LogRhythm Supported Products List

January 10, 2017 | Author: jordagro | Category: N/A
Share Embed Donate


Short Description

Download LogRhythm Supported Products List...

Description

Supported Products (Sample List) – May 2011 LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications. Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from which Logs can be collected and managed is much broader that the list below. If you are seeking support for a log source type not listed below, support may exist or can be developed to meet your needs. For any custom log source or device not currently supported for full normalization, LogRhythm can collect, archive and manage those logs out-of-the-box. Furthermore, LogRhythm provides customers with the capability to create full normalization within the application. Alternatively, LogRhythm professional services can develop support for you.

Access Control

Cisco Secure ACS ConSentry NAC Imperva SecureSphere RSA SecureID ACE Server

Anti-Spam

Proofpoint Spam Webfilter Spam Assassin

Anti-Virus

Blue Coat ProxyAV Clam Antivirus ESET Nod32 Antivirus Kaspersky Antivirus McAfee EPolicy Orchestrator Sophos AntiVirus Enterprise Server Symantec Antivirus Corporate Edition TrendMicro OfficeScan Antivirus Server

Application

Bind DB2 Epicor Coalition Finacle Core Finacle Treasury Gene6 FTP Server Juniper Application Acceleration Appliance LogRhythm Agent Meridian Microsoft Windows Server Update Service PatchLink Princeton CardSecure ProFTPD

2011

Riverbed Appliance Siemens Radiology Information System SWIFT Tandem Trade Innovations Verint Application vsFTP

Content Inspection/Filter

Barracuda WebFilter Citrix Netscaler Code Green Networks Content Inspection Appliance IBM Websphere iPrism Web Filter Squid Cache WebDefend WebSense

Customer Relations Microsoft CRM

Database

IBM Informix Dynamic Server Microsoft SQL Server Oracle Database 10g Oracle Database 11g Oracle Database 9

Data Loss Prevention Fidelis XPS

Directory Services

Windows DFS Replication

E-Mail Security

IronPort Email Security Appliance McAfee Email Security Appliance McAfee GroupShield – Exchange Tumbleweed Mailgate Server

E-Mail Server

Blackberry Enterprise Server IBM Lotus Domino Enterprise Server Kerio Mail Server Microsoft Exchange Postfix Secure Computing IronMail Sendmail Sun Java System Messaging Server Zimbra Email

Encryption

SafeNet DataSecure i116 Appliance Vormetric Encryption Technology

File Integrity Monitor Tripwire

Firewall

Applicure DotDefender Astaro Security Gateway Barracuda Spam Firewall Checkpoint Firewall Cisco ASA Cisco Firewall Services Module Cisco PIX Citrix Gateway Server Dialogic Media Gateway Fortinet Firewall Juniper Firewall Netscreen Firewall Nortel Firewall/VPN Palo Alto Firewall Sidewinder Firewall Sonic Wall Sygate Firewall Symantec Endpoint Protection Watchguard Firebox

IDS/IPS

Active Scout IPS AirDefense WIPS AirMagnet Network Assurance Checkpoint IPS-1 Cisco AIP-SSM IPS Module Cisco IDSM-2 IDS Cisco NIDS Cisco Security Agent Enterasys Dragon IBM ISS Proventia Juniper IDS/IPS McAfee Intrushield IPS McAfee Network Access Control Network Chemistry RF Protect Snort Sonicwall firewall/IDS SourceFire IDS Tipping Point Top Layer IPS

Load Balancer

Cisco ACE Load Balancer Cisco CSS Load Balancer Switch Cisco Global Site Selector Citrix NetScaler F5 BIG-IP Local Traffic Manager

Network Management

Bradford Campus Manager ForeScout Network Access Control Generic ISC DHCP Infoblox Keri Doors NetXtreme Microsoft DHCP Server Microsoft ISA Server MS System Center Essentials Microsoft System Center Operations Manager Microsoft System Management Server X-NetStat

Operating System AIX AS/400 Server BSD Unix CentOS Linux Server Generic Linux HP OpenVMS HP-UX IBM iSeries IBM ZOS IRIX

2011

Linux Mac OSX NCR Unix System V Novell NetWare Snare Windows Agent Solaris Suse Linux Ubuntu Linux Unix Tru64 Windows 2000 Server Windows 2000 Workstation Windows 2003 Server Enterprise Windows 2003 Server Standard Windows 2003 Workstation Windows 2008 Server Enterprise Windows Vista Workstation Windows XP Workstation

Physical Security BioPassword

Point-Of-Sale

IBM 4690 POS Controller XPient POS CCA Manager

Remote Access

Citrix Presentation Server Defender Security Servers (DSS) Microsoft RAS Server

Router

Cisco Router Enterasys Router HP Procurve Router HP Router Juniper Router RUGGEDCOM RUGGEDROUTER WatchGuard Router

Storage

Equallogic SAN NetApp Filer

Switch

Brocade FC Switch Cisco Switch Dell Powerconnect Switch Enterasys Switch Extreme Networks Black Diamond Switch Foundry Switch HP Procurve Switch Juniper Switch Nortel Passport Switch Nortel Switch

Unified Threat Manager

Mcafee Secure Internet Gateway

Virtualization

Microsoft Virtual Server 2005 VMWare ESX Server VMWare Virtual Machine

VOIP

Avaya VOIP Server Cisco Call Manager VOIP Server

VPN

Aventail SSL/VPN Cisco VPN Concentrator F5 Firepass SSL/VPN Juniper Host Checker Juniper SSL/VPN Nortel Contivity Sonicwall SSL-VPN 2000

Vulnerability Assessment McAfee Foundstone

Web Server

Apache Apache Tomcat Blue Coat Web Proxy Server Microsoft IIS

Wireless Access

Airwave Management System Aruba 5000 OS Cisco Wireless Control System

Wireless Access Point

Cisco Aironet Access Point Symbol WAP WS2000 Wireless Switch

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF