Você está na página 1de 6

Secospace eLog

Secospace eLog
Secospace eLog

Product Overview
With the development of networks, security events continually Based on current ICT trends, customer surveys, and problem
occur on hosts, databases, and Web servers. These range collection and analysis, Huawei Symantec Technologies Co.,
from Trojans, worms, and SQL injections, to Web page or data Ltd. (hereinafter referred to as Huawei Symantec) has launched
tampering by staff. How can we detect these events? How can its high performance security auditing system.
we investigate them and collect evidence? The Secospace eLog is an intelligent log management and
The information age has arrived. As the information technology security auditing system providing excellent performance,
strengthens, application systems (service systems, operating reliability, security, and scalability. Its functions include: log
systems, databases, and Web servers), security devices (firewalls, collection, analysis, association, auditing, alarms, storage,
UTM, IPS, IDS, VPN, DPI, and AV), and network devices (routers, queries, and reports. It is applicable to the security devices,
switches, and access devices) expand. A comprehensive and network devices, operating systems, databases, and Web
unified log management system is essential to manage the servers of Huawei, Huawei Symantec and other major vendors,
logs of all devices ranging across the network, system, and including Cisco, Juniper, and Checkpoint.
application layers.

Product Features
Unified log management for various devices Effective user behavior monitoring, which
•• Huawei & Huawei Symantec security devices (firewalls, helps identify intranet user behaviors and
UTM, IPS, IDS, VPN, and DPI), BRAS devices, routers, and intrusions and attacks by extranet users
switches Through off-line deployment for monitoring devices, the
•• Security devices, routers, and switches of major vendors, Secospace eLog restores and audits for HTTP, FTP, Telnet,
for example, Cisco, Juniper, and Checkpoint and database operations in real time. By interworking with
•• Operating systems (Windows, Linux, and Unix), databases Huawei Symantec UTM devices, the Secospace eLog monitors
(SQL Server, Oracle, DB2, Sybase, and Informix), and Web applications such as AV software, blocking services, URL audits,
servers (IIS and Apache) email audits, instant messages, stocks, games, and P2P. It
effectively tracks the behaviors of network users, and monitors

Intelligent auditing technologies, which the behaviors of intranet users.

ensures the security for application systems


Users can monitor security events by delivering auditing Precise NAT log management, which meets
policies based on auditing templates for abnormal behaviors the requirements of judicial or other auditing
and risky operations. The system delivers association audit departments
policies to a group of devices for associating all operations The Secospace eLog provides NAT log management for
during user logins and logouts into a session. These are firewalls, BRAS devices, and routers to help users with precise
monitored and replayed to implement effective behavior NAT tracking. This complies with laws and regulations and
audits. provides evidence for investigations by judicial or other
Secospace eLog

auditing departments. generates alarm events. The administrator can monitor and
query alarms online and precisely identify threats.

Customer-oriented and robust customization


development, which supports high scalability Diversified log collection modes, which do
and protects customer investment not affect service systems
Based on customers' service characteristics and requirements, The Secospace eLog collects logs in Syslog, SNMP Trap, OPSec,
the Secospace eLog provides is rapidly customizable to meet FTP/SFTP, WMI, and JDBC modes. It uses proactive acquisition
the functions required by customers or to support new device to collect logs for operating systems, databases, and servers
and log types. It analyzes the logs of new devices through without needing an agent program.
online upgrades and provides a Web service interface (of NAT
logs) for calling third-party programs. User-friendly log query methods, which save
time and improves work efficiency
Precise log analysis showing device running The Secospace eLog provides online query and task query.
status Online query can instantly switch to task query.
The Secospace eLog provides the following log types: attack
prevention, traffic monitoring, blacklisting, address binding, Complete security measures, which
operation commands, firewall logins, packet filtering, and safeguard the system
content filtering. It provides the following alarm types: firewall The Secospace eLog secures and verifies log data to ensure log
timeout, attack prevention, interface status and abnormal traffic, accuracy and integrity. Through role-based access control, it
log levels, and keywords. These features reveal network threats. adopts the principle of power separation and HTTPS to ensure
permission, access, and data transmission security.
Robust statistical analysis and multi-
dimensional reports, which complies with Meeting carrier-class reliability requirements
laws and regulations Log collectors that adopt passive collection modes are
Through precise log analysis and statistics, the Secospace configured in N to 1 backup mode. Switchover is supported
eLog provides abundant reports from multiple dimensions in case a log collector fails, which prevents log losses. The
such as the time, log type, flow, security feature, user, and legal Secospace eLog provides a buffer mechanism to avoid data
compliance. This helps users obtain network flow information loss due to a short-term network failure. It records failures or
and attacks, understand network status, and manage logs for abnormal status changes automatically. The system restarts
security and network devices. The solution outputs a series of automatically after a failure to ensure that normal operations
legally compliant audit reports. are maintained. The solution also provides log backup and
recovery.
Real-time and diversified alarm responses
and excellent alarm management, which High log processing performance, which
allow administrators to identify threats meets high-speed data flow requirements
properly Up to 250000 EPS flow logs can be processed on average,
The Secospace eLog provides email, short message, audio, peaking at 300000 EPS. Up to 8000 EPS text logs can be
visual, and sound alarms. It timely detects the events that processed on average with a peak of 9500 EPS. Processing
comply with alarm policies, promptly generates alarms, and performance can be improved by adding a log collector.
Secospace eLog

Massive log storage capability, which meets Flexible deployment, which does not affect
log storage requirements the existing network
The Secospace eLog can connect to external disk arrays or The Secospace eLog provides centralized and distributed
cascading disk arrays to support massive log storage through deployment and supports flexible deployment based on
mature storage solutions. network architecture and customer requirements.

Product Specifications
The Secospace eLog consists of log servers, log collectors, consoles, and probes.

Firewall
UTM

IDS
IPS
VPN
Log Server
Router/BRAS
Log Collector
Switch

Operating console
Systems Web server

Databases

Log Collector
FTP/Telnet/HTTP
probe

Component Description

Audits event management, alarm management, report management, user management, and system
Log server management. Supported operating systems include Windows Server 2003 R2 Standard Edition SP2 and Windows
XP Professional SP2.

Performs log collection, classification, filtering, merging, alarms, and flow statistics. Supported operating systems
Log collector
include Windows Server 2003 R2 Standard Edition SP2 and Windows XP Professional SP2.

Through network flow mirroring, the probe restores HTTP, FTP, and Telnet operations, and restores, monitors, and
Probe
audits Oracle, Sybase, MS SQL Server, DB2, and Informix databases operations based on HTTP, FTP, and Telnet.

The console accesses the Secospace eLog through Microsoft Internet Explorer (6.x or above). The supported
Console
operating system is Windows XP Professional SP2.
Secospace eLog

Typical Deployment
The Secospace eLog is designed with distributed architecture and supports centralized and distributed deployment. Through
flexible deployment, the Secospace eLog meets customers' deployment requirements in different network environments.

Centralized Deployment Distributed Deployment

Probe

Data Center
Log Collector
Data Center

Log Collector
Console
Log Server probe
Console
Probe Log Server

Log Collector

Centralized deployment Distributed deployment


Centralized deployment applies when managed devices Distributed deployment applies when managed devices are
are centralized and the network environment is simple. The dispersed and the network environment is complex. Log
centralized deployment of log servers, log collectors, and collectors and probes are deployed in the dispersed device
probes meets the log management and audit requirements of subnets that require log collection. The log collectors collect
security devices, network devices, hosts, and databases. the processed logs to the log server for unified analysis and
management.
Secospace eLog

Secospace eLog

The information contained in this document is for reference purpose only, do not constitute the warranty of any kind, experss or implied. It is
subject to change or withdrawal according to specific customer requirements and conditions.
All the trademarks, pictures, and brands mentioned in this document are the property of Huawei Symantec Technologies Co., Ltd or their
respective holders.

Copyright ©2010 Huawei Symantec Technologies Co., Ltd. All rights reserved.

Version No.: M3-110019999-20100120-V-1.0

Você também pode gostar