Importing Firewall, Proxy and other security device log files

Firewall Logs Importing

Firewall Analyzer allows you to import the log files and generate reports on already collected or old Firewall or security device log files. Importing log files is invaluable in forensic analysis.

Import Logs from Local or Remote Hosts

You can import log files to the Firewall Analyzer server from your machine (i.e., local host). HTTP protocol will be used to import log files from the local machine. Also, you can import log files from remote machines (i.e., remote hosts). You can import the log files from remote machines using FTP protocol. You can import a folder containing log files both from local and remote machines. You can schedule the import of log files periodically both from local and remote machines. You can also specify the start time for FTP import schedule.

 

 

Featured links

Other features

Firewall Reports

Get a slew of security and traffic reports to asses the network security posture. Analyze the reports and take measures to prevent future security incidents. Monitor the Internet usage of enterprise users.

Firewall Compliance Management

Integrated compliance management system automates your firewall compliance audits. Ready made reports available for the major regulatory mandates such as PCI-DSS, ISO 27001, NIST, NERC-CIP, and SANS.

Firewall Rule Management

Manage your firewall rules for optimum performance. Anomaly free, properly ordered rules make your firewall secured. Audit the firewall security and manage the rule/config changes to strengthen the security.  

Real-time Bandwidth Monitoring

With live bandwidth monitoring, you can identify the abnormal sudden shhot up of bandwidth use. Take remedial measures to contain the sudden surge in bandwidth consumption.

Firewall Alerts

Take instant remedial actions, when you get notified in real-time for network security incidents. Check and restrict Internet usage if banwidth exceeds specified threshold.

Manage Firewall Service

MSSPs can host multiple tenants, with exclusive segmented and secured access to their respective data. Scalable to address their needs. Manages firewalls deployed around the globe.

 

 

A single platter for comprehensive Network Security Device Management