CorreLog, Inc.   Solutions   Products   Download   Partners   News   Support   About Login

Solutions > Collateral Library

Below is a list of selected CorreLog brochures and data sheets, in Adobe PDF format. These documents contained detailed information on CorreLog specifications, solutions and services, ready for printing or sharing with your colleagues. We include current marketing collateral to help you make your case for our powerful and unique solutions. Click a link below to download a document.

 

 

Data Sheets

Back to top

CorreLog SIEM Correlation Server and Compliance Management Solution
CorreLog Compliance Management Suite, comprising CorreLog Change Tracker and CorreLog Security Correlation Server, provides a comprehensive, powerful solution for validating compliance with any corporate governance or security standard.

Download Brochure PDF Now
Click here to watch a presentation on out how you can move your SIEM maturity multiple levels on Day 1 (from SC Congress eSymposium).

 

CorreLog SIEM Agent for IBM z/OS

CorreLog provides its unique SIEM Agent for IBM z/OS, which allows you to tap into the SMF and RACF security information of your mainframe LPARs. This agent has certified integrations with HP ArcSight and IBM QRadar plus field integrations with McAfee ESM, Splunk and other SIEM systems. CorreLog SIEM Agent gives you the ability to bring your SIEM initiative full circle by making mainframe security a standard part of your enterprise security operations.
More information on CorreLog mainframe capabilities.

Download Datasheet PDF Now


CorreLog dbDefender™ DAM Agent for IBM® DB2®

dbDefender™ Database Activity Monitoring (DAM) Agent for DB2 provides up-to-the-second DB2 monitoring and security alerts for mainframe event log correlation delivered to CorreLog’s distributed SIEM system or any other SIEM including Splunk, HP ArcSight, IBM QRadar, RSA Security Analytics, LogRhythm, Solutionary and many others. Your DB2 data is a high-value target for cyber criminals. Protect it with dbDefender™
More info on CorreLog dbDefender™ DAM Agent for IBM® DB2®
Download Datasheet PDF Now

 

CorreLog Visualizer™ for z/OS

The CorreLog Visualizer is an affordable Security Information & Event Management (SIEM) system especially designed and pre-configured for use by z/OS security administrators and system programmers.
More info on CorreLog Visualizer™ for z/OS.
Download Datasheet PDF Now

 

CorreLog dbDefender™ tracks user access and access attempts to monitor the secure state of DB2. The most valuable asset in an enterprise is arguably the mainframe and the data that is hosted on it. dbDefender™ helps secure this data by monitoring it in real time and providing a live feed to your SIEM system.

More information on CorreLog dbDefender DAM Agent for IBM z/OS for McAfee Data Center Security Suite capabilities.
Download Datasheet PDF Now

 

CorreLog IND$Defender for Time Sharing Option (TSO)

IND$FILE for Time Sharing Option (TSO) is a file transfer program that allows a user on a Windows-/UNIX-based PC to upload or download datasets from IBM z/OS.
Download Datasheet PDF Now

 

CorreLog Change Tracker Enterprise

Correlog Change Tracker Enterprise is an enterprise change and performance monitoring system designed to support any compliance initiative and assure service delivery across your entire network,server and PC infrastructure.
Download Datasheet PDF Now

CorreLog For PCI DSS Compliance
A discussion of CorreLog's solution for PCI DSS Compliance, including background facts, companies and industries impacted, and "use case" examples of CorreLog for PCI DSS.
More info on CorreLog PCI DSS support.
CorreLog comprehensive guide to PCI DSS compliance
Download Datasheet PDF Now


CorreLog SyslogNormalizer™

CorreLog SyslogNormalizer is a flexible syslog data parser that loads user-specified messages into a relational database (RDBMS). By leveraging SyslogNormalizer, business analysts now have a mechanism for getting unstructured, but valuable syslog data into a relational database for formatting into usable business intelligence with Crystal Reports or other package.
More information on CorreLog SyslogNormalizer
Download Datasheet PDF Now


CorreLog SyslogDefender™

Improve security of the transfer of event messages across all enterprise systems with CorreLog SyslogDefender™. SyslogDefender uses encryption and authentication to “wrap” your event messages so the data gets transferred reliably and with traceability.
More information on CorreLog SyslogDefender
Download Datasheet PDF Now


CorreLog Agent for SAP The CorreLog Agent for SAP monitors system access to determine user activity related to system and profile changes, including logon and logoff events. This allows the system administrator to keep track of who is accessing the system by the activity they log while in the system.
More information on the CorreLog Agent for SAP.
Download Datasheet PDF Now


CorreLog For NERC Compliance

A discussion of CorreLog's solution for NERC (North American Electric Reliability Corporation) regulatory standards, including a description of NERC, a definition of Critical Infrastructure Protection (CIP) standards, and how CorreLog operates within that compliance framework.
More info on CorreLog compliance capabilities.
Download Datasheet PDF Now


CorreLog For FISMA Compliance

A discussion of CorreLog's solution for FISMA Compliance, including background facts, a discussion of penalties and fines for non-compliance, and examples of how CorreLog assists you with meeting the specific objectives of FISMA regulations.
More info on CorreLog compliance capabilities.
Download Datasheet PDF Now


CorreLog For HIPAA Compliance A discussion of CorreLog's solution for HIPAA Compliance, including background facts, companies and industries impacted, penalties and fines for non-compliance, and "use cases" showing CorreLog's roles in meeting the objectives of HIPAA regulations.
More info on CorreLog compliance capabilities.
Download Datasheet PDF Now


CorreLog For GLBA Compliance

A discussion of CorreLog's solution for GLBA compliance, including a description of the Gramm-Leach-Bliley Act, what is required of IT departments, and how CorreLog satisfies these requirements. This regulation applies to USA financial institutions of all types.
More info on CorreLog compliance capabilities.
Download Datasheet PDF Now


CorreLog For King III Compliance

A discussion of CorreLog's solution for King III compliance, including a discussion of the King III Committee Report, and methods of demonstrating compliance. This applies to all South African companies and entities.
More info on CorreLog compliance capabilities.
Download Datasheet PDF Now

Security Compliance
This is CorreLog
 
This is CorreLog
Security Compliance
Read the CorreLog Blog
Case Studies
Video Library
 
Free Trial Download
Request Product Demo
 
Purchase CorreLog
Fact sheet PDF
 

Case Studies
Back to top


Rechenzentrum Region Stuttgart GmbH (RZRS)

Due to the critical need to secure the identity of the its German state’s citizens, RZRS needed a centralized log management system not just for threat detection but also for governmental compliance set forth by the state. A distributed SIEM (Security Information & Event Management) system managing such a wide-scale endeavor would also need to handle heavy loads of log traffic from both distributed and mainframe systems at very high speed. CorreLog Server and CorreLog SIEM Agent for z/OS provides the capability to handle the workload and ensure security and compliance.

DownLoad Case Study PDF Now


Mutual Insurance Provider on CorreLog SIEM Agent for IBM z/OS

A leading mutual automobile insurance company had a standalone datacenter with a mix of 500 Windows and UNIX servers and an IBM z/OS mainframe. This document describes how the company benefits from the CorreLog SIEM Agent for IBM z/OS solution.
DownLoad Case Study PDF Now


Seminole County Public Schools (SCPS) on CorreLog SIEM Server

SCPS needed to address three key areas that prompted a search for a security information and event management (SIEM) solution – 1) compliance and auditing, 2) network security, and 3) more visibility on user log data. This case study describes how the schools needs were fulfilled by CorreLog SIEM Server.

DownLoad Case Study PDF Now

 

MTS Allstream Retail Case Study on CorreLog Mainframe Agent for z/OS

This document describes how MTS Allstream was able to implement SIEM on the z/OS platform PCI compliance.
DownLoad Case Study PDF Now

 

Microsoft Exchange Mailbox Auditing Case Study
The CorreLog Server contains specific features and functions to support auditing of Microsoft Exchange, with special emphasis on tracking access to mailboxes by administrative users.
Download Case Study PDF Now

 

 

 
 

White Papers
Back to top

 

Who Did What to Which Data When? White Paper

By Craig S. Mullins, Industry Consultant for IBM®DB2®, and author of "DB2 Developer's Guide"
In this informative and educational whitepaper you will learn about: Three highly effective auditing techniques, Data management/governance, Breach issues and dealing with data protection, and What data needs to be audited and auditing methods.

Download Whitepaper PDF Now

 

InfoSec Myths Debunked:
Mainframes are Invulnerable and FIM is only for WIN/UNIX

The Payment Card Industry Data Secrity Standard, or PCI DSS, 3.1, requirement 10.5.5 states: “Use file integrity monitoring (FIM) to secure audit trails.” But how do you do this on a mainframe? This whitepaper talks about the standard requirement and what it means for InfoSec managers.

Download Whitepaper PDF Now

8 Guidelines for Monitoring Mainframe Security Controls per PCI DSS Requirements

According to the Payment Card Industry Data Security Standard, requirement #5, you are required to “Protect all systems against malware and regularly update anti-virus software or programs.” But how do you facilitate this requirement on a mainframe? This whitepaper details 8 guidelines that can act as compensating controls for vulnerability on a mainframe.
Download Whitepaper PDF Now

11 Steps to Minimize IBM z/OS Vulnerability

IBM z/OS mainframes are arguably the most critical component of your data center given the quantity and quality of information on them -- i.e. credit card data, customer data, intellectual property, legacy data dating years back. Because of the value of information on z/OS it is clearly a target. This paper gives insight on z/OS's exposure to insider and perimeter threats and outlines 11 steps to help minimize the vulnerability.
Download Whitepaper PDF Now

Real-time Database Activity Monitoring (DAM) on IBM z/OS with CorreLog Agent This paper describes how the CorreLog Agent for z/OS (CZAGENT), in conjunction with the CorreLog Correlation Server or other SIEM console, may be used to integrate real-time DAM into a corporate SIEM solution, with minimum impact on DB2 performance.
Download Whitepaper PDF Now

Event Data versus Log Data, and the Difference between IT Security and Breach Having a SIEM system and collecting log data is a great start to securing your organization's network security. However, if you cannot correlate the log data into scenarios (events) that depict potential threats, SIEM is going to be a disappointment for you. This paper details the importance of an "event" as it relates to SIEM.
Download Whitepaper PDF Now

Mainframe SIEM Log Management in a Distributed IT Security World This document describes a three-pronged approach to get closer to best-practice SIEM, and 10 "to-dos" to incorporate into your enterprise IT security management strategy to ensure you get there.
Download Whitepaper PDF Now

10 Step FIM Approach for Service Reliability, Data Security and Compliance

This document describes how you shore up your files systems, your file integrity, to better combat intrusion. We provide 10 steps to ensure greater file integrity monitoring, or FIM, and a more secure enterprise.
Download Whitepaper PDF Now

CorreLog Securing the Virtual Infrastructure

A discussion of CorreLog's solution for securing the virtual infrastructure, including a discussion of the cloud, and methods of demonstrating compliance. This applies to all companies and enterprises.
Download Whitepaper PDF Now

Rounding Out Your SIEM Strategy with SNMP

This document describes how you can leverage SNMP data for threat detection indicating potential threats to your IT Security. With the abundance of SNMP data being collected across your enterprise, you have a additional data toleverage in your SIEM system. Find out how in this download.
Download Whitepaper PDF Now


Correlation White Paper
This document first reviews a time-tested approach for log file reception and aggregation. Next, it will study how CorreLog identifies patterns across seemingly unrelated log data that correlates to potential security threats.And finally, it will review a proactive approach to managing threats that are automatically generated from the CorreLog server.
Learn more about the CorreLog Enterprise Server and correlation capabilities
Download Whitepaper PDF Now

McAfee ePO Integration White Paper
This white paper provides a detailed discussion of objectives and methodologies for integrating CorreLog software with McAfee ePolicy Orchestrator (ePO) software. This document describes the features and capabilities of the implementation, intended as a top-level description of how to add CorreLog's Security Information and Event Management (SIEM) functions with the ePO software system, to create a single unified system.
Download Whitepaper PDF now

BMC Performance Manager Integration White Paper
This white paper describes how the CorreLog Security Correlation Server easily integrates with BMC Performance Manager, and other BMC software, to add Security Information and Event Management (SIEM) functions to the BMC solution suite.
Download Whitepaper PDF Now

 

 


 
 

Technical Documents
Back to top


Quick Installation Guide Brief guide to installing the CorreLog Server and CorreLog WTS software.
Download PDF Now

CorreLog Installation Requirements Data sheet

Recommended requirements and specifications for installing the CorreLog system at your site, including detailed recommended platform hardware, software, security changes, and configurations.
Download PDF Now

User Reference Manual

This document is a comprehensive manual on the CorreLog Security Server and Log Correlation Server. The manual includes installation procedures, screen descriptions, application notes, and various appendices. This manual will be of interest to operators, as well as network managers and administrators responsible for installing and maintaining the CorreLog system. (250+ pages, PDF Format. Copyright © 2009, CorreLog, Inc.)
Download PDF Now

Advanced Correlation System User Guide Online copy of the Advanced Correlation Guide, 70+ Pages in Adobe PDF Format. (This manual is also incorporated into the CorreLog download, above.) Provides supplementary information on configuring correlation features of the CorreLog system.
Download PDF Now

Windows Tool Set User Manual Reference manual for the CorreLog Windows Tool Set (WTS), and Windows Agent, which can be installed on Vista, XP, and Windows 200X series platforms, to send Windows event messages to the CorreLog Server.
Download PDF Now

UNIX Tool Set User Manual Reference manual for the CorreLog UNIX Tool Set (UTS), and optional UNIX Agent. The package is first installed on a Windows platform, and then transferred to Linux, Solaris, AIX, and other systems, to add extra Syslog capability to UNIX platforms, including file integrity monitoring.
Download PDF Now


CorreLog Sigma Framework Developers Manual Online copy of the CorreLog Sigma Framework Manual, for developers, 80+ Pages in Adobe PDF Format. (This manual is also incorporated into the download, above.) Describes how to extend the CorreLog Server system.
Download PDF Now

CorreLog for use in PCI-DSS compliance The current version of the PCI DSS standard consists of twelve different sections, dealing with securing a network against unauthorized access. This includes physical security, information security, and security policies. CorreLog Server furnishes ready-to-run components that directly support sections 10 and 11 of the PCI DSS Compliance standard.
Download PDF Now

SOX compliance checklist A brief explanation of how CorreLog satisfies SOX section 302 and 404 requirements by creating a system to track user access, security information and controls, file integrity, change management, and other security indicators. With a verifiable audit trail, staff can then document every step to auditors or assessors and provide them with detailed reports that demonstrate changes made to information systems can be detected, corrections verified, and anomalies explained. The path from data to information to knowledge is quick and responsive.
Download PDF Now

Installation and User Manual for use with McAfee ePO

An installation and user manual for installing and integrating the CorreLog software with McAfee ePO. Download PDF Now

FAQ about CorreLog in the Large Enterprise

Frequently Asked Questions about using CorreLog in Large Enterprise situations.
Download PDF Now

 

ASG-Sentry White Paper
This paper describes methods of easily integrating the ASG-Sentry Network Management System with the CorreLog Security Correlation Server, including techniques, features, and benefits.
Download PDF Now

 

 

 

 

Looking for additional information? We are pleased to provide complete documentation for any our various solutions, on request. CorreLog provides extensive documentation on all of our products and services, including full documentation accompanying our downloadable software packages.
Contact us with your specific requirements to request additional materials.

Back to top

 

Privacy  |  Product Licensing  |  Contact Us  |  Toll-free USA: 1-877-CorreLog

CorreLog: High Performance Correlation, Search and Log Management

Copyright © 2010-2016, CorreLog, Inc. All rights reserved.
All trademarks and registered trademarks used herein are the properties of their respective owners.

 

Google, Twitter, Digg, SlashDot, Cisco, Microsoft