{"id":1589,"date":"2010-01-14T00:00:00","date_gmt":"2010-01-14T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/01\/14\/product-watch-nitrosecurity-integrates-log-management-with-siem\/"},"modified":"2021-12-30T11:39:39","modified_gmt":"2021-12-30T11:39:39","slug":"product-watch-nitrosecurity-integrates-log-management-with-siem","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/01\/14\/product-watch-nitrosecurity-integrates-log-management-with-siem\/","title":{"rendered":"Product Watch: NitroSecurity Integrates Log Management With SIEM"},"content":{"rendered":"<p>SIEM vendor NitroSecurity next week will roll out a new log management product and management software that brings the two traditionally separate worlds under one roof.  The new NitroView ESM Version 8.4 and new Enterprise Log Manager (ELM) tools are fully integrated and provide a single view of all SIEM and log management functions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The tools also work with NitroSecurity&#8217;s database application monitoring and IPS tools: &#8220;We work at Layer 7, so if someone tries to get into the database who shouldn&#8217;t,&#8221; the security team is alerted, says Jerry Skurla, executive vice president of marketing for NitroSecurity.<\/p>\n<p>Eric Knapp, vice president of technology marketing for NitroSecurity, says SIEM and log management integration has been slow to emerge because of the heavy volume of logs.<\/p>\n<p>http:\/\/www.darkreading.com\/security\/management\/showArticle.jhtml?articleID=222300869&#038;subSection=Security+administration\/management<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1589","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1589"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1589\/revisions"}],"predecessor-version":[{"id":4076,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1589\/revisions\/4076"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}