sb-au logo
Story image

ManageEngine prepped for Aussie breach reporting law

20 Feb 2018

ManageEngine, the real-time IT management company, has announced that it has enhanced Log360, its security information and event management (SIEM) solution, to fit the Australian Privacy Act’s requirements for mandatory breach reporting.

With updates to its event correlation engine, predefined reports, and alert profiles, Log360 helps enterprises implement mitigation strategies prescribed by the Australian Signals Directorate (ASD) and comply with the Notifiable Data Breaches scheme.

"Threats have advanced faster than security defence mechanisms, making it virtually impossible to prevent attacks,” says ManageEngine director of product management Manikandan Thangaraj.

“It's time for enterprises to focus on strengthening their incident detection and response capabilities to mitigate breaches when they do occur. We've been enhancing our security auditing capabilities over the last 12 months to help security teams quickly detect data breaches and create an accountable incident resolution and reporting process."

In preparation for the new Privacy Act requirements coming later this month, Log360 has been adding more security use cases to its event correlation engine to help enterprises notify the appropriate individuals when a data breach occurs.

Log360 has also enhanced its predefined reports and alert profiles with support for new vendors including Barracuda, Sophos, and WatchGuard.

Together, these enhancements enable security teams to implement measures for detecting and responding to cybersecurity incidents, as prescribed by the ASD.

The following Log360 features help Australian enterprises comply with the Privacy Act and implement the ASD's recommendations:

Event correlation and alerting - The recently enhanced event correlation engine includes predefined rules to help security teams detect and defeat complex attacks, including updated rules for detecting suspicious SQL backups and unauthorised installation of services and software.

Threat intelligence - Detect malicious traffic with Log360's threat intelligence features, including a built-in STIX/TAXII feed processor and a global IP threat database.

In-depth log collection and auditing - Predefined reports, including new vendor-specific reports, give administrators complete visibility into their security framework. Collect and audit log data from workstations, servers, domain controllers, databases, web servers, files/folders, firewalls, routers, switches, and security solutions to ensure tight network security.

Streamlined incident management - Integrate Log360 with ticketing tools like ManageEngine ServiceDesk Plus and ServiceNow. Generate a ticket for every security alert and automatically assign it to an administrator to ensure efficient and accountable incident resolution.

Log search and forensics - Leverage the log engine to backtrack enterprise breaches and file a detailed incident report to the authorities.

Story image
Video: 10 Minute IT Jams - Who is Vectra AI?
Today, Techday spoke with Vectra AI head of security engineering Chris Fisher, who discusses the company's key products and offerings, updates on its operations in the A/NZ region, and the latest improvements on its products.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Metallic adds data management and GDPR compliance
Now GDPR compliant, additions to the portfolio include eDiscovery features and support for Microsoft Hyper-V and Azure Blob and File storage.More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Download image
Business culture key to delivering effective cybersecurity
Cybersecurity requires not only technology, but a security culture in your workforce. More