Exaprotect Integrates Its Log, Event, Security Change Managers
The company's Unified Architecture lets businesses manage network configuration change, information, security records, and compliance in one system.
A Mountain View, Calif., security management company has announced the integration of its log, event, and security change management products.
Exaprotect's Unified Architecture aims to help service providers and large enterprises tackle several responsibilities at once. It allows businesses to manage network configuration change, information, security records, and compliance in one system. Customers who use Exaprotect's LogManager and EventManager can now upgrade to other products for streamlined security management.
"The convergence between security, network, and IT operations is the next evolution in security management," Robert Ayoub, an industry analyst at Frost & Sullivan, said in a statement. "Only a solution that is designed to support complex, heterogeneous enterprise environments, like the Exaprotect Unified Architecture, can effectively facilitate the alignment of business policies with network security configurations. With a fully integrated security, network, and IT infrastructure, enterprises are better equipped to protect against network vulnerabilities, improve compliance, and optimize efficiencies throughout the organization."
The Unified Architecture and integration between products allows companies to respond quickly and easily to IT change requests, reconfigure networks with the click of a mouse, document and track change control processes, and react quickly to security events.
The company's security information management solutions record and correlate security events, while its Solsoft ChangeManager converts policies into commands that can implement and track security change requests across networks. Users just drag and dropping icons to implement the changes.
Exaprotect's system automatically lets IT staff and business managers see, down to the paragraph level, which compliance requirements are met or threatened by events on their networks.
"The enterprise software industry is undergoing a fundamental shift toward the convergence of security, network, and IT infrastructures," Exaprotect CEO Jean-Francois Dechant said. "Many enterprises that are using log management for compliance see the value of adding event management and the future benefit of incorporating change management."
Dechant said his company is the first to bring together each through one Unified Architecture, allowing enterprises to add functionality when they are ready.
"Now security managers, network managers, and IT teams will have the power to align business policies with security events for real-time enforcement, compliance, and business continuity," he said.
Exaprotect's Unified Architecture will be available this summer.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.