Exaprotect Integrates Its Log, Event, Security Change Managers
The company's Unified Architecture lets businesses manage network configuration change, information, security records, and compliance in one system.
A Mountain View, Calif., security management company has announced the integration of its log, event, and security change management products.
Exaprotect's Unified Architecture aims to help service providers and large enterprises tackle several responsibilities at once. It allows businesses to manage network configuration change, information, security records, and compliance in one system. Customers who use Exaprotect's LogManager and EventManager can now upgrade to other products for streamlined security management.
"The convergence between security, network, and IT operations is the next evolution in security management," Robert Ayoub, an industry analyst at Frost & Sullivan, said in a statement. "Only a solution that is designed to support complex, heterogeneous enterprise environments, like the Exaprotect Unified Architecture, can effectively facilitate the alignment of business policies with network security configurations. With a fully integrated security, network, and IT infrastructure, enterprises are better equipped to protect against network vulnerabilities, improve compliance, and optimize efficiencies throughout the organization."
The Unified Architecture and integration between products allows companies to respond quickly and easily to IT change requests, reconfigure networks with the click of a mouse, document and track change control processes, and react quickly to security events.
The company's security information management solutions record and correlate security events, while its Solsoft ChangeManager converts policies into commands that can implement and track security change requests across networks. Users just drag and dropping icons to implement the changes.
Exaprotect's system automatically lets IT staff and business managers see, down to the paragraph level, which compliance requirements are met or threatened by events on their networks.
"The enterprise software industry is undergoing a fundamental shift toward the convergence of security, network, and IT infrastructures," Exaprotect CEO Jean-Francois Dechant said. "Many enterprises that are using log management for compliance see the value of adding event management and the future benefit of incorporating change management."
Dechant said his company is the first to bring together each through one Unified Architecture, allowing enterprises to add functionality when they are ready.
"Now security managers, network managers, and IT teams will have the power to align business policies with security events for real-time enforcement, compliance, and business continuity," he said.
Exaprotect's Unified Architecture will be available this summer.
The Agile ArchiveWhen it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
2014 Analytics, BI, and Information Management SurveyITís tried for years to simplify data analytics and business intelligence efforts. Have visual analysis tools and Hadoop and NoSQL databases helped? Respondents to our 2014 InformationWeek Analytics, Business Intelligence, and Information Management Survey have a mixed outlook.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.