Log Management

Identifying and collecting pertinent information is the most essential part of log management. Purchasing an expensive system alone does not solve this problem – the goals of the service must be defined in advance.

Effective log management means planned production, collection, storage, utilization and deletion of logs – covering their entire lifecycle. Log management essentially comprises log management policy to provide direction, effective processes to maintain continuity and professional personnel to ensure issues are acted upon. The activity itself must be carefully planned to prepare for unexpected situations.

Log Management

In technical terms, log management functions by collecting log events from several systems to a centralized log server, where the information is properly stored and maintained. In addition, it is easier to extract information for specific purposes from a centralized location, be that purpose information security or activity monitoring or customer environment analysis.
Compliance

Requirements are included in Council of State’s statute concerning information security in public administration, PCI DSS, KanTa archive of Ministry of Social Affairs and Health, ISO27001 and Cobit.

Log policy

A log policy creates the foundation for log management and guides the definition of technical requirements, while incremental implementation enables reaping of early benefits - critical components are integrated first.

Log Management Starter Kit

If the goals and the scope are clear, Log Management Starter Kit is an effective solution, that can, for example, cover monitoring requirements for security levels and patient information systems.

Security Information and Event Management (SIEM)

Operational view to status of information security.
Read more

Digital Identity for B2B and collaboration

Access management and Single Sign-On solutions for smoother day-to-day operations.
Read more

Nixu Watson

Effortless vulnerability management for CISO.
Read more