Management tool for managing Securepoint IT security products and third-party solutions.
The SOC client allows you to access the central server component as a VM (possibly as an appliance too at a later stage) with ease.
The SOC server obtains the log data of your appliance and provides extensive reporting functions.
The SOC can create time-controlled and fully-automatic backups of your IT security components centrally.
The Securepoint Operation Center (SOC) is the control station for your IT security and networks. The SOC is a central management solution for all Securepoint products, such as the VPN/UTM systems, the Network Access Controller and the Unified Mail Archive, and also allows for the simple integration of solutions from third-party providers. The readily available status and the ability to monitor systems from any location create a time-saving and clear process when it comes to configuring, monitoring, reporting and managing all systems. Routine IT processes are simplified and the Operation Center can be implemented directly into the your IT backup structure as a server version.
Securepoint Operation Center: Your IT security control station
The Securepoint Operation Center is a client/server application and can be run on an appliance or a virtual machine. As a result, all services are available centrally. Any number of SOC clients can access the central SOC server in order to manage the UTM and VPN systems or other IT security systems remotely. The SOC can be integrated into a central IT backup concept.
An encrypted data region is of course integrated. The SOC is thus especially suitable for managed services, providers and computer centres, which require a high degree of security.
|Product:||Securepoint Operation Center 3|
|Suitable for:||Central management of up to 5,000 UTM/VPN products and third-party systems|
A graphical display of the CPU load, the memory usage and the period of validity of licences is provided for each UTM and VPN-Gateway. In addition, it displays the number of TCP and UDP connections and the Securepoint version that is used. The dashboard allows you to search for, filter, display and sort systems to get a quick overview of thousands of systems.
You can use the Securepoint Operation Center to manage all VPN and UTM systems so that wide networks can also be managed securely. You are provided with a clear breakdown of all systems. Numerous sort and filter functions help the administrator to keep an overview of very large UTM and VPN infrastructures, too.
The main task of the SOC is to enable central remote configuration of your UTM/VPN-Gateways.
The SOC can address all UTM and VPN systems automatically and perform time-controlled, central backups of the systems. You can adjust the backup period yourself.
You can create users that you can organise into user groups in the SOC. Restricted user rights and administrator rights can be assigned for users.
The SOC provides a large number of auditing, monitoring, logging and reporting functions so that you can always keep an eye on activities.
Administrators can use monitoring to get a quick overview of the status and the utilisation of all UTM and VPN systems. Various escalation levels provide the system administrators with the information that they need at the time to act quickly and purposefully even when critical situations occur.
The SOC LogCenter records Gateway log data of syslog and archives this data at specified intervals. The LiveLog allows real-time analyses to be carried out. Archived data is retained for an adjustable period and is then deleted. The LogCenter sends daily report emails, alarm emails and event emails for self-defined events by request.
The filters implemented in the SOC are useful tools for the targeted analysis of the log data and for generating a wide variety of reports. The following reports are generated by the SOC LogClient graphically and in text form:
The Securepoint Operation Center (SOC) is an all-rounder, allowing you to integrate and to manage a myriad of different IT security systems simply, including those from other manufacturers. This includes:
You can use the Link Center to integrate the following third-party products:
|Product information:||Product brochure and features|
|Further information:||Wiki, how-tos, FAQs and change logs |
Manuals and UTM software downloads
|Courses, training, consultation and certification:||Media library (videos) |
IT security project and consultation guidelines