Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool.

Similar presentations


Presentation on theme: "1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool."— Presentation transcript:

1 1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool

2 2 Visualizer Helps you Understand & Implement Security “With Visualizer, understanding and implementing security is easy!” 65 Or get an analysis of security data in graphical user-friendly format. …and create a security rule based on an actual event. 4 3 With Visualizer you can easily isolate a single event out of millions of log entries… 2 “To create a security rule, I have to actually write a program…” 1 “There are millions of log entries – it’s so hard to find a specific entry.”

3 3 Business Intelligence product for presentation, investigation and analysis of security warehouse log data and query output from: Firewall- to analyze network accesses Audit- to analyze QAUDJRN system journal events AP-Journal – to analyze the log of business-critical data fields which were accessed or changed User Profile Reports- to analyze all User Profile information Instantaneous “Slice & Dice” response, regardless of database size Pinpoints exceptions and trends, easily finds the “needle in the haystack” Visualizer Features

4 4 Nightly Maintenance Job Audit Statistics File Firewall Statistics File Firewall Audit Visualizer How Visualizer obtains Audit & Firewall Data Daily Log Files

5 5 Accessing Visualizer from the iSecurity GUI

6 6 Filter Audit Log Data No. of Entries on each Date Graphical display of most frequent Dates Visualizer’s workspace Lower tabs for “slice and dice’

7 7 Supports 3D/2D, Vertical and Horizontal Graphs

8 8 Visualizer Firewall Example: Sort all Servers by Quantity, Filter by 2 SQL Servers

9 9 Filter by IPs relevant for investigation/interrogation

10 10 Add filter for relevant Libraries

11 11 Add Filter for most frequent Objects

12 12 Add Filter for Date Range

13 13 Select 3 Rejected Accesses; click “Drill to Data” Click “Drill to Data”

14 14 View Firewall log records, select one and click on Create Detection Rule

15 15 New Detection Rule pre-populated with data from actual Firewall log event Note Varying Conditions

16 16 Print a Report in HTML

17 17 Please visit us at www.razlee.com Thank You!


Download ppt "1 Visualizer for Firewall Graphical Business Intelligence Display & Analysis Tool."

Similar presentations


Ads by Google