Support
 
Support Get Quote
 
 
 
 

Easily ensure Cyber Essentials compliance using EventLog Analyzer

 
Cyber Essentials Overview

EventLog Analyzer is trusted by over
10000 customers

           

Simplifying compliance management

Collect, correlate, analyze, and archive logs from across the network and simplify log management with a unified view of log data.

Analyze logs in real time, and automatically trigger alerts and notifications when critical events occur to detect and respond to security events promptly.

Generate detailed and accurate compliance reports to demonstrate conformity to Cyber Essentials during audits and assessments.

       
Cyber Essentials requirements Requirement description EventLog Analyzer reports
D.1 Boundary firewalls and internet gateways Organizations should protect every device in scope with a correctly configured firewall (or network device with firewall functionality).
  • Windows Firewall Threats
  • Network Device Logon Reports
  • Network Device Attack Reports
  • Network Device Configuration Reports
  • Network Device Security Reports
  • Network Device Rule Management Reports
  • VPC Activity
  • WAF Reports
D.2 Secure Configuration Proper configuration of computers and network devices should be carried out to minimize inherent vulnerabilities and ensure that only the services needed to carry out their designated tasks are available.
  • Policy Changes
  • Windows User Access
  • User Account Validation
  • User Account Changes
  • Computer Account Changes
  • User Group Changes
  • Unix User Access
  • Network Device Account Management Reports
D.3 Patch Managaement Maintain the latest security patches and updates on the software utilized on computers and network devices.
  • Windows System Events
  • Windows Services
  • Network Device Security Reports
  • Nessus Vulnerability Reports
D.4 User access control Authorized individuals should be the only ones assigned user accounts, especially those with special access privileges, like administrative accounts, and effective management should be implemented to prevent the misuse of such privileges.
  • Policy Changes
  • Windows User Access
  • User Account Validation
  • Unix User Access
  • AWS User Activity
  • AWS Failed/Unauthorized Activity
  • Oracle Account Changes
  • Network Device Logon Reports
D.5 Malware Protection The use of malware protection software is necessary to safeguard computers in an organization that are connected to the internet, and it is essential to implement strong malware protection measures on these devices.
  • Windows Software Updates
  • Anti-malware
  • Other Software
  • Windows Removable Disk Auditing
  • Windows Threat Detection from Antivirus
  • Windows Threat Detection
  • Windows Application Whitelisting

Built-in support for IT compliances

PCI-DSS  FISMA  HIPAA  SOX  GLBA  ISO 27001:2013 

What else does EventLog Analyzer offer?

  •  

    Log collection and consolidation

    Collect and consolidate log data from various sources, such as servers, applications, and network devices. This allows you to centralize your log data in a single platform, making it easier to search, analyze, and monitor logs for troubleshooting.

    Learn more
  •  

    Threat intelligence

    Identify and respond to emerging threats instantly with threat intelligence feeds that provide real-time information about known malicious entities, IP addresses, domains, and indicators of compromise (IOCs).

    Learn more
  •  

    Cloud infrastructure monitoring

    Monitor all AWS EC2 instances in real time, and detect suspicious activities with timely alerts, enhancing the network security of your system.

    Learn more
  •  

    Log forensics and investigation

    Investigate security event with EventLog Analyzer's powerful search, log correlation, and log visualization capabilities. It allows security teams to reconstruct incidents, trace activities, and identify the root cause of security breaches or system failures.

    Learn more

Frequently asked questions

What is Cyber Essentials?

The UK government developed Cyber Essentials, a cybersecurity certification program, to aid organizations in safeguarding themselves against cyberthreats and demonstrating their dedication to cybersecurity.

Who does Cyber Essentials apply to?

Cyber Essentials compliance applies to organizations of all sizes and sectors that aim to strengthen their cybersecurity measures and protect against common online threats. The scheme applies to businesses, non-profit organizations, and government entities in the United Kingdom and beyond.

Is Cyber Essentials mandatory?

Cyber Essentials is not mandatory for businesses but organizations that work with the UK government and organizations who bid for government contracts are required to be compliant to Cyber Essentials.

Establish Cyber Essentials compliance easily with EventLog Analyzer.

Get your free trial

Resources

Compliance guide

Explore  

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management