Story image

ManageEngine prepped for Aussie breach reporting law

20 Feb 2018

ManageEngine, the real-time IT management company, has announced that it has enhanced Log360, its security information and event management (SIEM) solution, to fit the Australian Privacy Act’s requirements for mandatory breach reporting.

With updates to its event correlation engine, predefined reports, and alert profiles, Log360 helps enterprises implement mitigation strategies prescribed by the Australian Signals Directorate (ASD) and comply with the Notifiable Data Breaches scheme.

"Threats have advanced faster than security defence mechanisms, making it virtually impossible to prevent attacks,” says ManageEngine director of product management Manikandan Thangaraj.

“It's time for enterprises to focus on strengthening their incident detection and response capabilities to mitigate breaches when they do occur. We've been enhancing our security auditing capabilities over the last 12 months to help security teams quickly detect data breaches and create an accountable incident resolution and reporting process."

In preparation for the new Privacy Act requirements coming later this month, Log360 has been adding more security use cases to its event correlation engine to help enterprises notify the appropriate individuals when a data breach occurs.

Log360 has also enhanced its predefined reports and alert profiles with support for new vendors including Barracuda, Sophos, and WatchGuard.

Together, these enhancements enable security teams to implement measures for detecting and responding to cybersecurity incidents, as prescribed by the ASD.

The following Log360 features help Australian enterprises comply with the Privacy Act and implement the ASD's recommendations:

Event correlation and alerting - The recently enhanced event correlation engine includes predefined rules to help security teams detect and defeat complex attacks, including updated rules for detecting suspicious SQL backups and unauthorised installation of services and software.

Threat intelligence - Detect malicious traffic with Log360's threat intelligence features, including a built-in STIX/TAXII feed processor and a global IP threat database.

In-depth log collection and auditing - Predefined reports, including new vendor-specific reports, give administrators complete visibility into their security framework. Collect and audit log data from workstations, servers, domain controllers, databases, web servers, files/folders, firewalls, routers, switches, and security solutions to ensure tight network security.

Streamlined incident management - Integrate Log360 with ticketing tools like ManageEngine ServiceDesk Plus and ServiceNow. Generate a ticket for every security alert and automatically assign it to an administrator to ensure efficient and accountable incident resolution.

Log search and forensics - Leverage the log engine to backtrack enterprise breaches and file a detailed incident report to the authorities.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.