LogLogic Signs a Definitive Agreement to Buy Exaprotect Pat Sueltz | April 22, 2009
Legal Disclaimer <ul><li>This presentation does not constitute an offer to sell or the solicitation of an offer to buy Log...
A Break-through in Security Management <ul><li>LogLogic signed a definitive agreement to acquire the outstanding securitie...
Company Backgrounders <ul><li>Founded 2002 </li></ul><ul><li>Privately held </li></ul><ul><li>120+ employees </li></ul><ul...
Even Better Together Most complete security management suite Unifying historically disparate point solutions Closing the ...
Complementary Intellectual Property <ul><li>Up to 100 x Faster log management reporting </li></ul><ul><li>Combined normali...
LogLogic Delivers Value in a Tough Economy Traditional SIEM LogLogic Compliance Management Database Security Management Lo...
The Three Steps to Security Management Maturity 1 2 3 What’s important? Security Event Management Compliance Management Wh...
Open Log Management Platform Accelerates Integration of new Log Powered Applications Contextual Data Network Servers Datab...
Available Today: Log Powered Applications Working Together LogLogic Change Manager LogLogic Database Security Manager Lo...
Towards Automated Management and Prevention Indexed Information Normalized Information Semantic Information Contextual Inf...
And Fine Grain Monitoring and Prevention Network Systems Applications Transactions Information Traditional SIEM Databas...
Fine Grain Monitoring Enables Accurate Prevention Sensitive Information Network Systems Applications Transactions Informat...
Questions? <ul><li>Check out blog.loglogic.com for ongoing news </li></ul><ul><li>Also on http://twitter.com/loglogic ...
of 14

Preso: LogLogic Agrees to Acquire Exaprotect

As the log management leader, LogLogic has built an extensible open log management platform. The acquisition of Exaprotect will enable LogLogic to expand its product offerings into security event and security change configuration management. This presentation has more details about how we stack up.
Published on: Mar 4, 2016
Published in: Technology      Business      
Source: www.slideshare.net


Transcripts - Preso: LogLogic Agrees to Acquire Exaprotect

  • 1. LogLogic Signs a Definitive Agreement to Buy Exaprotect Pat Sueltz | April 22, 2009
  • 2. Legal Disclaimer <ul><li>This presentation does not constitute an offer to sell or the solicitation of an offer to buy LogLogic securities. The LogLogic securities have not been registered under the Securities Act of 1933, as amended (the “Act”), or under any state securities laws, and may not be offered or sold in the United States or to U.S. persons (as defined in Regulation S of the Act) absent registration or an applicable exemption from the registration requirements pursuant to the Act. LogLogic does not intend to register the shares issued as consideration for Exaprotect in whole or in part in the United States or to conduct a public offering in the United States. </li></ul>
  • 3. A Break-through in Security Management <ul><li>LogLogic signed a definitive agreement to acquire the outstanding securities of Exaprotect, subject to customary closing conditions </li></ul><ul><li>Announcement via a press release April 22 nd during the RSA Conference </li></ul><ul><li>Acquisition expected to close this quarter </li></ul>
  • 4. Company Backgrounders <ul><li>Founded 2002 </li></ul><ul><li>Privately held </li></ul><ul><li>120+ employees </li></ul><ul><li>700+ customers </li></ul><ul><li>150+ partners </li></ul><ul><li>Founded in 2004 </li></ul><ul><li>Privately held </li></ul><ul><li>50+ Employees </li></ul><ul><li>200+ Customers </li></ul><ul><li>30+ Partners </li></ul>Founded in 2002 170+ employees 900+ customers 200+ partners Proven ability to execute Strong patent portfolio +
  • 5. Even Better Together Most complete security management suite Unifying historically disparate point solutions Closing the security management loop Extensible Open Log Management Platform + <ul><li>Log management platforms </li></ul><ul><li>Compliance management </li></ul><ul><li>Database security management </li></ul><ul><li>Security event management </li></ul><ul><li>Security change/configuration management </li></ul><ul><li>Behavioral threat monitoring </li></ul>
  • 6. Complementary Intellectual Property <ul><li>Up to 100 x Faster log management reporting </li></ul><ul><li>Combined normalization and indexing </li></ul><ul><li>Compliance workflow </li></ul><ul><li>Ease of installation and use </li></ul><ul><li>Native appliance architecture </li></ul><ul><li>Auto identification </li></ul><ul><li>Self maintaining database </li></ul>Intellectual Property <ul><li>Up to 100x Faster security event processing </li></ul><ul><li>Human language taxonomy and behavioral monitoring </li></ul><ul><li>Security incident workflow </li></ul><ul><li>Ease of installation and use </li></ul><ul><li>Native appliance architecture </li></ul><ul><li>Natural language policy editor </li></ul><ul><li>Efficient correlation administration </li></ul>+
  • 7. LogLogic Delivers Value in a Tough Economy Traditional SIEM LogLogic Compliance Management Database Security Management Log Management Change Management Log Management Compliance Reports Security Event Management Security Event Management Change Management Bundled solution One stop shop Do more with less Time to value
  • 8. The Three Steps to Security Management Maturity 1 2 3 What’s important? Security Event Management Compliance Management What to do? Change Management Database Security What’s going on? Log Management Database Activity Monitoring
  • 9. Open Log Management Platform Accelerates Integration of new Log Powered Applications Contextual Data Network Servers Database Applications LogLogic Compliance Manager Partner Applications Correlation LogLogic Security Event Manager Open APIs LogLogic Database Security Manager Customer Applications Security Asset Identity Configuration Open Log Management Platform LogLogic Change Manager
  • 10. Available Today: Log Powered Applications Working Together LogLogic Change Manager LogLogic Database Security Manager LogLogic Security Event Manager “ access to HR data” 1 (Privileged) User Activity Periodic Review 3 4 “ and sends e-mail” Prioritize Alert Prevention Investigation 2 LogLogic Compliance Manager Networks Servers Databases Applications
  • 11. Towards Automated Management and Prevention Indexed Information Normalized Information Semantic Information Contextual Information Action Actionable Information – Alerts, Reports, Portals, etc. Log Files Data Information Recommendation Prediction Action
  • 12. And Fine Grain Monitoring and Prevention Network Systems Applications Transactions Information Traditional SIEM Database Activity Monitoring Sensitive Data Privileged Users Applications Host Sensor Transaction Records. Customer Data. Financial Records. Intellectual Property. Personally Identifiable Information. Shared Memory DBMS
  • 13. Fine Grain Monitoring Enables Accurate Prevention Sensitive Information Network Systems Applications Transactions Information Data Information Recommend Prediction Action Fine grain monitoring. More accurate prevention. What are the logs saying? What to do about it?
  • 14. Questions? <ul><li>Check out blog.loglogic.com for ongoing news </li></ul><ul><li>Also on http://twitter.com/loglogic </li></ul>

Related Documents