ArcSight Connectors

ArcSight Connectors automate the process of collecting and managing logs from any device and in any format through normalization and categorization of logs into a unified format known as Common Event Format (CEF), which is now an industry standard for log format. You can use this unified data for searching, reporting, analyzing or storing logs. ArcSight Connectors also manage ongoing updates, upgrades, configuration changes and administration of distributed deployments through a centralized web-based interface. They can be deployed as software or on an appliance.

Key features

  • Scale easily to manage extreme machine data across IT
  • Reduce the cost of handling large volumes of logs and events in various formats
  • Automate the process of managing connectors to collect audit-quality log data
  • Share, upload, or download connectors within your ArcSight community
  • Seamlessly integrate with the ArcSight platform

ArcSight Connector Appliance (ConApp)

ModelMax EPS
C3500 2500
C5500 5000
Software ConApp Supported OS:
Red Hat Enterprise Linux v6.2, 64-bit
Oracle Enterprise Linux, v6.1, 64-bit
CentOS, v6.2, 64-bit Software Version: Connector Appliance v6.3 or later Recommended Minimum Hardware:
CPU: 1 or 2x Intel® Xeon® Quad Core or equivalent
Memory: 4–12 GB
Disk space: 4-12 GB
Appliance ConApp Supported OS:
Red Hat Enterprise Linux v6.2, 64-bit
Management:
Web browser, CLI, Web Services API
Software Version: Connector Appliance v6.4 P1 or later CPU: 1x Intel Xeon, E5-2620 2.0 GHz, 6-core Processor
RAM: 32 GB, 1600 MHz RAM
Chassis: 1U
Storage: 4x500 GB (1.5 TB RAID-5)
Power: 2 x 460W CS Platinum Power Supply
Dimension (LxWxH): 27.5” x 17.1” x 1.7”
Ethernet Interfaces: 4 x 10/100/1000

 

This unique architecture is supported across hundreds of commercial products out-of-the-box as well as legacy systems. ArcSight Connectors also offer various audit quality controls including secure, reliable transmission and bandwidth controls. In addition to software-based deployments, ArcSight Connectors are available in a range of plug-and-play appliances that can cost effectively scale from small store or branch office locations to large data centers. Connector appliances enable rapid deployment and eliminate delays associated with hardware selection, procurement and testing.

ArcSight ESM

ArcSight ESM

Powerful enterprise security management software for analyzing and correlating every event that occurs across your organization
  • Automate pattern analysis
  • Protect critical application transactions
  • Secure sensitive data

Learn More

ArcSight Logger

ArcSight Logger

Universal log management solution for collecting machine data from any log generating source that unify searching, storing, and analysis
  • Store and manage all enterprise log data
  • Automate compliance reporting
  • Gain business intelligence for logs

Learn More

ArcSight Express

ArcSight Express

A security management software solution for collecting log activity, consolidating information for storage efficiency and correlating events
  • Deploy all-in-one correlation and log management
  • Automate security operations
  • Search terabytes of log data in seconds

Learn More

ArcSight Connectors

ArcSight Connectors

Out-of-the box connectors to collect, consolidate and normalize data to unify searching, reporting and analysis
  • Collect data from 275+ pre-built connectors
  • Create new connectors with a simple toolkit
  • Retain consistent monitoring

Learn More

ArcSight Compliance

ArcSight Compliance

ArcSight Compliance Insight Packages help customers get moving quickly with regulatory compliance projects or to automate manual oversight processes.
  • Build regulation-specific dashboards
  • Create auditor-friendly reports
  • Automate continuous monitoring

Learn More

ArcSight IdentityView

ArcSight IdentityView

An application built on HP's SIEM platform for monitoring user activity across accounts, applications and systems
  • Monitor privileged users
  • Attribute shared account usage
  • Detect activity by terminated users

Learn More


ArcSight Resources

2018 GARTNER SIEM MAGIC QUADRANT

2018 GARTNER SIEM MAGIC QUADRANT

Read the Gartner Magic Quadrant report to learn what real SIEM customers say about HP ArcSight and the strengths that put us in the leaders' quadrant.

Download Analyst Report

State Of Security Operations

State Of Security Operations

Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets.

Download White Paper

10 Ways To Build a Better Big Data Security Strategy

10 Ways To Build a Better Big Data Security Strategy

Enterprises of all sizes are awash in data ranging from mundane databases to unstructured data such as social media streams, streaming media, and clickstreams.

Download Analyst Report

How to Better Guard Against a Security Breach

How to Better Guard Against a Security Breach

While making progress in setting strategies and policies to anticipate security breaches, many organizations are unable to fully utilize security and event data.

Download Analyst Report

HPE Security Research: Cyber Risk Report 2015

HPE Security Research: Cyber Risk Report 2015

In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things.

Download Analyst Report

Ponemon Institute 2015 Cost of Cyber Crime Study

Ponemon Institute 2015 Cost of Cyber Crime Study

We are pleased to present the 2015 Cost of Cyber Crime Study: Global, sponsored by Hewlett Packard Enterprise. This year’s study is based upon a representative sample of 252 organizations in seven countries.

Download Analyst Report

Growing the Security Analyst

Growing the Security Analyst

In this paper, we will explore the aspects of recruiting, training, and retaining security analysts. A blueprint will be provided for how to find and assess candidates, how to nurture analysts during employment, and what sorts of opportunities should be granted to security analysts to help with job satisfaction and ultimately effectiveness and retention.

Download White Paper

Protecting Your Mid-Size Business from Today's Security Threats

Protecting Your Mid-Size Business from Today's Security Threats

If you were one of millions of customers who used a credit or debit card at Target between Thanksgiving and Dec. 19, 2013, you’re well aware that your card number and even your PIN are likely for sale on some dark corner of the Internet.

Download White Paper

Protecting Your Business With A More Mature IT Security Strategy

Protecting Your Business With A More Mature IT Security Strategy

The chances are good that, within the previous week, the successful hack of a major brand was in the news—and that’s going to be true no matter when you happen to be reading this. In fact, these exploits are so common that they hardly qualify as news anymore.

Download White Paper