EventTracker Security Centre
May 01, 2016
Starts from £4,077 to £9,142
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Excellent value and wide-ranging capabilities perhaps unexpected in such a modestly priced package.
- Weaknesses: Because this is next-generation tool we are seeing a strong evolution toward full next-gen functionality. While by no means a show-stopper, look for this one to evolve considerably in the very near future.
- Verdict: If you are a small-to-medium business this product is a no-brainer. With a strong feature set for a modest price it is an excellent choice. If you are a larger organisation, by no means should you discount this one.
EventTracker is what the company refers to as "co-managed." The software installs on-premises and communicates with EventTracker support. You may select minimal up to daily support. The system is built around industry-standard tools, such as Snort and OpenVAS. EventTracker has done an excellent job of integrating these tools into a coherent user-friendly package. For example, the Snort UI is all right for security techies, but for a quick analysis, such as one might want in a SOC, the UI has been spiffed up considerably using EventTracker's Snorby UI.
We watched a demo of the tool's new features in v8.1 and then deployed the product in the SC Lab. It took very little time to load the software in our test bed, connect to our network and begin testing. The deployment is straightforward and when we looked at the various service bundles available it became clear that this is one of those products with a foot in each of the SIEM and UTM camps. For example, it can be integrated with any of several anti-malware products including client-side tools.
With Snorby it becomes its own IDS/IPS and with OpenVAS it becomes a vulnerability assessment tool that can be run by EventTracker personnel on whatever schedule you choose. Using NTOP NG it also collects flow data. For all of that, EventTracker has impressive support for over 2,000 manufacturers with differing log sources, including standard Windows-based log sources, making it a solid SIEM as well as a very good UTM. Integration can be with your tools or theirs, and all processing is done on-premises with around 92 percent storage compression for efficiency.
Once the system was up and collecting data, we were able to see threat sources displayed on a geo-location map. Drilling down on one of these sources we got a quick picture of the level and nature of the threat. The tool derives this information based on reputation. Because it integrates with any of several threat intelligence sources, further drill-down reveals known details about the threat, including, among other things, the full who is record for the IP.
Drilling further, we see the processes that are associated with the connection to the threat IP. If malware is involved, you get an MD5 hash, which goes to VirusTotal for analysis. Another feature allows a view across the enterprise based on the details of the threat. This helps identify lateral movement within the network, an important aspect of threat hunting. A detailed log of the entire threat process is available enabling a quick analysis of the threat, its current status within the enterprise, and how it got to the point where you discovered it.
All of this analysis functionality is on top of traditional SIEM and UTM features. We rate this as a next-generation tool for its use of multiple sources for analysis - e.g., threat feeds - and machine learning techniques. While this is not fully mature as a next-gen tool, it is so far along the path that we expect this to become a clear leader in the very near future. Today, with its relatively low cost and the availability of co-managed services - a real differentiator in our opinion - this is an ideal choice for medium and smaller businesses, although with its ability to handle large enterprises it is by no means a lesser SIEM tool. This is the real deal, even at a rather modest price.
Support is excellent and we were well satisfied with the documentation. Reporting is excellent and the vendor even provides a schedule for testing and report generation for a very good mix of regulatory compliance and real security.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Cyber-security must reflect risk not just regulation
- Met Police grab suspect with phone unlocked to get hold of data
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report