DNIF Initial Setup

Ramasamy Balakrishnan
CEO at Irisk Assurance Consultancy Services Pvt Ltd
The setup is straightforward. Their architecture includes an adapter. Using it, you can easily connect to different devices for collecting logs. The solution has a data store and the adapter sends the logs to the data store. There is a correlation engine from which you can correlate the logs and reports. They have both a cloud-based and on-premise model also. Overall, it is not complex, it is quite easy to do. The deployment depends on the client environment. If the client has only one location, we can deploy within ten to 15 days. If a client is spread across geographies, it will take more time: two, three, or four months. It all depends on the number of locations the client has and the number of devices. If the device list is small, we can do a very fast implementation. If the device list is big, it's going to take time. Typically, although it depends on the number of locations, about two to three people would be enough to do the deployment. But to monitor the data in our security operations center, we typically require three level-one analysts. Each of our three shifts requires three people. There will also be a couple of level-two and a level-three. So about five to six people are enough to monitor a single client. View full review »
Find out what your peers are saying about NETMONASTERY, Splunk, IBM and others in Log Management. Updated: November 2019.
378,397 professionals have used our research since 2012.
Sign Up with Email