Log data is the “immutable fingerprint” of user and system activity, but it is very hard to access and analyse.
The data automatically collected in multiple log files can be used for security, compliance and many other applications, but many organisations barely use it at all because it is stored in multiple syslog servers. LogLogic consolidates these to provide one interface to analyse system events.
Chief marketing officer Andrew Lark says everyone has a logging tool, but they don’t just want to search one — they want to search them all and correlate the results. LogLogic provides a warehousing layer to do this.
“What Google is to the web, we are to log data,” he explains.
The most obvious applications for such data is security but it can just as easily be used to track IT operations and compliance, Lark says. Further, it isn’t just about compliance with external regulations, such as Sarbanes Oxley, but also compliance is a generic sense — with IT controls such as COBIT, ITIL, ISO and so forth.
“LogLogic allows companies to alert and report with ease and simplicity and to attest to compliance,” he says.
It can be used to prove user privileges have been adjusted and to monitor email activity in a detailed way — to show when an email hit the VPN, the firewall and so forth and what else the individual receiving the email was doing. It can also be used for troubleshooting, say with a new spam filter, and for remediation.
Lark, who joined San Jose-based LogLogic two years ago and was in New Zealand for the Morgo conference of high-growth companies, is a native Kiwi who has worked with international heavyweights such as Sun Microsystems and Nortel.
LogLogic announced late last month it was partnering exclusively with Eagle Technology in New Zealand, part of a push by Eagle to build a high-level enterprise consulting practice, says Eagle enterprise solutions manager Mike Cribbens. That practice will focus on infrastructure and enterprise management to deliver improved uptime and availability.
LogLogic will be one cornerstone of that effort along with other complementary products such as Tumbleweed, for secure file transfer.
Cribbens says another two products will be added to that set in the next four to six months.