ArcSight Connectors automate the process of collecting and managing logs from any device and in any format through normalization and categorization of logs into a unified format known as Common Event Format (CEF), which is now an industry standard for log format. You can use this unified data for searching, reporting, analyzing or storing logs. ArcSight Connectors also manage ongoing updates, upgrades, configuration changes and administration of distributed deployments through a centralized web-based interface. They can be deployed as software or on an appliance.
- Scale easily to manage extreme machine data across IT
- Reduce the cost of handling large volumes of logs and events in various formats
- Automate the process of managing connectors to collect audit-quality log data
- Share, upload, or download connectors within your ArcSight community
- Seamlessly integrate with the ArcSight platform
Red Hat Enterprise Linux v6.2, 64-bit
Oracle Enterprise Linux, v6.1, 64-bit
CentOS, v6.2, 64-bit Software Version: Connector Appliance v6.3 or later Recommended Minimum Hardware:
CPU: 1 or 2x Intel® Xeon® Quad Core or equivalent
Memory: 4–12 GB
Disk space: 4-12 GB
Red Hat Enterprise Linux v6.2, 64-bit
Web browser, CLI, Web Services API
Software Version: Connector Appliance v6.4 P1 or later CPU: 1x Intel Xeon, E5-2620 2.0 GHz, 6-core Processor
RAM: 32 GB, 1600 MHz RAM
Storage: 4x500 GB (1.5 TB RAID-5)
Power: 2 x 460W CS Platinum Power Supply
Dimension (LxWxH): 27.5” x 17.1” x 1.7”
Ethernet Interfaces: 4 x 10/100/1000
This unique architecture is supported across hundreds of commercial products out-of-the-box as well as legacy systems. ArcSight Connectors also offer various audit quality controls including secure, reliable transmission and bandwidth controls. In addition to software-based deployments, ArcSight Connectors are available in a range of plug-and-play appliances that can cost effectively scale from small store or branch office locations to large data centers. Connector appliances enable rapid deployment and eliminate delays associated with hardware selection, procurement and testing.
Powerful enterprise security management software for analyzing and correlating every event that occurs across your organization
- Automate pattern analysis
- Protect critical application transactions
- Secure sensitive data
Universal log management solution for collecting machine data from any log generating source that unify searching, storing, and analysis
Store and manage all enterprise log data
- Automate compliance reporting
- Gain business intelligence for logs
A security management software solution for collecting log activity, consolidating information for storage efficiency and correlating events
Deploy all-in-one correlation and log management
- Automate security operations
- Search terabytes of log data in seconds
Out-of-the box connectors to collect, consolidate and normalize data to unify searching, reporting and analysis
Collect data from 275+ pre-built connectors
- Create new connectors with a simple toolkit
- Retain consistent monitoring
ArcSight Compliance Insight Packages help customers get moving quickly with regulatory compliance projects or to automate manual oversight processes.
Build regulation-specific dashboards
- Create auditor-friendly reports
- Automate continuous monitoring
An application built on HP's SIEM platform for monitoring user activity across accounts, applications and systems
- Monitor privileged users
- Attribute shared account usage
- Detect activity by terminated users
2018 GARTNER SIEM MAGIC QUADRANT
Read the Gartner Magic Quadrant report to learn what real SIEM customers say about HP ArcSight and the strengths that put us in the leaders' quadrant.
State Of Security Operations
Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets.
10 Ways To Build a Better Big Data Security Strategy
Enterprises of all sizes are awash in data ranging from mundane databases to unstructured data such as social media streams, streaming media, and clickstreams.
How to Better Guard Against a Security Breach
While making progress in setting strategies and policies to anticipate security breaches, many organizations are unable to fully utilize security and event data.
HPE Security Research: Cyber Risk Report 2015
In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things.
Ponemon Institute 2015 Cost of Cyber Crime Study
We are pleased to present the 2015 Cost of Cyber Crime Study: Global, sponsored by Hewlett Packard Enterprise. This year’s study is based upon a representative sample of 252 organizations in seven countries.
Growing the Security Analyst
In this paper, we will explore the aspects of recruiting, training, and retaining security analysts. A blueprint will be provided for how to find and assess candidates, how to nurture analysts during employment, and what sorts of opportunities should be granted to security analysts to help with job satisfaction and ultimately effectiveness and retention.
Protecting Your Mid-Size Business from Today's Security Threats
If you were one of millions of customers who used a credit or debit card at Target between Thanksgiving and Dec. 19, 2013, you’re well aware that your card number and even your PIN are likely for sale on some dark corner of the Internet.
Protecting Your Business With A More Mature IT Security Strategy
The chances are good that, within the previous week, the successful hack of a major brand was in the news—and that’s going to be true no matter when you happen to be reading this. In fact, these exploits are so common that they hardly qualify as news anymore.