|
|
|
CentralMon™ Applicance
CentralMon™ - Your EYE to Security Incident
As the network security technology becomes more complex, different brands of security devices are employed to provide a more comprehensive protection to the network. Log data management is hence becoming a vital element in managing network security, regulatory compliance and network availability in corporations today. Unmanageable of different logs and events which fired from different devices located diversely, even within a site, implies inadequate information for monitoring network activities which enhance the network vulnerability to attacks. Immediate, efficient and effectively responses to attacks can not be made either. This rising security concerns is now proceeding into both managerial and operational views in many corporations. Security Information Management (SIM) is hence an indispensable solution to satisfy the urgent needs. |
|
|
|
|
Security Information Management defines the process of collecting, analyzing and reporting security-relevant information. It helps in controlling the security infrastructure instead of being controlled by them. Security Event Management assists in analyzing the collected logs and events from various security devices, revealing true attacks and at the same time generating real alerts to administrators in manageable manner. The tools and workflow for the security staff to protect the organization are provided. The business continuity is hence greatly ensured. |
|
|
|
|
CentralMon™
|
|
CentralMon™ is an innovative product of combination Security Information Management and Security Event Management into one single platform. It enables security cross-products integration with incident handling in a centralized management console as integrated Security Incident Solution. Logs and events from all disparate security infrastructure are centrally collected, normalized, correlated and transformed into meaningful information. Real-time events and post-event analysis can benefit corporations in efficiently and effectively resolve the network security threats in a cost-saving manner. |
|
|
|
|
|
Centralized Management
|
|
Maximizes value of existing security investment by unifying security process across geographies, disparate security technologies, and network tiers. CentralMon™ empowers you to manage huge amounts of security event from various security devices in a single GUI (Graphical User Interface) management console; which satisfies essential security tasks in monitoring, alerting, query, analysis, action, as well as technical and management reporting. |
|
|
|
|
Customize Your Network and Visualization
|
|
Customization of network environment and security products is one of the critical issues to handle false alarms and security events. CentralMon™ helps you to filter false alarms and visualize the intrusion scenario cases on your management console with prioritization; which draws your attention on the most significant security events and gets understanding in a fast way by GUI representation. |
|
|
|
|
Incident Identification and Workflow Control
|
|
It connects security knowledge to action by coordinating and tracking response activities throughout the incident lifecycle helping enterprises respond quickly and effectively, thereby minimizing the business impact of information security breaches. |
|
|
|
|
Event Correlation and Cross-Product Analysis
|
|
Because few standards exist today in the world of information security, security devices themselves do not adhere to common criteria when producing security event information. So, while multi-vendor firewalls and IDS / IPS may perform a similar function, their event information looks very different. CentralMon™ helps in normalization and handles cross-product security alarms and event logs into single normalized dataset for correlation analysis and visualize in a single management console. |
|
|
|
|
Comprehensive Report
|
|
With providing both managerial level and technical level reports; including summary charts in top attacks with daily, weekly, or monthly basis, as well as technical details information about each intrusion scenario case in graphical or log formats.
CentralMon™ generates reports with whole security pictures for your network environment, instead of pieces information from individual security devices; and also, it allows for scheduling of report generation and welcome for customization of client's own report types and report formats. |
|
|
Model |
EM-10/25/Advance |
GSM-A1 |
GSM-NK |
KR-100 |
Device Support |
10/25/ Optional |
N/A |
N/A |
N/A |
Form Factor |
2U |
2U |
2U |
2U |
Storage |
36G |
450GB |
72GB |
500GB |
Storage Mirror |
Optional |
Optional |
Optional |
Optional |
Memory |
1GB/2GB/4GB |
1G |
1G |
4GB |
Network Interface |
2 GE,copper |
2 GE,copper |
2 GE,copper |
2 GE,copper |
Maximum Network Interface |
12 GE,copper/fiber |
12GE,copper/fiber |
12 GE,copper/fiber |
8 GE,copper/fiber |
System Management |
Remote/Console |
Remote/Console |
Remote/Console |
Remote/Console |
Function |
Log Collection |
Management console
&Secure Data Server |
Management console
|
Secure Data Server |
Redundant Power Supply |
Optional |
Optional |
Optional |
Optional |
Temperature |
5oC-40oC |
5oC-40oC |
5oC-40oC |
5oC-40oC |
Humidity |
20%-80%
non-condensing |
20%-80%
non-condensing |
20%-80%
non-condensing |
20%-80%
non-condensing |
|
|
|
|
|
|