Information
Space banner This space provides the same content as before, but the organization of the home page has changed. The content is now organized based on logical branches instead of legacy book titles. We hope that the new structure will help you quickly find the content that you need.

Establishing a secure pipeline between locations


In the following scenario, a number of syslog senders are installed at a remote location. One instance of SyslogDefender in the remote location bundles all the remote syslog messages into a single, reliable, encrypted connection. Although some or all the syslog senders are capable of only unreliable and unencrypted UDP syslog, all messages flow over the public internet using a reliable protocol and state-of-the-art TLS encryption and authentication. A second instance of SyslogDefender, located in the data center, receives and decrypts the messages, and passes them to the BMC Defender SIEM Correlation Server that is installed on the same machine or LAN segment.

image2019-3-29_18-7-31.png

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Defender SyslogDefender 5.9