CPOE
Information Management on Mobile Steroids
Information Management on Mobile Steroids
Managing the Data Center with JBoss SOA-P
Managing the Data Center with JBoss SOA-P
SmartData - Monetizing Data Assets
SmartData - Monetizing Data Assets
How to succeed in the cloud
How to succeed in the cloud
Infor EAM ASE
Infor EAM ASE
Строим сообщество ( или общество единомышленников ) в Интернете . Web -2 нам ...
Строим сообщество ( или общество единомышленников ) в Интернете . Web -2 нам ...
Summary HIMSS Preparation Briefing
Summary HIMSS Preparation Briefing
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
CeBIT-Preview Hamburg
CeBIT-Preview Hamburg
Preventing CRM failures
Preventing CRM failures
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
IBM Rational - Från skriptbaserad ALM till "ALM as a Service" och ALM i Cloud...
When where why cloud
When where why cloud
When Where Why Cloud
When Where Why Cloud
What is an information professional?
What is an information professional?
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Scala in our BRMS
Scala in our BRMS
Agile BI : meeting the best of both worlds from departmental and enterprise BI
Agile BI : meeting the best of both worlds from departmental and enterprise BI
Kürzlich hochgeladen
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
apidays
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Kürzlich hochgeladen
(20)
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
SOC/NOC Convergence by Spire Research
1.
The Future of
SEM and Log Management “NOC your SOCs Off” Pete Lindstrom, CISSP Research Director Spire Security, LLC www.spiresecurity.com petelind@spiresecurity.com Sponsored by: AccelOps, Inc. © 2009 Spire Security. All rights reserved.
2.
Introducing IT Service
Management ITSM parallels the move towards service-orientation architectures and business. ITSM incorporates control, administration, and monitoring of the entire infrastructure. ITSM leverages COBIT, ITIL, and ISO standards. 2 2 © 2009 Spire Security. All rights reserved.
3.
Towards Service Management
IT Service Management Increasing levels of abstraction MORE FLEXIBILITY Config, logs, location, context MORE DETAILS Users Data Applications Systems Network Components 3 © 2009 Spire Security. All rights reserved.
4.
Today, silos are
common Budget Budget Tools Tools Budget Budget People People Tools Tools Vulnerability Mgt Service Mgt People People Directory Mgt Network Ops Budget Tools Budget Budget People Budget Tools Tools Trust Mgt Tools People People People Identity Mgt Config Mgt Security Ops 4 4 © 2009 Spire Security. All rights reserved.
5.
But we need
to increase efficiency Budget Budget Budget Budget Tools Tools Tools Tools People People People People Identity Mgt Directory Mgt Trust Mgt Service Mgt Budget Budget Budget Budget Tools Tools Tools Tools People People People People Network Ops Security Ops Vuln Mgt Config Mgt 5 © 2009 Spire Security. All rights reserved.
6.
…and organize by
function Budget Budget Budget Budget Tools Tools Tools Tools People People People People Identity Mgt Directory Mgt Trust Mgt Service Mgt Budget Budget Budget Budget Tools Tools Tools Tools People People People People Network Ops Security Ops Vuln Mgt Config Mgt 6 © 2009 Spire Security. All rights reserved.
7.
From the security
side… Identity Management Trust Management -Privileged user management -Managing policies -Identity tracking / integration -Process management -Administrative controls Threat Management Vulnerability Management - Monitoring of security events -Configuration Management -Monitoring of network events -Vuln/Patch Management -Convergence of NOC / SOC -Asset Management 7 7 7 © 2009 Spire Security. All rights reserved.
8.
Why SOC/NOC Convergence
Optimize resources Align team services and gain operational leverage o Procedures o Controls o Workflows o Reporting Be more responsive to the business 8 © 2009 Spire Security. All rights reserved.
9.
Parallel Processing
Net Ops Center Security Ops Center Network fault Network behavior tolerance anomaly detection Switch/router configuration Intrusion detection Sniffing troubleshooting Log management Systems Network monitoring forensics 9 9 © 2009 Spire Security. All rights reserved.
10.
Typical Control Gaps
Network anomalies and system changes (underlying issue, vulnerability) Identity and location (who and where) Violation or incident affect on business (diminished means to understand impact) 10 10 © 2009 Spire Security. All rights reserved.
11.
Challenges of SOC/NOC
Monitoring Every incident requires multiple paths and troubleshooting Different tools across op silos (is all the data available and how related) Modest correlation across op silos (hinders root-cause, modest collaboration) 11 11 © 2009 Spire Security. All rights reserved.
12.
Choosing Pertinent Tenets
Assessing mandates and best practices Defining supporting controls o Identifying have’s, have not’s and can not’s o Identifying compensating controls Documenting o Policy and business value Review, verification and endorsement o Stakeholders, internal auditors, external auditors Tasks, tools and controls among SOC/NOC 12 © 2009 Spire Security. All rights reserved.
13.
Considerations for the
future Evaluate and integrate complementary technologies o CMDB, NBA and Network Flow, Directory services, Service-desk? Converge with SOC o Monitoring changes o Monitoring traffic patterns o Monitoring identity and acceptable use policy o Integrating incident response with service desk 13 13 © 2009 Spire Security. All rights reserved.
14.
Your feedback is
essential! Pete Lindstrom petelind@spiresecurity.com Blog: spiresecurity.typepad.com © 2009 Spire Security. All rights reserved.
15.
Better SIEM. Beyond
SIEM. May, 2010 © 2010 AccelOps, Inc. - Operationalize Security May, 2010 15 © 2009 Spire Security. All rights reserved.
16.
SIEM Requirements Have
Evolved Users want o Monitor and report against more source attributes o Online data: real-time correlation and long-term analysis o Ongoing, vendor neutral 3rd party device support In addition o Business service impact and priority o Efficient problem/violation detection and investigation Sophisticated attacks & discern security from non-security root-cause o Integrated approach for SOC/NOC convergence o Able to justify for budget: security as part of IT service delivery © 2010 AccelOps, Inc. - Operationalize Security May, 2010 16
17.
AccelOps: Better SIEM.
Beyond SIEM. Challenges Answers Complex Threats and Environment Limited Monitoring & Reporting Difficult to Scale Out Single pane of glass – Intelligence at your fingertips Timely Device Support End-to-end visibility – service, performance, availability, security, change and compliance management Efficiency – proactive monitoring, expedited root-cause analysis Lack IT Service flexible search/reporting Awareness Increased uptime and secure delivery of service Budget for Value – easy to use, implement and scale with rich feature set Isolated Security Tools Virtual Appliance or SaaS © 2010 AccelOps, Inc. - Operationalize Security May, 2010 17
18.
Cross-Correlated DC/Cloud Monitoring
Platform Rich, Powerful Set of Capabilities: SIEM and Beyond Integrated, Cross-correlated IT monitoring functions: quickly root-out security from non-security incidents Configuratio Business Application Network Systems n Security/Log Virtualization Service Performance Management Management Management Management Management Management Management / CMDB Event Identity & Data Center Compliance Management Asset Network Ticketing Location Hardware Automation / Enterprise Management Visualization System Management Management Search Foundation AccelOps Platform Discovery, CMDB, Analytics, Reports, Data Management, Clustering © 2010 AccelOps, Inc. - Operationalize Security May, 2010 18
19.
Comprehensive Security Event
Information Management with Customizable Dashboards Readily track security and compliance relevant issues © 2010 AccelOps, Inc. - Operationalize Security May, 2010 19
20.
Automated Compliance Monitoring
and Reporting Built-in and extensible rules and reports mapped to compliance standards © 2010 AccelOps, Inc. - Operationalize Security May, 2010 20
21.
Breakdown Operational Silos: Performance,
Availability, Security and Change Mgmt. Rapidly see where problems exist via interactive hotspots and alerts – instant drill see where Rapidly through to problems exist via incident details for complete operational KPIs, “who, what,hotpsots and how & why, when, alerts where” details © 2010 AccelOps, Inc. - Operationalize Security May, 2010 21
22.
Advance Service-Oriented Management: Proactive
Monitoring and Efficient Root-cause Service-carousel enables IT team to collaborate and respond to service issues Identify issues, problems, root-cause and be able to prioritize based on business service © 2010 AccelOps, Inc. - Operationalize Security May, 2010 22
23.
AccelOps – Integrated
Datacenter Monitoring Intelligent. Proactive. Secure Integrated Datacenter and Cloud Monitoring Solution o Performance & Availability o Security & Compliance o Change Management With a Business Service Perspective Better SIEM, Beyond SIEM o Single pane of glass: end-to-end visibility o Operational security: enable IT become part of SLA delivery o Operational efficiency: proactive & rapid root-cause analysis (< MTTR) o Increased uptime and service reliability Implementation flexibility and scale o Virtual Appliance o SaaS AO-VA AO-SaaS © 2010 AccelOps, Inc. - Operationalize Security May, 2010 23