Continuous security benefits monitoring yields measurable...SpyLogix breaks with tradition and makes mainstream continuous security monitoring. Untimely periodic and limited event collection, high staff labor, lost information and elongated time-to-value have traditionally been tolerated whilst collecting and using enterprise security data. Continuous security monitoring approaches for enterprise identity and access management or activity/event data is substantially more useful and should be especially applied for protecting the most sensitive data. SpyLogix Enterprise is “security middleware” designed to efficiently overcome percieved complexities associated with continuous monitoring of information security by people, processes and technologies. Business and government entities can save time, money and resources, as well as, improve operational awareness, troubleshooting abilities, IT governance, risk control and compliance with better information and continuous monitoring of resources.
SpyLogix Enterprise is “non-stop” security middleware…Designed using SOA and a messaging architecture to simplify collection and use of security data, inherent IT complexities are efficiently overcome and data effectively leveraged by: 1) discovery and continuous native security data access, 2) communications flexibility for delivering data to where it can be optimally used, 3) automatic data management, and 4) real-time data actualization to ensure security data is efficiently harvested and effectively used.
Security data is “big data” and ready for prime time…Security data is created at many levels within an information system maintained to enable secure access to data: 1) where the physical user enters the electronic system, 2) at the network perimeter, 3) identity and access management used to control application access/use, and 4) activity within the application or data server.
Security data characteristics mandate special handling…Data characteristics include variety, volume and velocity. Variety may be the most challenging in that each source asset stores and creates unique data, and in the absence of standards, making use of this disparate data centrally is great challenge. A typical entity will have many information systems, each one producing security data which must be harvested and leveraged to keep business data safe. Finally, some systems like CA SiteMinder can produce lots of data fast due to the number of events produced per unit of time.