SECNOLOGY mission is to provide end-users, managers, and experts with the easiest and most powerful solution to manage globally and automatically all data events from their information system.

They should be able to do it the way they need, any time they need, without compromising the raw data integrity.

In today’s environment, data can be generated by any device. When data is available and reachable, it is richness but it is not always the case! Very often, the data has to be collected, processed, decrypted via multiple and different heterogeneous means. Each of these means requires specific skills and lot of time. Each event source device got its own monitoring tool, its own way of data processing, and its own management needs and restrictions.

For events, traces, or logs, the situation is even much more complex. Each of these devices generates its own events and logs with its own specific format. Each data part has its own specific meaning.

It can be even worse when the same device with the same configuration may generate different log formats with the respect to the way it is configured by the administrator. From user’s perspective, the needs are quite clear and the user queries addressed to these devices are simple and accurate. Despite that, it remains very hard to get a clear single and global view of all the data. This is the main objective of SECNOLOGY.

Secnology Core Modules

X

What  Makes the SECNOLOGY Data Mining Platform so Powerful?

The heart of the SECNOLOGY architecture is SECmanage, which performs numerous operations on all events in real-time, on demand and on schedule. Two significant technological advantages make SECNOLOGY the most powerful Data Mining solution available today, able to process Terabytes a day faster than anyone.

 Click here to view vendor website

X

How Do I Get continuous Visibility ?

How do I get continuous visibility so i can understand where the vulnerabilties are and take corrective action in a timely Manner?Do you need an answer to this question? SECNOLOGY provides a comprehensive solution to this challenge, and the answer starts here.  The first step is to gather network & security events.

Click here to view vendor website

X

When Do I Need SECagent?

The short answer is that the SECagent is not required unless the system or device you need to monitor is unable to send events using one of the numerous protocols typically used by network management platforms.  Most network and security devices as well as Linux/Unix systems are typically able to send events; however, most other environments are not.  If one of these protocols is available to send events, then SECcollector is able to receive these real-time events directly. Otherwise, SECagent is needed.

Click here to view vendor website

X

Provide Access to SECNOLOGY to a Web Browser

SECweb is a Web Portal allowing authorized users to access their personal SECNOLOGY environment using a web browser. The SECNOLOGY Administrator defines the jobs, reports and alerts that are available and validates the SECweb environment for each user.  These users can then access the available jobs, reports and alerts and can create personalized jobs based on these by simply using a web browser, i.e.: Internet Explorer, Firefox, Chrome, etc…  With an easy to use web interface, the user is able to select his events and jobs, to upload events to the portal, to run jobs on selected targets and to access his dashboards, reports, alerts and files.

Click here to view vendor website