At the Amazon re:Invent conference in Las Vegas this week software vendors Splunk, Sumo Logic and Alert Logic made announcements, supporting the new CloudTrail service from Amazon Web Services (AWS).
Splunk for AWS Machine Images: Splunk (SPLK) announced the availability of new Amazon Machine Images (AMIs) for Splunk Enterprise 6 and Hunk: Splunk Analytics for Hadoop. The new AMIs further accelerate the speed at which organizations can deploy Splunk software and gain critical visibility into their cloud-based applications and data. Splunk also released the new version of the Splunk App for Amazon Web Services, which leverages the newly announced AWS CloudTrail, a new service that logs all AWS API calls, to enable organizations to improve monitoring, security and compliance across all applications and infrastructure running in AWS. “Splunk Cloud, Splunk Storm and the new AMIs demonstrate our continued commitment to cloud computing and our innovative work with AWS,” said Leena Joshi, senior director of solutions marketing, Splunk. “Organizations are rapidly moving their applications to the cloud, and AWS is the leader in cloud computing. The release of AMIs for Splunk Enterprise and Hunk makes it easy for customers to use Splunk products in AWS so machine data is accessible, usable and valuable to everyone across the organization. The new version of the Splunk App for AWS will help organizations increase visibility into their cloud deployments by combining AWS access, usage and billing data to provide security intelligence along with operational and business insights.”
Sumo Logic integrates CloudTrail: Machine data analytics company Sumo Logic announced its integration with and support for Amazon Web Services (AWS) CloudTrail – a new service that records API calls made to AWS. The visualization capabilities of Sumo Logic can be used to create actionable security and operations forensics for AWS customers. The Sumo Logic integration with AWS CloudTrail enables companies to identify patterns and uncover anomalies related to user activity, network and configuration changes and resource usage. With no software installation necessary users can turn on AWS CloudTrail in the AWS Management console and then activate the Sumo Logic application for AWS CloudTrail. “Companies are in desperate need to not only aggregate all machine data but obtain deep insights from that data in order to identify and fix operational issues and quickly verify compliance with internal security policies,” said Vance Loiselle, president and CEO of Sumo Logic. “Our integration with AWS CloudTrail significantly improves the security visibility customers get across their AWS infrastructure as they expand their use of cloud computing.”
Alert Logic integrates CloudTrail: Alert Logic announced the availability using its Log Manager to proactively collect and manage account API activity using AWS CloudTrail. With the new capabilities to track account activity on AWS, customers now have a unified approach to both proactively address their security responsibilities in their cloud infrastructures as well as meet compliance standards like Sarbanes-Oxley, PCI-DSS, and HIPAA. Log Manager with support for AWS Trail provides the ability to expose new trends or customer configuration deficiencies that need to be proactively addressed. “User activity and privileged access reporting is a particularly important part of addressing security in the enterprise,” said Dave Colesante, Alert Logic Senior Vice President of Product Development and CTO. “We are pleased to keep pace with AWS innovation in addressing that need within AWS today. Our expanded functionality now enables customers to quickly address auditor questions and requests for evidence – essential components to any security-as-a-service offering.”