SECURITY AND COMPLIANCE
See what networking services are in your area
View our high-level approaches to solving business and technology challenges
Learn how peers in your area are working with CenturyLink
Hybrid IT and Cloud
Voice and Unified Communications
Managed and IT Services
Get support, access resources, and explore products and services at centurylink.com.
When it comes to protecting your organisation from cyber attacks, it's never enough to simply collect logs and alerts on possible security breaches against your IT infrastructure. Effectively fighting malicious attacks requires continuously monitoring all the elements of your infrastructure, correlating security events for meaning, adding historical context and trending information, and analysing the outcomes to smartly extract key event data to prioritise action.
CenturyLink Security Log Monitoring collects and tracks incidents in real time, applies advanced analytics, categorizes them and sends them to an expert team for review. Teams then investigate leads and prioritise events into the top incidents that require greater analysis or immediate action.
Our advanced platform takes an industry best-practice approach by leveraging automation in combination with rigorous human review. We weed out a greater number of false positive alerts than standard systems by combining log data from the risk profiles of each customer asset with real-time threat intelligence data from CenturyLink's global corporate network and partner threat intelligence feeds.
Gain immediate visibility into systems and a deeper understanding of your security posture.
We help you apply a more strategic approach to threats by identifying and focusing on the most critical issues.
Continuously monitor all elements of your infrastructure.
The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all of your devices, endpoints, systems and networks.
Get the flexibility to fit your specific needs.
Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, CenturyLink can accommodate you.
Security Log Monitoring
Make more informed decisions, maintain compliance and save time and effort.
As the entry-level tier of service within the Security Log Monitoring offer, Foundational Monitoring provides existing CenturyLink customers with up to 10GB per day of complimentary log monitoring. The service gathers raw logs, parses meta data into normalized events and retains it remotely for viewing in our portal or mobile application. You can easily upgrade your service bandwidth to accommodate additional log ingestion as your monitoring requirements grow. The service can also be customised to your needs with our suite of optional service upgrades - including Threat Intelligence, SOC Monitoring, Cloud Security Monitoring and Advanced Monitoring Algorithms.
Our monitoring service:
Improve Security Without Adding More Resources
CenturyLink security solutions are easy to customise to your business. Find out how we can help you plan your defenses-talk with one of our security experts today.
Turn Raw Data Into Actionable Information
Protect your network better with intelligent recommendations you can act on.
CenturyLink Security Log Monitoring service provides sophisticated log ingestion, monitoring and event correlation. It uses a powerful data analysis engine that combines historical information from your network - such as data from your firewalls, IDS/IPS systems and other network devices - with near-real-time threat data. It then analyses the outcomes to provide you with a comprehensive view inside your infrastructure of all the events in motion, pinpointing attack vectors.
Features and capabilities include:
Learn how CenturyLink helped a company quickly detect and respond to a Necurs botnet infection before it infiltrated the rest of the network.
Spot, mitigate and analyse attacks with CenturyLink® Security Log Monitoring.
+65 6768 8098
For information on our privacy practices,