Log Aggregation and Monitoring
Information Security provides Log Aggregation and Monitoring services using ArcSight.
Why would I send my logs to Information Security?
- If you don't have space for your records
- If you want to keep records for longer than the system default
- If you want a better search interface for your logs
- If you want to aggregate or compare between logs
- If you want to monitor your logs and create alerts for certain events
How long will Information Security keep these logs?
Services We Provide
Contact us for these services
UIT and ITS Services |
For |
Getting Help |
---|---|---|
Faculty, Staff, Students, Affiliates |
||
Security Incident Response |
Faculty, Staff |
information_security@tufts.edu |
Forensic Investigation (with approvals) |
Faculty, Staff |
information_security@tufts.edu |
Identity Finder/ Information Security |
Faculty, Staff, Students, Affiliates |
|
Secure Destruction |
Faculty, Staff |
|
Information Security Training |
Service Owners |
|
Log Aggregation and Monitoring |
Service Owners |
information_security@tufts.edu |
Sensitive Information Business Practices Review |
Staff |
information_security@tufts.edu |
Additional Services (self-provided)
UIT and ITS Services |
For |
Getting Help |
---|---|---|
Mobile Device Security |
Faculty, Staff, Students, Affiliates |
information_security@tufts.edu |
Information Security Training |
Service Owners |
|
Application Security Self Scanning |
Service Owners |
information_security@tufts.edu |
Network Security Self Scanning |
Service Owners |
information_security@tufts.edu |