LogRhythm Supported Products List

2
Supported Products (Sample List) – May 2011 LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications. Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from which Logs can be collected and managed is much broader that the list below. If you are seeking support for a log source type not listed below, support may exist or can be developed to meet your needs. For any custom log source or device not currently supported for full normalization, LogRhythm can collect, archive and manage those logs out-of-the-box. Furthermore, LogRhythm provides customers with the capability to create full normalization within the application. Alternatively, LogRhythm professional services can develop support for you. Access Control Cisco Secure ACS ConSentry NAC Imperva SecureSphere RSA SecureID ACE Server Anti-Spam Proofpoint Spam Webfilter Spam Assassin Anti-Virus Blue Coat ProxyAV Clam Antivirus ESET Nod32 Antivirus Kaspersky Antivirus McAfee EPolicy Orchestrator Sophos AntiVirus Enterprise Server Symantec Antivirus Corporate Edition TrendMicro OfficeScan Antivirus Server Application Bind DB2 Epicor Coalition Finacle Core Finacle Treasury Gene6 FTP Server Juniper Application Acceleration Appliance LogRhythm Agent Meridian Microsoft Windows Server Update Service PatchLink Princeton CardSecure ProFTPD Riverbed Appliance Siemens Radiology Information System SWIFT Tandem Trade Innovations Verint Application vsFTP Content Inspection/Filter Barracuda WebFilter Citrix Netscaler Code Green Networks Content Inspection Appliance IBM Websphere iPrism Web Filter Squid Cache WebDefend WebSense Customer Relations Microsoft CRM Database IBM Informix Dynamic Server Microsoft SQL Server Oracle Database 10g Oracle Database 11g Oracle Database 9 Data Loss Prevention Fidelis XPS Directory Services Windows DFS Replication E-Mail Security IronPort Email Security Appliance McAfee Email Security Appliance McAfee GroupShield – Exchange Tumbleweed Mailgate Server E-Mail Server Blackberry Enterprise Server IBM Lotus Domino Enterprise Server Kerio Mail Server Microsoft Exchange Postfix Secure Computing IronMail Sendmail Sun Java System Messaging Server Zimbra Email Encryption SafeNet DataSecure i116 Appliance Vormetric Encryption Technology File Integrity Monitor Tripwire Firewall Applicure DotDefender Astaro Security Gateway Barracuda Spam Firewall Checkpoint Firewall Cisco ASA Cisco Firewall Services Module Cisco PIX Citrix Gateway Server Dialogic Media Gateway Fortinet Firewall Juniper Firewall Netscreen Firewall Nortel Firewall/VPN Palo Alto Firewall Sidewinder Firewall Sonic Wall Sygate Firewall Symantec Endpoint Protection Watchguard Firebox 2011

description

Supported Products (Sample List) – May 2011LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications. Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from

Transcript of LogRhythm Supported Products List

Page 1: LogRhythm Supported Products List

Supported Products (Sample List) – May 2011LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications.

Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from which Logs can be collected and managed is much broader that the list below. If you are seeking support for a log source type not listed below, support may exist or can be developed to meet your needs.

For any custom log source or device not currently supported for full normalization, LogRhythm can collect, archive and manage those logs out-of-the-box. Furthermore, LogRhythm provides customers with the capability to create full normalization within the application. Alternatively, LogRhythm professional services can develop support for you.

Access ControlCisco Secure ACSConSentry NACImperva SecureSphereRSA SecureID ACE Server

Anti-SpamProofpoint Spam Webfilter Spam Assassin

Anti-VirusBlue Coat ProxyAVClam Antivirus ESET Nod32 AntivirusKaspersky AntivirusMcAfee EPolicy OrchestratorSophos AntiVirus Enterprise ServerSymantec Antivirus Corporate EditionTrendMicro OfficeScan Antivirus Server

ApplicationBind DB2Epicor CoalitionFinacle CoreFinacle TreasuryGene6 FTP ServerJuniper Application Acceleration ApplianceLogRhythm AgentMeridianMicrosoft Windows Server Update ServicePatchLinkPrinceton CardSecureProFTPD

Riverbed ApplianceSiemens Radiology Information SystemSWIFTTandemTrade InnovationsVerint ApplicationvsFTP

Content Inspection/Filter Barracuda WebFilter Citrix NetscalerCode Green Networks Content Inspection ApplianceIBM WebsphereiPrism Web FilterSquid CacheWebDefendWebSense

Customer RelationsMicrosoft CRM

DatabaseIBM Informix Dynamic ServerMicrosoft SQL ServerOracle Database 10gOracle Database 11gOracle Database 9

Data Loss PreventionFidelis XPS

Directory ServicesWindows DFS Replication

E-Mail SecurityIronPort Email Security ApplianceMcAfee Email Security ApplianceMcAfee GroupShield – ExchangeTumbleweed Mailgate Server

E-Mail ServerBlackberry Enterprise ServerIBM Lotus Domino Enterprise ServerKerio Mail ServerMicrosoft ExchangePostfixSecure Computing IronMailSendmailSun Java System Messaging ServerZimbra Email

EncryptionSafeNet DataSecure i116 ApplianceVormetric Encryption Technology

File Integrity MonitorTripwire

FirewallApplicure DotDefenderAstaro Security GatewayBarracuda Spam FirewallCheckpoint FirewallCisco ASACisco Firewall Services ModuleCisco PIXCitrix Gateway ServerDialogic Media GatewayFortinet FirewallJuniper FirewallNetscreen FirewallNortel Firewall/VPNPalo Alto FirewallSidewinder FirewallSonic WallSygate FirewallSymantec Endpoint ProtectionWatchguard Firebox

2011

Page 2: LogRhythm Supported Products List

IDS/IPS Active Scout IPSAirDefense WIPSAirMagnet Network AssuranceCheckpoint IPS-1Cisco AIP-SSM IPS ModuleCisco IDSM-2 IDSCisco NIDSCisco Security AgentEnterasys DragonIBM ISS ProventiaJuniper IDS/IPSMcAfee Intrushield IPSMcAfee Network Access ControlNetwork Chemistry RF ProtectSnortSonicwall firewall/IDSSourceFire IDSTipping PointTop Layer IPS

Load Balancer Cisco ACE Load BalancerCisco CSS Load Balancer SwitchCisco Global Site SelectorCitrix NetScalerF5 BIG-IP Local Traffic Manager

Network ManagementBradford Campus ManagerForeScout Network Access ControlGeneric ISC DHCPInfobloxKeri Doors NetXtremeMicrosoft DHCP ServerMicrosoft ISA ServerMS System Center EssentialsMicrosoft System Center Operations ManagerMicrosoft System Management ServerX-NetStat

Operating SystemAIXAS/400 ServerBSD UnixCentOS Linux ServerGeneric LinuxHP OpenVMSHP-UXIBM iSeriesIBM ZOSIRIX

LinuxMac OSXNCR Unix System VNovell NetWareSnare Windows AgentSolarisSuse LinuxUbuntu LinuxUnix Tru64Windows 2000 ServerWindows 2000 WorkstationWindows 2003 Server EnterpriseWindows 2003 Server StandardWindows 2003 WorkstationWindows 2008 Server EnterpriseWindows Vista WorkstationWindows XP Workstation

Physical Security BioPassword

Point-Of-Sale IBM 4690 POS ControllerXPient POS CCA Manager

Remote Access Citrix Presentation ServerDefender Security Servers (DSS)Microsoft RAS Server

RouterCisco RouterEnterasys RouterHP Procurve RouterHP RouterJuniper RouterRUGGEDCOM RUGGEDROUTERWatchGuard Router

StorageEquallogic SANNetApp Filer

SwitchBrocade FC SwitchCisco SwitchDell Powerconnect SwitchEnterasys SwitchExtreme Networks Black Diamond SwitchFoundry SwitchHP Procurve SwitchJuniper SwitchNortel Passport SwitchNortel Switch

Unified Threat ManagerMcafee Secure Internet Gateway

VirtualizationMicrosoft Virtual Server 2005VMWare ESX ServerVMWare Virtual Machine

VOIPAvaya VOIP ServerCisco Call Manager VOIP Server

VPNAventail SSL/VPNCisco VPN ConcentratorF5 Firepass SSL/VPNJuniper Host CheckerJuniper SSL/VPNNortel ContivitySonicwall SSL-VPN 2000

Vulnerability Assessment McAfee Foundstone

Web ServerApacheApache TomcatBlue Coat Web Proxy ServerMicrosoft IIS

Wireless Access Airwave Management SystemAruba 5000 OS Cisco Wireless Control System

Wireless Access PointCisco Aironet Access PointSymbol WAPWS2000 Wireless Switch

2011