Perimeter E-Security Launches SaaS-Based Log Management Solution

Simple Pricing and Ease of Deployment Allows Companies to Effortlessly Secure Their Networks and Comply with Regulations

Sep 27, 2011, 07:00 ET from Perimeter E-Security

MILFORD, Conn., Sept. 27, 2011 /PRNewswire/ -- Perimeter E-Security, the leading provider of security as a service, today unveiled a new SaaS-based Log Management solution, which allows organizations to secure their networks and comply with regulations that require log data to be collected, reviewed, and archived securely. The solution introduces a unique, "per-device" pricing model, eliminating the complexity of traditional variable pricing models.  Perimeter's Log Management solution complements the Company's current service offerings, such as intrusion detection and vulnerability assessment, and will add an extra layer of security and compliance to its network security suite.

"Every company needs to centralize and monitor their security, server and device logs. It's a security best practice, and financial regulations and mandates such as PCI-DSS increasingly require it. But today's log management solutions are hard to buy and complex to deploy. Customers shouldn't have to figure out 'events-per-second,' or use a crystal ball to size their capacity needs," said Andrew Jaquith, CTO of Perimeter E-Security. "Our new SaaS Log Management solution leaves old-world shrink-wrapped security far behind. Customers just need to answer two simple questions: how many devices do you have and how long do you want to keep the logs for? Customers can increase their security and meet their obligations in less than a week."

Perimeter's Log Management solution collects logs from customer devices and infrastructure with a thin, lightweight collector appliance that is centrally managed from the Perimeter's Security Operations Center. Logs are collected without agents by the appliance and then compressed, encrypted and forwarded to highly secure and redundant data centers for processing and storage. Customers can log into a web portal to perform real-time searches or run easy-to-read reports, such as for audit and compliance purposes, or log events, making collecting and analyzing log data simple and less time consuming.

Highlights of Perimeter's Log Management solution include the following:

  • Detects threats and defend networks from security breaches and attacks with a cost-effective SaaS solution
  • Reduces hassle and cost of installing traditional and complex security monitoring products
  • Perimeter's Security Operation Center allows security experts to assist organizations in detecting and remediating attacks
  • Easily collects logs across the whole organization and safely stores event logs in Perimeter's SAS70 Type II data centers
  • Patented 7-factor threat scenario modeling allows events to be accurately identified and correlated
  • Log Management web portal offers around-the-clock access to dynamic reports and flexible search tools for powerful analysis, forensic capabilities, and compliance reports

Perimeter E-Security is the only enterprise security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise.

About Perimeter

Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit

Join Our Community

Maggie Duquin Nolan / Sharon Oh
Brainerd Communicators
212-986-6667 /

SOURCE Perimeter E-Security