Download presentation
Presentation is loading. Please wait.
Published byBritton Stone Modified over 9 years ago
1
1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool
2
2 Visualizer Helps you Understand & Implement Security “With Visualizer, understanding and implementing security is easy!” 65 Or get an analysis of security data in graphical user-friendly format. …and create a security rule based on an actual event. 4 3 With Visualizer you can easily isolate a single event out of millions of log entries… 2 “To create a security rule, I have to actually write a program…” 1 “There are millions of log entries – it’s so hard to find a specific entry.”
3
3 Business Intelligence product for presentation, investigation and analysis of security warehouse log data and query output from: Firewall- to analyze network accesses Audit- to analyze QAUDJRN system journal events AP-Journal – to analyze the log of business-critical data fields which were accessed or changed User Profile Reports- to analyze all User Profile information Instantaneous “Slice & Dice” response, regardless of database size Pinpoints exceptions and trends, easily finds the “needle in the haystack” Visualizer Features
4
4 Nightly Maintenance Job Audit Statistics File Firewall Statistics File Firewall Audit Visualizer How Visualizer obtains Audit & Firewall Data Daily Log Files
5
5 Accessing Visualizer from the iSecurity GUI
6
6 Filter Audit Log Data No. of Entries on each Date Graphical display of most frequent Dates Visualizer’s workspace Lower tabs for “slice and dice’
7
7 Supports 3D/2D, Vertical and Horizontal Graphs
8
8 Visualizer Firewall Example: Sort all Servers by Quantity, Filter by 2 SQL Servers
9
9 Filter by IPs relevant for investigation/interrogation
10
10 Add filter for relevant Libraries
11
11 Add Filter for most frequent Objects
12
12 Add Filter for Date Range
13
13 Select 3 Rejected Accesses; click “Drill to Data” Click “Drill to Data”
14
14 View Firewall log records, select one and click on Create Detection Rule
15
15 New Detection Rule pre-populated with data from actual Firewall log event Note Varying Conditions
16
16 Print a Report in HTML
17
17 Please visit us at www.razlee.com Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.