Sabtu, 01 Mei 2010

Lower Total Cost of Ownership


Compared to other security event management platforms of similar scope, Tenable’s Security Center and Log Correlation Engine is easier to deploy, configure and make use of. Here are some of the reasons why:
Vulnerability Management and Compliance Tools
With the Security Center and Log Correlation Engine, your users will have one interface for vulnerability management, security event management and compliance reporting. Although this paper focuses on the virtues of Tenable’s event management technology, our complete solution combines a variety of security practices. With this approach, there are many efficiencies which can be gained through common policy, reporting, training and incident response processes.
Ease of Installation
Both the Security Center and Log Correlation Engine are distributed as Linux “RPMs”. This means that installation simply involves downloading the RPM, placing it on a server which runs Linux, and running a command to start the installation. A similar process is followed for upgrades. Most of our customers did not require us to go onsite to install our products, and many of them we have never met in person. Aside from an Apache web server and the Secure Shell server, we do not make use of any external software, which also minimizes installation troubles.
Simple Licensing Model
Tenable’s licensing model for the Security Center and Log Correlation Engine are also very simple. This is an important feature because your network will change and your logging requirements will change with it.
The Security Center is simply licensed by the total number of servers for which you are performing security management. This could be 500 servers in a data center, or even 10,000 desktops. If you exceed your Security Center licenses, you can choose to purge some of your data or buy a larger license through a simple upgrade.
The Log Correlation Engine is a software solution deployed on a dedicated server. There is simply one price for the Log Correlation Engine and any combination of our log collection agents can be used with it. This is unlike some of our competitor’s products which require each agent to be licensed, or the total amount of logs to be licensed. If your current Log Correlation Engine deployment grows inadequate, you can also procure additional Log Correlation Engine’s for more processing power.
Works with Common Hardware
The Security Center and Log Correlation Engine are designed to run on typical 1U, one or two CPU x86 servers with 1 to 4 GB of memory. There is no requirement for RAID, high-speed disks, more than 4 GB of memory, or other extreme forms of hardware. However, if the Security Center or Log Correlation Engine is deployed on “premium” hardware solutions, they enjoy much higher performance.

0 comments:

Posting Komentar

Ngobrol yuk seputar Makalah Manajemen ?? :-)
Jika ingin komentar Silahkan berkomentar ya teman ^_^