sb-au logo
Story image

ManageEngine extends SIEM log management capabilities to cloud

24 Jul 2018

ManageEngine is continuing to embrace cloud capabilities, and this time the focus is on its security information and event management (SIEM) solution.

The company’s Log360 solution now allows IT adminstrators to both store and managed log data collected from on-premise environments across Zoho’s secure cloud platform.

This, according to ManageEngine, allows enterprises to leverage log management to gain insight on critical aspects of their network, without having to worry about storage infrastructure.

The company cites Gartner research that predicts cloud-based SIEM deployments will reach $512.1 million by 2019.

“Small and midsize businesses (SMBs) are driving growth as they are becoming increasingly aware of security threats. They are also seeing that cloud deployments provide opportunities to reduce costs, especially for powering and cooling hardware-based security equipment and data centre floor space,” the research says.

ManageEngine has clearly seen the benefits of cloud-based SIEM. According to ManageEngine director of program management, Manikandan Thangara, Log360 Cloud provides the best of both security and cloud storage to enterprises.

“We’re broadening the scope of Log360 and moving it to the cloud because that’s what customers want — easy deployment and management, pay-for-what-you-use pricing, and a secure cloud platform that can take the burden of in-house infrastructure off their shoulders,” comments Thangaraj.

ManageEngine has previously tested the beta version of Log360 Cloud on a number of Log360 customers, with positive feedback.

According to  Log360 Cloud user Jeffery Prichard, senior security consultant at Falcon Network Services, a managed service provider (MSP), the company’s security operations team has heavily relied on the platform.

Ryan Hedlof, technology vice president of A Marketing Resource (AMR) and another Log360 Cloud user, says, “Log360 Cloud has really become a key security partner for me. We were able to reduce our cyber threats by two-thirds.”

Log360 Cloud features:

Key features that make Log360 Cloud stand out from other cloud-based log management solutions include:

  • Quick installation, with the ability to be up and running within a few minutes after the log collection agent is installed and devices are configured.
  • Secure cloud platform to store and manage logs.
  • Powerful log search engine that can quickly perform forensic and root cause analysis.
  • Security audit reports that give administrators information on who did what, when and from where in the network.
  • Integrated IT compliance module with reports that help meet compliance mandates.

Log360 Cloud is available now. Pricing is based on the volume of stored logs. A fully-functional 30-day trial is also available.

Story image
ESET uncovers chat app malware spying and stealing user's data
The Welcome Chat espionage app belongs to a known Android malware family and shares infrastructure with a previously documented espionage campaign named BadPatch, which also targeted the Middle East.More
Download image
Architecting hybrid IT and edge for digital advantage
Enterprises can create a low-latency architecture with private connections that bypass the internet entirely. The end result? Better reliability.More
Story image
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. More
Story image
Attack volumes, breach levels and security investment all rise in Australia
94% of 250 high-level executives around Australia surveyed in a report released today from VMware have noticed a surge in attack volume, which has, in turn, prompted increased investment in cyber-defence.More
Story image
New report reveals countries most targeted by 'significant' cyber-attacks
Specops Software has unveiled its report listing the countries most-often falling victim to assaults on government agencies, defence departments and other high-value infrastructure.More
Download image
Email: The most common way cyber threats pierce organisations
Learn about the threats, the possible aftermath, as well as how to protect your people and your systems from email-borne attacks.More