i-Security
CentralMon Applicance

CentralMon™ Applicance


CentralMon™ - Your EYE to Security Incident

As the network security technology becomes more complex, different brands of security devices are employed to provide a more comprehensive protection to the network. Log data management is hence becoming a vital element in managing network security, regulatory compliance and network availability in corporations today. Unmanageable of different logs and events which fired from different devices located diversely, even within a site, implies inadequate information for monitoring network activities which enhance the network vulnerability to attacks. Immediate, efficient and effectively responses to attacks can not be made either. This rising security concerns is now proceeding into both managerial and operational views in many corporations. Security Information Management (SIM) is hence an indispensable solution to satisfy the urgent needs.

 
  Security Information Management defines the process of collecting, analyzing and reporting security-relevant information. It helps in controlling the security infrastructure instead of being controlled by them. Security Event Management assists in analyzing the collected logs and events from various security devices, revealing true attacks and at the same time generating real alerts to administrators in manageable manner. The tools and workflow for the security staff to protect the organization are provided. The business continuity is hence greatly ensured.
 

CentralMon™


 
CentralMon™ is an innovative product of combination Security Information Management and Security Event Management into one single platform. It enables security cross-products integration with incident handling in a centralized management console as integrated Security Incident Solution. Logs and events from all disparate security infrastructure are centrally collected, normalized, correlated and transformed into meaningful information. Real-time events and post-event analysis can benefit corporations in efficiently and effectively resolve the network security threats in a cost-saving manner.
 

Centralized Management


 

Maximizes value of existing security investment by unifying security process across geographies, disparate security technologies, and network tiers. CentralMon™ empowers you to manage huge amounts of security event from various security devices in a single GUI (Graphical User Interface) management console; which satisfies essential security tasks in monitoring, alerting, query, analysis, action, as well as technical and management reporting.

 

Customize Your Network and Visualization


 

Customization of network environment and security products is one of the critical issues to handle false alarms and security events. CentralMon™ helps you to filter false alarms and visualize the intrusion scenario cases on your management console with prioritization; which draws your attention on the most significant security events and gets understanding in a fast way by GUI representation.

 

Incident Identification and Workflow Control


 

It connects security knowledge to action by coordinating and tracking response activities throughout the incident lifecycle helping enterprises respond quickly and effectively, thereby minimizing the business impact of information security breaches.

 

Event Correlation and Cross-Product Analysis


 

Because few standards exist today in the world of information security, security devices themselves do not adhere to common criteria when producing security event information. So, while multi-vendor firewalls and IDS / IPS may perform a similar function, their event information looks very different. CentralMon™ helps in normalization and handles cross-product security alarms and event logs into single normalized dataset for correlation analysis and visualize in a single management console.

 

Comprehensive Report


 

With providing both managerial level and technical level reports; including summary charts in top attacks with daily, weekly, or monthly basis, as well as technical details information about each intrusion scenario case in graphical or log formats.

CentralMon™ generates reports with whole security pictures for your network environment, instead of pieces information from individual security devices; and also, it allows for scheduling of report generation and welcome for customization of client's own report types and report formats.

 
i-Security CentralMon

Model

EM-10/25/Advance

GSM-A1

GSM-NK

KR-100

Device Support

10/25/ Optional

N/A

N/A

N/A

Form Factor

2U

2U

2U

2U

Storage

36G

450GB

72GB

500GB

Storage Mirror

Optional

Optional

Optional

Optional

Memory

1GB/2GB/4GB

1G

1G

4GB

Network Interface

2 GE,copper

2 GE,copper

2 GE,copper

2 GE,copper

Maximum Network Interface

12 GE,copper/fiber

12GE,copper/fiber

12 GE,copper/fiber

8 GE,copper/fiber

System Management

Remote/Console

Remote/Console

Remote/Console

Remote/Console

Function

Log Collection

Management console
&Secure Data Server

Management console

Secure Data Server

Redundant Power Supply

Optional

Optional

Optional

Optional

Temperature

5oC-40oC

5oC-40oC

5oC-40oC

5oC-40oC

Humidity

20%-80%
non-condensing

20%-80%
non-condensing

20%-80%
non-condensing

20%-80%
non-condensing



© i-Security Inc. 2006