When it comes to protecting your organization from cyber attacks, it’s never enough to simply collect logs and alerts on possible security breaches against your IT infrastructure. To fight malicious attacks and win, you need to continuously monitor all the elements of your infrastructure, correlate the security events for meaning, add historical context and trending information, and analyze the outcomes to smartly extract key event data to prioritize action.
This is the job of Security Log Monitoring with Trending and Threat Analysis from CenturyLink.
Security Log Monitoring with Trending and Threat Analysis collects and tracks incidents in real time, applies advanced analytics, categorizes them and sends them to an expert team for review. Teams then cull the data and prioritize events into the top incidents that require greater analysis or immediate action.
CenturyLink’s advanced platform takes an industry best-practice approach to monitoring by leveraging automation in combination with rigorous human review. We weed out a greater number of false positive alerts than standard systems by combining log data from the risk profiles of each customer asset with real-time threat intelligence data from CenturyLink’s global corporate network and partner threat intelligence feeds.
Gain immediate visibility into systems and a deeper understanding of your security posture. We help you apply a more strategic approach to threats by identifying and focusing on the most critical issues.
Continuously monitor all elements of your infrastructure. The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all of your devices, endpoints, systems and networks.
Get the flexibility to fit your specific needs. Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, CenturyLink can accommodate you.
Have Questions? Talk to Our Security Experts
Schedule a consultation to learn the best and most cost effective ways to keep your mission-critical data secure and available.
Protect your network better with intelligent recommendations you can act on.
CenturyLink Security Log Monitoring with Trending and Threat Analysis is a platform and service that provides sophisticated log ingestion, monitoring and event correlation. It uses a powerful data analysis engine that combines historical information from your network—such as data from your firewalls, IDS/IPS systems and other network devices—with near real-time threat data. It then analyzes the outcomes to provide you with a comprehensive view inside your infrastructure of all the events in motion, pinpointing attack vectors.
Features and capabilities include:
Ongoing configuration of the monitoring technology
Proactive customer notification and escalation of items of interest
Comprehensive role-based web portal for instant visibility and analysis of events based on any historical time period
Unique risk-based alert process combining automation with rigorous human review to evaluate multiple transaction types: CEF, syslog, LEAF and a variety of other standard log types
Flexible implementation options for equipment management and monitoring
Multiple service availability options to fit any customer requirement, sold as a stand-alone or to augment alternative assessment tools
Correlation from multiple streams of data—pulling insights from both real-time events and customer asset risk profiles to detect threats at the earliest stages and reduce false positives
90 days of backup and storage, and visibility up to 12 months back on log data to investigate and provide deep context to threat trends
24/7 support from CenturyLink’s GIAC Certified Intrusion Analysts with multiple years of experience and certifications such as CISSP, CCNA, CCSP, CCSE, CCSA and MCSE
Simple pricing model based on volume of security-related data transmitted per day