NitroSecurity introduces content-aware security platform
Connecting state and local government leaders
NitroSecurity's latest security information and event management product, NitroView ESM X5, can peer deep into application content and individual sessions for greatly enhanced network security forensics.
NitroSecurity has unveiled NitroView Enterprise Security Manager X5, a security information and event management platform that can collect and manage billions of events and logs. It can also monitor network activity flows and application content, making it the first content-aware security platform, the company said.
With a memory capacity of 512G of high-speed dynamic RAM, the NitroView ESM X5 has the ability to peer deep into application content and individual sessions for greatly enhanced network security forensics, NitroSecurity officials said.
Security information and event management systems “must evolve well beyond log management if they are to truly become a critical element of the enterprise security contingency plan,” said Michael Leland, chief technology officer at NitroSecurity.
The NitroView ESM X5 gives security managers the ability to examine their infrastructures in full detail, including application content and session details. “It’s the difference between guessing that a security breach may have happened four hours ago and knowing exactly which workstation, employee and method was implemented to illegally capture credit-card information,” he added.
The new product is based on the company’s flagship security platform, NitroView ESM. It can collect, correlate and report on security events from every device, application and data source associated with an enterprise network, the company said.
The new NitroView ESM X5 can support uncompressed collection rates of 100,000 events and flows per second and 40 million events per second using event aggregation technology, NitroSecurity officials said.
“When you’re managing thousands of servers, you can’t wait hours for the information you need to investigate a threat because a threat can propagate quickly,” Leland said. “If it’s a virus, every second increases the scope and cost of disinfecting the network. If it’s a breach of sensitive data, that data is going to move outside of your control very quickly. In any case, every second counts, and every second costs real dollars.”
www.nitrosecurity.com