Continuous, real-time monitoring services
Have peace of mind knowing that real-time monitoring triggers alerts on the detection of any deviation from a known and trusted system state.
Our continuous audit services utilize system integrity monitoring and configuration assessment to track your solution according to your custom rules.
Utilizing system integrity monitoring and configuration
Your solution will be evaluated and hardened against industry standard benchmarks such as PCI and CIS, for operational, regulatory, and security policy compliance. Any deviation from this secure state is immediately reported in real time, enabling you to react and respond to system changes with no compromise in performance or compliance.
Combines real-time log management, behavioral analysis, and compliance management into a single solution
Provides the highest levels of security and ensures compliance with key standards and regulations
Event management keeps your workflow running smoothly
Not only is the collection and secure storage of log data important, but there is an increasing demand for routine analysis and review of the data. Datapipe’s next-generation solutions provide agentless collection, log storage, reporting and alerting, correlation, monitoring and workflow management in a single solution, enabling you to respond quickly to suspicious activity and keep workflow running smoothly and efficiently.
Easy collection and storage of log data
Datapipe’s security team configures all log sources to generate system and security related event logs. Without the need for agents, log collection is easy across the enterprise.
Automatic correlation for easy retrieval
Logs are forwarded to Alert Logic's Security Operations Center where they will be reviewed daily for suspicious activity, correlated into a single web interface for quick access and easy reporting, and stored for one year.
Critical custom alerting
Our custom-designed correlation rules immediately identify suspicious activity. Alerts can be sent directly to your inbox, mobile phone, or ticketing system.
Search and report for smooth workflow
Our systems continually search, report, and pivot log data. Regulatory compliance and outage detection are easily automated to ensure peace of mind.
Ironclad validation with customized escalation
Our security experts validate the legitimacy and severity of generated incidents and immediately escalate in accordance with the client’s customized Solution Escalation Action Plan (SEAP). Audit trails and integrity checks ensure that all review and escalation activities are performed as required.
Our experts handle the ongoing and vital daily review of your organization’s log data for suspicious activity.
Utilize Tripwire Configuration Assessment services to provide the highest levels of security and ensure compliance with key standards and regulations.
Tripwire doesn’t just detect change like so many simple file integrity monitoring products, or assess configuration information every once in a while. Instead, Tripwire determines if a detected change was expected and authorized, and if the same change was in compliance with policy.
How configuration assessment works
The host-based agent leveraged in Datapipe's System Integrity Monitoring service will take a baseline of a system after being hardened against any regulatory compliance standards such as PCI. Baselines only occur once or after a major system configuration change.
After a system is baselined, the agent will perform real-time compliance checks to determine if the system is still in compliance after a monitored change occurs. The Datapipe support team, managed technician (if applicable), and client will receive a real time Compliance Failure email detailing what system changes caused non-compliance, when the change was made, and by whom. The Datapipe security team will immediately follow your SEAP (Solution Escalation Action Plan) for escalation procedures to resolve non-compliant configuration issues.
You will receive Weekly Policy Scorecard reports via email indicating the degree to which monitored systems comply with established policies. Full customizable Monthly Compliance History Reports via email will also be sent to show the total number of changes detected on selected monitored systems that fall within a specified range of severity levels.