Download presentation
Presentation is loading. Please wait.
Published byPolly Thompson Modified over 9 years ago
1
SECURE LOG MANAGEMENT
2
BalaBit - the company How we do system logging When syslogs are not enough
3
BalaBit - company profile
4
Our products Zorp proxy level firewall syslog-ng OSE syslog-ng Premium Edition syslog-ng Store Box Shell Control Box
5
Is there any problem with log management ?
6
Securing from the bottom UP
7
Host security
8
Transport security
9
Storage security
10
syslog-ng has it all! on-line collection TCP and TLS TCP transport mutual authentication “logstore” - secure log storage Indexing PatternDB and Artificial Ignorance
11
STOP What else?
12
Video report
13
Those we KNOW about
14
WHO?
15
HOW?
17
Extra control over secure communication
18
Gateway authentication
19
4-eyes authorization
20
Thank you for your attention!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.