Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.

Log Manager & Log Review

Defending Against Web Application Attacks


Transform Log Data Into Insight


Log management has long been an infrastructure management best practice, supporting performance management and security incident response. However, log management has grown much more complex.


Log sources are more numerous and more varied. Infrastructure is moving from traditional hosted and on-premise deployments into the cloud. Compliance mandates such as PCI DSS, HIPAA and Sarbanes-Oxley have added new log management deliverables. Meanwhile, strategic projects compete for limited IT resources. How will your organization meet these challenges?

Log Management, delivered as a service…


SALIX’s unique Security-as-a-Service model offers you a cost-effective and easily managed way to reap the benefits of log management:


  • Maintain compliance with reliable log collection and daily log reviews
  • Improve security by leveraging log data to mitigate intrusion and security breaches


Log Manager collects, aggregates and normalizes log data, wherever it resides. Flexible data collection options – physical or virtual sensors with agent-based or agentless methodology – ensure minimal impact on your infrastructure. Once logs are transferred securely to SALIX, data is parsed and normalized for real-time analysis or scheduled reporting. Log data is stored and securely to protect against unauthorized loss, access or modification.


Log Review is a service enhancement to Log Manager and provides daily event log monitoring by SALIX’ dedicated team of security professionals. With Log Review, log analysis is never delayed or sidetracked by competing priorities.


Log Manager and Log Review also include integrated review and case management capabilities. Track and report on incident trends across your entire enterprise, including services hosted outside of your perimeter. Built-in workflow and case management tools provide an auditable trail of any suspicious findings and give a historical perspective of your entire security and compliance operation.

Meet PCI DSS Requirements


Log Manager and Log Review help meet PCI DSS requirements 10.2, 10.3, 10.5, 10.6, and 10.7. Specifically, these solutions:


  • Analyze event log data for potential security incidents, such as account lockouts, failed logins, new user accounts and improper access attempts
  • Identify incidents that warrant investigation and send notifications to you for review
  • Create an incident audit trail for auditors and regulators
  • Provide daily reports mapped to the PCI DSS standard