Log management and analysis watches out for potential attacks to the network infrastructure. It can be compared to the followig situation: an employee from the bank pushes the red button, because a customer has a suspicious behaviour. That leads to a security agent coming to check out the event.

This is what event log management does. The patterns used for the analyse, have the ability to understand what is normal and what stands out of normal and more than that it alerts the business of those anomalies in a timely fashion.

Event log management uses your data to PREVENT security threats from ATTACKING, ensuring your business continuity.

It reduces costs with recovery and restoration after severe failure, because it defends your company against any kind of security breach.

Security event monitoring of this kind can prove to be very COST EFFECTIVE in providing meaningful analysis that leads to PRO-ACTIVE PROTECTION of infrastructure and the data within it. Considering that the threat surface is permanently expanding, and the security landscape becoming increasingly dynamic, just increasing the spend in perimeter and host-based defense systems would appear to be something of a false economy.