Dan's Take

EventTracker 7.6: Digging into Details for Intrusion Detection

Finding security problems isn't easy, with all the information generated by a typical datacenter. It's worth your time to investigate solutions.

A while ago, A. N. Ananth, CEO of EventTracker, visited to introduce himself and his company, and to discuss the need for comprehensive security information and event management (SIEM). He highlighted the need for tools that can simplify the process of searching through operational logs, analyzing the results and creating useful insight from operational and machine data. The goal, he pointed out, is to quickly and effectively find potential security issues. Considering the rash of recent stories about break-ins and data theft experienced by many retailers, I thought the conversation was both timely and useful.

What Is EventTracker?
EventTracker is a company that focuses itself on diving into machine and operational log data to develop actionable, prioritized intelligence. The aim is allowing organizations to change their perception of their IT resources and gain useful insight. The company offers tools that address SIEM, real-time log management change and configuration management.

EventTracker 7.6
EventTracker 7.6 is designed to delve into the operational and machine data an organization's IT infrastructure collects as it operates, and quickly identify patterns, isolate problems, and make it possible to diagnose potential security and other problems. Once isolated, the organization can take steps to address the issues found in the operational logs. Here's what the company has to say about its new product:

"EventTracker Enterprise 7.6 comes complete with several new and enhanced features including Smart Search, designed to simplify the extraction of operational and security intelligence from machine data. Applications include identifying data patterns, isolating problems, and diagnosing potential security and operational issues. Smart Search incorporates intelligence directly into EventTracker, thereby greatly simplifying and speeding up log review and investigation of security and operational problems.

Additional features in EventTracker Enterprise 7.6 include LogWatch, a feature that provides an auto updated real-time view of data corresponding to any selection criteria. This allows operators to pin a window on any particular behavior of interest. EventTracker Enterprise 7.6 also includes new Knowledge Packs, improved dashboard features, close integration with AWS Cloudtrail and Simple Email Services and an easier-than-ever installation process."

Dan's Take: A Crowded, but Important, Field
Modern applications are constructed of distributed services. Each of these services might be created through the use of multiple tiers of application components, each of which might be executing on different physical or virtual systems and be housed in different datacenters. This makes it quite challenging to make sure only authorized use is enabled for the organization's IT resources and data.

It's somewhat likely that attempts to breach security and access customer data, such as credit cards or identifying information, have been detected by some of the application components that make up the distributed services, that in turn are presented as applications. Because these application components produce huge and ever-growing piles of operational data, it's difficult to search through the data, find meaningful patterns, and find these attempts at intrusion before malicious individuals or groups can break in and steal information.

EventTracker is one of a number of companies that has seen this problem and addressed it with technology. While the company appears to be offering interesting capabilities, similar capabilities can be found in products from suppliers such as Splunk, Sumo Logic, Logly, or Loglogic. An open source community offers logstash that can be used to address the same requirements. It would be wise for IT decision makers to review the products offered by these suppliers to learn how they can help.

About the Author

Daniel Kusnetzky, a reformed software engineer and product manager, founded Kusnetzky Group LLC in 2006. He's literally written the book on virtualization and often comments on cloud computing, mobility and systems software. He has been a business unit manager at a hardware company and head of corporate marketing and strategy at a software company.


Subscribe on YouTube