Académique Documents
Professionnel Documents
Culture Documents
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Confidentiality Notice
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
1:
Collect
machine data
from almost
any device
such as
Firewall, IPS,
anti-virus,
etc.
2:
Normalize
disparate
types of
data
3:
Enrich
data from
various
vendors and
devices into
an industry
standardcommon
event format
4:
Store
Years worth of
logs and events
through a high
compression ratio
of up to 10:1
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
5:
Search
using full text
on enriched
data for
forensics with
no domain
expertise
6:
Reports &
Dashboards
of log analytics
on compliance,
security, and
operational
intelligence
Customer Benefits
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Compliance
Big data
Big
Data
Big
Money
Compliance needs growing globally as government mandates requiring data privacy protections
Source: *2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute, May 2013, US Data
#Verizons Data breach investigation report 2012-2014
5
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
3. HP Logger components
HW license
SW license
HP ARST Logger 5
GB/day SW (Base)
H7P28AAE
H7P29AAE
L3505 (30 Gb/day)
L7505 S (80 Gb/day)
L7505 X (160 Gb/day)
5 Gb/ day
1 SKU of Base
1 SKU of Add-on
40 Gb/day
8 SKU of Add-on
20 SKU of Add-on
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
4. Key Features
Collect, store, and analyze machine data/ logs from security devices
Target market
Customer Benefits
Compliance
Cost effective
Automated
compliance
Pre-built audit reports
and dashboards
Continuous
monitoring
Simplified deployment
Install & configure in
minutes
Big Data
Collect any data from
any device, anytime
Maximum
Built-in
reports and
bignetworking
data into a
performance
Leading storage Unify
Flexible
Maximum performance
Leading storage
Flexible enriched
networking data
dashboards
single
format
Enterprise-class
Content for most security
device types are pre-built
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
management
Real-time, cross-device
correlation of security
events
Store big data with
limited budget!
5. HP Logger Competition
HP
ArcSight
IBM Q1
McAfee
LogRhythm
Splunk
AlienVault
Real-Time
Visibility
Threat
Intelligence
Compliance
Applications and
User Monitoring
Event Collection &
Integrations
Pricing &
deployment cost
*based on a composite of Gartner & web research
8
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Regulatory Compliance
Check the box with confidence!
Regulations have been around for years and they are growing!
The Auditors are coming the auditors are coming
Regulatory Compliance has put a target on IT and we need to be able to
answer the Auditors questions timely and correctly
Existing Regulations are evolving
PCI-DSS v3.0
PCI Council Special Interest Group (SIG) Projects for CY2015
Daily Log Monitoring: Guidance on Effective Daily Log Monitoring
Shared Responsibilities: Guidance on Determining Shared Responsibilities
for Entities and Third Party Service Providers
New Regulations/Legislation are coming
Cyber security Framework
Cyber Intelligence Sharing and Protection Act (HR-624)
Cyber Information Sharing Act
9
Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
10 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.