{"id":1603,"date":"2010-10-12T00:00:00","date_gmt":"2010-10-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/12\/loglogic-releases-industrys-first-full-service-virtual-siem-appliance\/"},"modified":"2021-12-30T11:39:41","modified_gmt":"2021-12-30T11:39:41","slug":"loglogic-releases-industrys-first-full-service-virtual-siem-appliance","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/12\/loglogic-releases-industrys-first-full-service-virtual-siem-appliance\/","title":{"rendered":"LogLogic Releases Industry&#8217;s First Full Service Virtual SIEM Appliance"},"content":{"rendered":"<p>LogLogic, the leading independent SIEM and IT data management provider, today announced the release of the industry&#8217;s first full-service virtual SIEM solution.  Leveraging the recently released LogLogic 5 software, LogLogic&#8217;s MX Virtual delivers all the functionality of LogLogic&#8217;s hardware-based appliances via VMware technology, enabling companies to improve business operations, enhance security and meet strict compliance mandates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Virtualization is a reality for many businesses that are looking to drive efficiencies throughout their organizations, or that have space-constrained or widely-distributed IT environments,&#8221; said LogLogic CEO Guy Churchward.<\/p>\n<p>With the release of LogLogic&#8217;s MX Virtual, we enable companies to lower their operational costs, while leveraging the full power of our IT data management technology anywhere in the world.&#8221;  The MX Virtual also lowers the cost of entry for the smaller companies, those with security or PCI compliance needs but have very few servers or monitoring points.<\/p>\n<p>It is also perfectly suited for cloud providers who wish to offer logging-as-a-service, or PCI-as-a-Service in the cloud.<\/p>\n<p>In June 2010, LogLogic released a Tech Preview of its virtual appliance, which was downloaded by thousands of users from across the world.<\/p>\n<p>http:\/\/newsblaze.com\/story\/2010101206463400001.bw\/topstory.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1603","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1603"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1603\/revisions"}],"predecessor-version":[{"id":4090,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1603\/revisions\/4090"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}