Detailed, Actionable Data Security Intelligence

Vormetric Transparent Encryption includes detailed data access audit logs and pre-built integration to leading Security Information and Event Management (SIEM) systems for Security Intelligence

Security Intelligence

Detailed data access audit logs delivered by Vormetric Transparent Encryption are useful not only for compliance, but also for the identification of unauthorized access attempts, as well as to build baselines of authorized user access patterns. Vormetric Security Intelligence completes the picture with pre-built integration to leading Security Information and Event Management (SIEM) systems that make this information actionable. The solution allows immediate automated escalation and response to unauthorized access attempts, and all the data need to build behavioral patterns required for identification of suspicious usage by authorized users.

Security Intelligence Logs
Speed Response

Leverage immediate alerts that fuel the fastest, most efficient response when issues arise.

Boost Visibility

Produces an auditable trail of permitted and denied access attempts from users and processes.

Strengthens Data Security

Uncover anomalous process and user access patterns that could point to an APT attack or malicious insider activities.

Pre-built SIEM Integrations

Collected at the system level, Vormetric Transparent Encryption logs report authorized and unauthorized access attempts to encrypted files and volumes- including user, time, process and more. Vormetric Security Intelligence includes pre-built integration to leading SIEM systems that makes these logs actionable. Available dashboards immediately highlight unauthorized access attempts. Authorized user access data is available to create baselines for user's data usage, and can also be integrated with other security data such as user location and access points for pinpoint threat identification.

Granular, Actionable Security Intelligence

Vormetric Security Intelligence logs produce an auditable trail of permitted and denied access attempts from users and processes. The solution’s detailed logs can be reviewed to specify when users and processes accessed data, under which policies, and if access requests were allowed or denied.

Streamlined Compliance and Auditing Reporting

In order to adhere to many compliance mandates and regulations, organizations must prove that data security is in place meets required standards. Vormetric Security Intelligence integration to SIEM systems and pre-built dashboards can be used to easily demonstrate to an auditor that encryption, key management, and access policies are effective and appropriate. With its detailed visibility and integration capabilities, Vormetric Security Intelligence helps streamline the effort associated with audits and ongoing compliance reporting.

SIEM Partner Integrations
  • FireEye Threat Prevention Platform
  • HP ArcSight
  • IBM Security QRadar SIEM
  • Informatica Secure@Source
  • LogRhythm Security Intelligence Platform
  • McAfee ESM
  • SolarWinds
  • Splunk
Log standards supported:

RFC5425, CEF, LEEF

White Paper : Vormetric Security Intelligence with SIEM Integration

Vormetric Intelligence are granular event logs that produce an auditable trail of permitted and denied access attempts from users and processes, delivering unprecedented insight into file access activities. These logs can inform of unusual or improper data access and accelerate the detection of insider threats, hackers, and advanced persistent threats (APT) that have bypassed perimeter security. With the availability of pre-defined dashboards and reports, Vormetric Intelligence easily integrates with Security Intelligence Event Management (SIEM) tools. This white paper describes the integration of Vormetric Intelligence logs with Splunk, HP ArcSight and IBM QRadar SIEM tools, details the generated log messages and sample reports that can be generated.

Download

Solution Brief : Vormetric Security Intelligence

While enforcing encryption rules and data access controls in all these environments, Vormetric Transparent Encryption agents collect and log information on file access by users and processes. The detailed can be analyzed using an SIEM solution’s security intelligence capabilities to identify data access attempts in patterns that may represent a threat.

Download

White Paper : Encryption as an Enterprise Strategy, IANS

IANS conducted an independent survey of over 100 information security professionals to better understand how they are contending with advanced attacks against their systems and data. The survey found that organizations are becoming increasingly concerned with protecting sensitive data, and it revealed how they are using encryption and their concerns and perceptions surrounding it. IANS’s follow-up analysis offers recommendations for creating an enterprise-wide encryption strategy and explores the “encrypt everything” movement currently gaining momentum.

Download
Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us