SenSage 3.5 features an integrated management console and a user interface that enables real-time and long-term compliance monitoring, as well as reporting capable of collecting data from a broad range of sources at a rate of 87,500 events per second.
The event-based compression software includes a new multitenancy feature to allow different lines of business to restrict access and viewing rights within the system, said officials of the San Francisco company.
Within 60 days, SenSage will announce that it will support IBMs Common Base Event autonomic computing technology with SenSages platform to enable scalable and deeper root-cause analysis.
This integration will let IBM users send and view any data in SenSages data repository formatted as Common Base Event data.
In addition, SenSage will support IBMs Autonomic Toolkit and Common Event Infrastructure technology by automatically formatting SenSage data as CBE to bolster systems event data analysis and management, said SenSage officials.
Regulatory compliance, coupled with insider threats and more sophisticated computer attacks, is forcing enterprise customers to reassess how they monitor systems, how long data must be held and what tools are in place to conduct analysis on that data, said industry observers.
Preston Wood, chief information security officer for Salt Lake City-based Zions Bancorporation, said SenSages upgrade fits nicely with his financial services companys long-term log aggregation and reporting goals.
Event management, according to Wood, has become more complex as the daily volume of events grows in conjunction with the ability to archive those events and to perform long-term trend analysis using the data.
"Everything we do in some aspect deals with compliance," Wood said. "Having the ability to monitor your logs and respond to them, to do the things that the regulations actually want you to do, [is enabled by] tools like SenSage."
Wood said SenSage has allowed his organization to incorporate traditional log-archiving mechanisms within its network.
This means Wood can continue to use his real-time event monitoring tool to respond to events, along with a system for performing trend reports using large amounts of data.
Those reports can be conducted on firewall, intrusion detection and Web server logs, as well as on other critical applications.
"As the threat landscape changes, we certainly add more controls. As you add more controls, youre adding more alerts, logs or things to watch," Wood said.