PCI - DSS Compliance
NNT Log Tracker Enterprise™ provides a comprehensive and secure solution to any compliance mandate. Log analysis is a key weapon in the fight against any cyberattack

Identifying the method and source of any attack allows preventative measures to be continually improved. This is why all security policies place log retention at their core.PCI DSS compliance requires logs to be gathered and reviewed daily, and retained for at least one year.Similarly for GCSx Code of Connection or CoCo compliance - Audit logs recording user activities, exceptions and information security events are to be retained for at least 6 months.

  • Log Tracker Enterprise™ will gather logs from all
  • Network Devices Windows
  • Unix and Linux servers
  • Firewall or IPS and IDS devices
  • Email and Web Servers
  • Database and Application servers - even IBM Mainframes
  • All other potentially useful sources of log information

Log Tracker Enterprise™ doesn’t stop there. All event logs are analyzed and correlated automatically, applying a comprehensive series of rules pertinent to any Security or Governance policy. Any breach of compliance will be alerted immediately allowing pre-emptive action to be taken before a problem arises. Pre-Defined rules templates allow you to be in control of compliance straight out of the box.

  • All Security and Governance Policies supported via pre-packed Compliance Rule Templates
  • Real Time Security Warnings i.e. violation of file integrity monitoring rules
  • PCI DSS and GCSx Code of Connection supported ‘out of the box’
  • Web-based Dashboard and integration with Servicedesk as standard
  • Powerful, keyword-based Event Log mining across any combination of devices and applicationsComplete solution for all Security, Incident and Event Management (SIEM) requirements

Log Tracker Enterprise™ allows you to focus on true exceptions and important events by masking off the sometimes overwhelming flood of logs. Use the pre-built Compliance Templates and build your own keyword and logic-based correlation rules, allowing you to manage what really matters to your organization from a security and compliance standpoint.

Contact Irontouch for more information