Software Details
- License
- volume
- Linux
- AIX
- Solaris
- 1 server (physical machine or virtual machine)
- 5-25 licenses
- Win
- HP-UX
Know your gear
The Third Brigade Deep Security Log Inspection module provides the ability to collect and analyze operating system and application logs for security events. Log Inspection rules optimize the identification of important security events buried in multiple log entries. These events are forwarded to a Security Information and Event Management (SIEM) system or centralized logging server for correlation, reporting and archiving.