UserGate Log Analyzer F25 is intended for use at major companies and data centers. This hardware and software system has great information storage capabilities and allows data received from UserGate servers to be processed as quickly as possible. |
|
Comprehensive Infrastructure Protection
Large projects impose particular demands on system performance. UserGate Log Analyzer F25 complements the functionality of the UserGate server solution, operates on the most powerful platform and processors, and is designed to aggregate data related to the analysis of security incidents as well as to monitor events and generate reports.
Reports
Based on the obtained data, UserGate Log Analyzer performs a deep analysis on the security events that have occurred, and any suspicious activities of individual users or hosts are identified and tracked. These functions are also necessary in order to comply with the modern SOAR (Security Automation, Orchestration and Response) concept. When configuring UserGate, you can specify what event types are submitted for analysis to the Log Analyzer:
- Event log
- Intrusion detection system log
- Traffic log, SCADA events
- Events from the web access log
UserGate Log Analyzer F25PerformanceStorage: 25 TB Number of records per second: 530 000 Estimated log storage time: 1 300 days Size of OrganizationRecommended number of users: up to 10 000 Equipment Specifications10/100/1000Base-T ports: 9 built-in ports IPMI management: yes Processor, number of cores: 32 RAM: 64 GB HDD: 25 TB, RAID-5 hot spare SizeDimensions: 2U 438 × 600 × 88 mm (17.24 x 23.62 x 3.46 inches) Weight: 25 kg Rack mount: set of rails for installation in a 19-inch rack Power SupplyAdditional hot-swappable power supply: yes Power: 140–220 V Power consumption (max): 800 W |
Reduction of the load on UserGate gatewaysLog processing and report generationConsolidation of logs from several gateways for general analysis |
Option for in-depth loggingOption for increasing the size of the store on LogAn serversAbility to collect and analyze information from third-party devices |