Balabit_logo_02_White_No_Slogan

RELIABLE, SCALABLE, SECURE CENTRAL LOG MANAGEMENT

A SYSLOG-NG FOR EVERY NEED

SYSLOG-NG PREMIUM EDITION

SYSLOG-NG Premium Edition (PE) is a highly scalable and customizable log management solution supporting dozens of platforms, including Windows.

You can free your logs from data silos and build a central log transport and management layer that’s reliable, secure and fast.

Besides premium features, we also provide enterprise-grade technical support and training programs.

SYSLOG-NG STORE BOX

SYSLOG-NG Store Box (SSB) is an easy-to-deploy log management appliance to collect, normalize, store, search and audit your logs.

It provides a web-based UI for easy configuration and reporting, ultra-fast full-text search, granular access policies and automated archiving capabilities.

SSB collects and indexes events at a very high speed, providing a secure central log storage to feed downstream security and analytics tools, and allows for effective forensics for incident investigations.

RAPID SEARCH

Whether you need to respond to a security incident, troubleshoot infrastructure issues, or debug applications, searching millions or billions of logs quickly is usually the first step. Having the right log data at the right time easily accessible is critical to your success. With the syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs.

icon04-150x150

SECURE LOG DATA ARCHIVE

Securely manage and archive your log data. Log data often contains senstive information. Personally Identifiable Information (PII), user activity, transactions, and more. The syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data. The largest appliance can store up to 10TB of raw logs.

lock

OPTIMIZING SIEM

SIEM solutions are deployed to protect networks from internal and external threats. They provide alerting and reporting capabilities based on event correlation analysis, but these analyses are only as good as the data collected from devices and applications. syslog-ng is the log management solution that improves the performance of your SIEM solution by reducing the amount and improving the quality of data feeding your SIEM.

siem
Play Video

WHAT IS LOG MANAGEMENT?

Organizations use syslog-ng to reliably and securely collect, process and normalize log messages from across their IT environments, and forward them to Big Data stores and log analytics or store them in an encrypted log store. Watch the video to learn more about Balabit’s syslog-ng solution.

CUSTOMER STORY

THE UNIVERSITY OF EXETER

“We are now able to perform analysis and investigate issues on log files which previously were spread across multiple servers and platforms, allowing for a much faster response to security investigations.” Paul Sandy, Head of IT Governance and Compliance.

With complex networks and large numbers of users, The Universiy of Exeter face a variety of IT operations and security challenges. Discover how Balabit helped the university to centralize the collection and management of large log files from multiple, disparate devices and operating systems.

EXETER

GDPR AND LOG DATA

the Data Protection Regulation requires the restriction of access to personal data. Log data increasingly includes personal data even if an individual’s name isn’t collected. Data subjects are considered natural persons that are identifiable either directly or indirectly. This poses a potentially massive problem for organizations collecting and managing large amounts of logs that include personal data, including email addresses, IP addresses, geolocation data,social security numbers, and health-related data.

SYSLOG-NG Premium Edition and SYSLOG-NG Store Box already offer features that help organizations protect personal data contained in logs. Both can store log messages securely in encrypted, compressed, indexed, and timestamped binary files, so any sensitive data is available only for authorized personnel who have the appropriate encryption key.

balabit gdpr

WOULD YOU LIKE TO LEARN MORE?