When it comes to protecting your organization from cyber attacks, it’s never enough to simply collect logs and alerts on possible security breaches against your IT infrastructure. Effectively fighting malicious attacks requires continuously monitoring all the elements of your infrastructure, correlating security events for meaning, adding historical context and trending information, and analyzing the outcomes to smartly extract key event data to prioritize action.
CenturyLink Security Log Monitoring collects and tracks incidents in real time, applies advanced analytics, categorizes them and sends them to an expert team for review. Teams then investigate leads and prioritize events into the top incidents that require greater analysis or immediate action.
Our advanced platform takes an industry best-practice approach by leveraging automation in combination with rigorous human review. We weed out a greater number of false positive alerts than standard systems by combining log data from the risk profiles of each customer asset with real-time threat intelligence data from CenturyLink’s global corporate network and partner threat intelligence feeds.
Gain immediate visibility into systems and a deeper understanding of your security posture. We help you apply a more strategic approach to threats by identifying and focusing on the most critical issues.
Continuously monitor all elements of your infrastructure. The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all of your devices, endpoints, systems and networks.
Get the flexibility to fit your specific needs. Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, CenturyLink can accommodate you.
Have Questions? Talk to Our Security Experts
Schedule a consultation to learn the best and most cost effective ways to keep your mission-critical data secure and available.
Make more informed decisions, maintain compliance and save time and effort.
As the entry-level tier of service within the Security Log Monitoring offer, Foundational Monitoring provides existing CenturyLink customers with up to 10GB per day of complimentary log monitoring. The service gathers raw logs, parses meta data into normalized events and retains it remotely for viewing in our portal or mobile application. You can easily upgrade your service bandwidth to accommodate additional log ingestion as your monitoring requirements grow. The service can also be customized to your needs with our suite of optional service upgrades — including Threat Intelligence, SOC Monitoring, Cloud Security Monitoring and Advanced Monitoring Algorithms.
Our monitoring service:
Provides a comprehensive view of all network activity from multiple devices across the organization and correlates it into a single dashboard view for team members to see and review in detail.
Translates complex, near real-time and historical data into actionable insights, with a low operational impact on your organization.
Helps security teams prioritize events to reduce the noise from false positives and better focus on those that matter most.
Helps you pinpoint threat sources and follow attack vectors so you can shore up weak points more quickly and evolve to a proactive threat management approach.
Enables security teams to make more accurate assumptions about the past that provide context to prevent future successful attacks.
Helps you meet compliance standards with a comprehensive solution that can evolve with your business needs without changing platforms.
Enhances your security posture beyond compliance into a best practices solution for proactive and predictive threat management.
Gives security teams and senior leadership greater confidence that your organization is doing all it can to protect assets and eliminate threats before impact.
Saves your team hundreds of man-hours gathering critical data by hand.
Improve Security Without Adding More Resources
CenturyLink security solutions are easy to customize to your business. Find out how we can help you plan your defenses—talk with one of our security experts today.
Protect your network better with intelligent recommendations you can act on.
CenturyLink Security Log Monitoring service provides sophisticated log ingestion, monitoring and event correlation. It uses a powerful data analysis engine that combines historical information from your network — such as data from your firewalls, IDS/IPS systems and other network devices — with near-real-time threat data. It then analyzes the outcomes to provide you with a comprehensive view inside your infrastructure of all the events in motion, pinpointing attack vectors.
Features and capabilities include:
Ongoing configuration of the monitoring technology
Proactive customer notification and escalation of items of interest
Comprehensive role-based web portal for instant visibility and per-user customized analysis of events
Unique risk-based alert process combining automation with rigorous human review to evaluate multiple transaction types: CEF, syslog, LEAF and a variety of other standard log types
Flexible implementation options for equipment management and monitoring
Multiple service availability options to fit any customer requirement
Correlation from multiple streams of data—pulling insights from both real-time events and customer asset risk profiles to detect threats at the earliest stages and reduce false positives
90 days of backup and storage, and visibility up to 12 months back on log data to investigate and provide deep context to threat trends
24/7 support from CenturyLink’s GIAC Certified Intrusion Analysts with multiple years of experience and certifications such as CISSP, CCNA, CCSP, CCSE, CCSA and MCSE
Simple pricing model based on volume of security-related data transmitted per day
No licensing fees for log collection appliances
Trending and Analytics: Access advanced search capabilities and extend threat detection visibility to the last 12 months, making low and slow attacks easier to recognize. Trending and Analytics delivers the ability to search all meta data with enhanced reporting features and visualization tools.
Threat Intelligence: Dig deeper into log data with intelligence from community feeds, social media searches, dark web searches, honey pot infection records and third-party research. We provide current, company-specific insight by integrating in-house intelligence with third-party data.
SOC Monitoring: Leverage our team of experts to reduce resource and infrastructure costs. As incidents are detected, our analysts will escalate them and provide transparent access to the same event console. Stay on top of events as they arise without requiring an in-house team.
Advanced Monitoring Algorithms: This upgrade helps identify additional items of interest and threats to your business. Advanced Monitoring Algorithms is compliance-focused for PCI, HIPPA, etc. — with more sophisticated alerting.
Cloud Security Monitoring: Get visibility into cloud environments and accounts, applying best-practice controls to cloud service configurations.