Ask and answer questions about Alert Logic solutions.

What reports are available for the Log Manager solution? Mike Konstantin 1 comment 0 votes Answered
What kind of detection rules can be created and how are they managed, for Web Security Manager (WSM) and Web Security Manager (WSM) Premier? Mike Konstantin 1 comment 0 votes Answered
How do Web Security Manager (WSM) and Web Security Manager (WSM) Premier scale as an environment grows, or in the event of a denial of service attack? Mike Konstantin 1 comment 0 votes Answered
What High Availability (HA) combinations are supported for Web Security Manager (WSM) and Web Security Manager (WSM) Premier? Mike Konstantin 1 comment 0 votes Answered
How do Web Security Manager (WSM) and Web Security Manager (WSM) Premier work in High Availability (HA)? Mike Konstantin 1 comment 0 votes Answered
What deployment methods and platforms are supported for Web Security Manager (WSM) and Web Security Manager (WSM) Premier? Mike Konstantin 1 comment 0 votes Answered
What compliance initiatives do Web Security Manager (WSM) and Web Security Manager (WSM) Premier help address? Mike Konstantin 1 comment 0 votes Answered
How do Web Security Manager (WSM) and Web Security Manager (WSM) Premier increase the security of a customer's web application environment? Mike Konstantin 1 comment 0 votes Answered
Does Web Security Manager (not Web Security Manager Premier) do any form of active blocking (e.g. TCP reset or otherwise)? Mike Konstantin 1 comment 0 votes Answered
What's the difference between Web Security Manager (WSM) and Web Security Manager (WSM) Premier? Mike Konstantin 1 comment 0 votes Answered
How often does vulnerability scan content get updated? Mike Konstantin 1 comment 0 votes Answered
How often does IDS content get updated? Mike Konstantin 1 comment 0 votes Answered
What are the Threat Manager data retention capabilities? Mike Konstantin 1 comment 0 votes Answered
Does the Threat Manager solution offer the functionality to apply filters based on IP addresses, ports, etc.? Mike Konstantin 1 comment 0 votes Answered
How is Threat Manager data collection accomplished? Mike Konstantin 1 comment 0 votes Answered
How do the solutions support automated event escalation, based on configurable queue times and criticality levels? Mike Konstantin 1 comment 0 votes Answered
What extent of customization is allowed? Mike Konstantin 1 comment 0 votes Answered
Does the Log Manager solution offer the functionality to apply filters based on IP addresses, ports, etc.? Mike Konstantin 1 comment 0 votes Answered
Is data omitted and discarded from the normalized event log? Mike Konstantin 1 comment 0 votes Answered
How is log data transported from the customer environment to Alert Logic? Mike Konstantin 1 comment 0 votes Answered
How is data collection accomplished in Log Manager? Mike Konstantin 1 comment 0 votes Answered