SlideShare a Scribd company logo
Central Intelligence SIEM
 Predictive Security Intelligence




Axxera Central Intelligence SIEM is an ITIL process driven platform, which collects,
stores and analyzes events across any enterprise. The intelligent correlation helps to
combat security threats and maintain the security posture for compliancy and auditing.

                                                                             Highlights:
Key Features:                                                                  Intelligence based
                                                                                 Correlation
                                                                               Store all security
Threat Detection and Prioritization
                                                                                 information in a single
                                                                                 data store
Internet-based threats and fraud continue to proliferate in today’s
complex networks. Central Intelligence SIEM consolidates information
                                                                               ITIL based Ticketing
to more effectively detect and manage complex threats. The                       System
hierarchical and process driven architecture of Central Intelligence           Advanced Forensic
SIEM engine, Central Intelligence Logger, and the Central Intelligence           Analysis
Sensors allow seamless communication over encrypted connections to             Compliance Reports and
address the largest and most complex networks. The information is                Dashboards
normalized, correlated and ITIL processed to quickly deliver
                                                                               Real-time Analysis and
intelligence that allows organizations to detect, notify and respond to
                                                                                 Reporting
threats missed by other security solutions with isolated visibility.
                                                                               Centralized
Collection of Events                                                              Console/Portal

       Security Events – IDS/IPS (Network, Wireless and Host), Firewall, VPN etc.
       Vulnerability Scanners – Servers, Databases, Network Devices etc.
       Network Events – Switches, Routers, Servers, Hosts etc.
       Application Logs – ERP, Web, Email, Workflow, Application Databases etc.
       Others – DLP, Forensic Tools, Network Traffic Analysis Tools etc.


Built-in ITIL Framework-Ticketing System

As soon as an event is identified, a ticket (incident record) is automatically created. This auto-ticketing process
pre-populates the incident record with all known details, such as device/application name, type, location, the
time of occurrence, and the performance issue. Auto-ticketing brings tremendous efficiency to your support
staff, ensures that records are complete and accurate, and accelerates your incident response time.




                                                                                                      www.axxera.com
Other event management tool vendors require extensive integration projects to approximate Axxera’ range of
capabilities. With Central Intelligence, necessary technologies such as monitoring, event handling, correlation,
configuration management and ticketing are pre-integrated, providing seamless automation.


Axxera Connectors

Axxera Central Intelligence connectors are an important part of the platform. They collect events from hundreds of
devices in native format, and then they normalize those to a common, well-defined format so that you can
compare and analyze very disparate events. The connectors collect locally and then send the normalized events to
our logging and correlation products in a guaranteed, secure, and bandwidth-efficient manner.


Log Management Framework

                                                                         Axxera Central Intelligence
The Axxera’s Central Intelligence Logger is an Open Log
Management platform allows customers to collect and analyze
                                                                         platform is used to secure the
all of their log data from virtually any device, application or          world’s most demanding
operating system, with features that ensure information                  organizations. Central
intelligence and increase efficiency. CI Logger Open Log                 Intelligence monitors all events
Management      provides    agile     reporting   and   fast   search    across the enterprise, and uses
capabilities, as well as security features to protect data integrity,    powerful correlation and
allowing for reliable long-term storage of unaltered log data.
                                                                         analysis to identify business
                                                                         and technology threats. Built
Infection Detection                                                      on a flexible, extensible
                                                                         platform, Central Intelligence
Regardless of how malware enters your network (through
                                                                         enables the monitoring of
innocent web surfing, email attachments, direct exploit, or by
attaching your laptop to the wrong wireless network), once a             business objects, transactions
machine within your perimeter is compromised your whole                  and users to mitigate risks to
network is under threat. Infection Detection helps you quickly           the organization.
identify and isolate these infected machines, and helps you
figure out who really owns your computers.


Forensic Analysis

Understand the Who, What and Where behind Every Risk. Axxera’s Central Intelligence Real-time, location-based
and historical searching of flow and event data for analysis and forensics greatly improves the ability to assess
activities and incident resolution.


                                                                                                    www.axxera.com
Central Intelligence SIEM
                   Predictive Security Intelligence




Availability and Performance

Axxera Central Intelligence built-in availability and performance connectors will constantly monitor any device in
an organization. Security effects Availability, Availability effects Performance, Performance effects Security, this
triangle concept of Axxera greatly helps organizations to combat and mitigate security threats.


Early Warning System

Axxera uses threat intelligence from sensors across the Internet; this reputation-based service continually updates
our customers’ backbone routers with a personalized global threat lists to prevent inbound and outbound
connection to malware sources and botnet controllers.


Compliance Management

Axxera Central Intelligence enables organizations to collect,
                                                                        Axxera Inc,
store, and analyze log data as well as proactively monitor and          2 Park Plaza, Suite 200, Irvine
respond to security threats in order to meet IT risk and                CA 92614 USA
compliance requirements. It can proactively monitor, collect and        Phone: +1 (949) 861- 4552
respond to various event data and security threats, and correlate
the impact of incidents based on their criticality to business
operations, or the level of compliance to various mandates.
Axxera Central Intelligence provides prebuilt dashboards,
reports and rules templates for the following regulations and
                                                                        Copyright 2011 Axxera Inc. All
control frameworks: PCI DSS, HIPAA, FISMA, GLBA, ISO/IEC
                                                                        rights reserved. Axxera logo,
27001, and SOX                                                          Predictive Security Intelligence, and
                                                                        Central Intelligence are trademarks
                                                                        or registered trademarks of Axxera
Centralized Portal/Console
                                                                        , Inc. All other company or product
                                                                        names mentioned may be
Axxera Central Intelligence provides a solid foundation for an
                                                                        trademarks, registered trademarks,
organization’s Security Operations Center by providing a                or service marks of their respective
centralized user interface that offers role-based access by             holders. The specifications and
function and a global view to access real-time analysis, incident       information contained herein are
management and reporting. Portal / Console is an enterprise-            subject to change without notice.
ready solution for the collection, reporting, and remediation
management of security events affecting           your network.
Regardless of the size or configuration of your network, it
provides a centralized console to manage task delegation and
enable efficient review of remediation efforts.



                                                                                                    www.axxera.com
Central Intelligence SIEM
                 Predictive Security Intelligence




Specifications

      Model                  AX1000                       AX2000                       AX3000
       OS                                               RHEL 5 64-bit
  Compression                                              10:01
     Devices                                             Unlimited
     Max EPS                    500                          2500                      5000
                     1 x Intel Xeon 3400         2 x Intel Xeon E5600       2 x Intel Xeon E5600
       CPU           series                      series                     series
      RAM                      8GB                         16GB                         32GB
     Storage                 1 x 1TB                      1 x 1TB                      4 x 1TB
      Chasis                                                 1U
      Power                  280 W                         560W                        650W
     Ethernet
    Interfaces                                 4 x 1GB Ethernet Ports Standard
   Dimensions         19.8" x 17.76" x 1.69"        25.6" x 17.2" x 1.7"         27.6" x 17.2" x 1.7"

Axxera SIEM is available either as software or as a rack-mountable appliance. Actual performance will
depend on factors specific to a user’s environment.




                                                                                                    www.axxera.com

More Related Content

What's hot

G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
Satya Harish
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
Amazon Web Services
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
M sharifi
 
Stone gate ips
Stone gate ipsStone gate ips
Stone gate ips
Multibyte Consultoria
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
Vikrant Kansal
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
EMC
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
George Wainblat
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Ahmed Al Enizi
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 
Cloud computing security plan for compliance
Cloud computing security   plan for complianceCloud computing security   plan for compliance
Cloud computing security plan for compliance
Intel IT Center
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
Austin Eppstein
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
Harriet Schneider
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Ahmed Al Enizi
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
CMR WORLD TECH
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Andris Soroka
 
Siem Overview 2009
Siem Overview 2009Siem Overview 2009
Siem Overview 2009
johndyson1
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
Jerome Chapolard
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
Cisco Canada
 

What's hot (20)

G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Stone gate ips
Stone gate ipsStone gate ips
Stone gate ips
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Cloud computing security plan for compliance
Cloud computing security   plan for complianceCloud computing security   plan for compliance
Cloud computing security plan for compliance
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
2015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #22015 AUG 24-Overview Version #2
2015 AUG 24-Overview Version #2
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Siem Overview 2009
Siem Overview 2009Siem Overview 2009
Siem Overview 2009
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 

Similar to Axxera Siem

Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdf
infosec train
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
AmrMousa51
 
UEBA
UEBAUEBA
Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptx
CompanySeceon
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
Greg Hanchin
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
wardell henley
 
cyber
cybercyber
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Prometix Pty Ltd
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
CompanySeceon
 
Seceon Open Threat Management Platform.pptx
Seceon Open Threat Management Platform.pptxSeceon Open Threat Management Platform.pptx
Seceon Open Threat Management Platform.pptx
CompanySeceon
 
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptxSeceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
CompanySeceon
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
webhostingguy
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
gemmarie1
 
Apcon intellastore security visibility platform
Apcon intellastore security visibility platformApcon intellastore security visibility platform
Apcon intellastore security visibility platform
apconinc
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_Insight
Tim Bell
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
SilvioPappalardo
 

Similar to Axxera Siem (20)

Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdf
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 
UEBA
UEBAUEBA
UEBA
 
Open Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptxOpen Threat Management Platform in USA.pptx
Open Threat Management Platform in USA.pptx
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
 
cyber
cybercyber
cyber
 
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Seceon Open Threat Management Platform.pptx
Seceon Open Threat Management Platform.pptxSeceon Open Threat Management Platform.pptx
Seceon Open Threat Management Platform.pptx
 
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptxSeceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
Seceon's aiXDR_ Automating Cybersecurity Threat Detection in 2023 - Seceon.pptx
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
information security technology
information security technologyinformation security technology
information security technology
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Apcon intellastore security visibility platform
Apcon intellastore security visibility platformApcon intellastore security visibility platform
Apcon intellastore security visibility platform
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_Insight
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
 

Axxera Siem

  • 1. Central Intelligence SIEM Predictive Security Intelligence Axxera Central Intelligence SIEM is an ITIL process driven platform, which collects, stores and analyzes events across any enterprise. The intelligent correlation helps to combat security threats and maintain the security posture for compliancy and auditing. Highlights: Key Features:  Intelligence based Correlation  Store all security Threat Detection and Prioritization information in a single data store Internet-based threats and fraud continue to proliferate in today’s complex networks. Central Intelligence SIEM consolidates information  ITIL based Ticketing to more effectively detect and manage complex threats. The System hierarchical and process driven architecture of Central Intelligence  Advanced Forensic SIEM engine, Central Intelligence Logger, and the Central Intelligence Analysis Sensors allow seamless communication over encrypted connections to  Compliance Reports and address the largest and most complex networks. The information is Dashboards normalized, correlated and ITIL processed to quickly deliver  Real-time Analysis and intelligence that allows organizations to detect, notify and respond to Reporting threats missed by other security solutions with isolated visibility.  Centralized Collection of Events Console/Portal  Security Events – IDS/IPS (Network, Wireless and Host), Firewall, VPN etc.  Vulnerability Scanners – Servers, Databases, Network Devices etc.  Network Events – Switches, Routers, Servers, Hosts etc.  Application Logs – ERP, Web, Email, Workflow, Application Databases etc.  Others – DLP, Forensic Tools, Network Traffic Analysis Tools etc. Built-in ITIL Framework-Ticketing System As soon as an event is identified, a ticket (incident record) is automatically created. This auto-ticketing process pre-populates the incident record with all known details, such as device/application name, type, location, the time of occurrence, and the performance issue. Auto-ticketing brings tremendous efficiency to your support staff, ensures that records are complete and accurate, and accelerates your incident response time. www.axxera.com
  • 2. Other event management tool vendors require extensive integration projects to approximate Axxera’ range of capabilities. With Central Intelligence, necessary technologies such as monitoring, event handling, correlation, configuration management and ticketing are pre-integrated, providing seamless automation. Axxera Connectors Axxera Central Intelligence connectors are an important part of the platform. They collect events from hundreds of devices in native format, and then they normalize those to a common, well-defined format so that you can compare and analyze very disparate events. The connectors collect locally and then send the normalized events to our logging and correlation products in a guaranteed, secure, and bandwidth-efficient manner. Log Management Framework Axxera Central Intelligence The Axxera’s Central Intelligence Logger is an Open Log Management platform allows customers to collect and analyze platform is used to secure the all of their log data from virtually any device, application or world’s most demanding operating system, with features that ensure information organizations. Central intelligence and increase efficiency. CI Logger Open Log Intelligence monitors all events Management provides agile reporting and fast search across the enterprise, and uses capabilities, as well as security features to protect data integrity, powerful correlation and allowing for reliable long-term storage of unaltered log data. analysis to identify business and technology threats. Built Infection Detection on a flexible, extensible platform, Central Intelligence Regardless of how malware enters your network (through enables the monitoring of innocent web surfing, email attachments, direct exploit, or by attaching your laptop to the wrong wireless network), once a business objects, transactions machine within your perimeter is compromised your whole and users to mitigate risks to network is under threat. Infection Detection helps you quickly the organization. identify and isolate these infected machines, and helps you figure out who really owns your computers. Forensic Analysis Understand the Who, What and Where behind Every Risk. Axxera’s Central Intelligence Real-time, location-based and historical searching of flow and event data for analysis and forensics greatly improves the ability to assess activities and incident resolution. www.axxera.com
  • 3. Central Intelligence SIEM Predictive Security Intelligence Availability and Performance Axxera Central Intelligence built-in availability and performance connectors will constantly monitor any device in an organization. Security effects Availability, Availability effects Performance, Performance effects Security, this triangle concept of Axxera greatly helps organizations to combat and mitigate security threats. Early Warning System Axxera uses threat intelligence from sensors across the Internet; this reputation-based service continually updates our customers’ backbone routers with a personalized global threat lists to prevent inbound and outbound connection to malware sources and botnet controllers. Compliance Management Axxera Central Intelligence enables organizations to collect, Axxera Inc, store, and analyze log data as well as proactively monitor and 2 Park Plaza, Suite 200, Irvine respond to security threats in order to meet IT risk and CA 92614 USA compliance requirements. It can proactively monitor, collect and Phone: +1 (949) 861- 4552 respond to various event data and security threats, and correlate the impact of incidents based on their criticality to business operations, or the level of compliance to various mandates. Axxera Central Intelligence provides prebuilt dashboards, reports and rules templates for the following regulations and Copyright 2011 Axxera Inc. All control frameworks: PCI DSS, HIPAA, FISMA, GLBA, ISO/IEC rights reserved. Axxera logo, 27001, and SOX Predictive Security Intelligence, and Central Intelligence are trademarks or registered trademarks of Axxera Centralized Portal/Console , Inc. All other company or product names mentioned may be Axxera Central Intelligence provides a solid foundation for an trademarks, registered trademarks, organization’s Security Operations Center by providing a or service marks of their respective centralized user interface that offers role-based access by holders. The specifications and function and a global view to access real-time analysis, incident information contained herein are management and reporting. Portal / Console is an enterprise- subject to change without notice. ready solution for the collection, reporting, and remediation management of security events affecting your network. Regardless of the size or configuration of your network, it provides a centralized console to manage task delegation and enable efficient review of remediation efforts. www.axxera.com
  • 4. Central Intelligence SIEM Predictive Security Intelligence Specifications Model AX1000 AX2000 AX3000 OS RHEL 5 64-bit Compression 10:01 Devices Unlimited Max EPS 500 2500 5000 1 x Intel Xeon 3400 2 x Intel Xeon E5600 2 x Intel Xeon E5600 CPU series series series RAM 8GB 16GB 32GB Storage 1 x 1TB 1 x 1TB 4 x 1TB Chasis 1U Power 280 W 560W 650W Ethernet Interfaces 4 x 1GB Ethernet Ports Standard Dimensions 19.8" x 17.76" x 1.69" 25.6" x 17.2" x 1.7" 27.6" x 17.2" x 1.7" Axxera SIEM is available either as software or as a rack-mountable appliance. Actual performance will depend on factors specific to a user’s environment. www.axxera.com