LogLogic, a provider of log, compliance and security management applications, has released version v3.3 of its Security Event Manager.

The company claims that the new Security Event Manager streamlines the analysis of log data throughout the enterprise and provides insights into data, simplifying security event management processes, improving security and reducing time to resolution.

LogLogic said that the new version features three new enhancements: Incident Case API supporting the Incident Object Description Exchange Format (IODEF) standard, Correlation Engine enhancement, and new log collection policies. It enhances communications with third-party applications, such as trouble ticket systems using Incident Object Description Exchange Format (IODEF).

Reportedly, the Correlation Engine enhancement to the new version allows users to instantly see, with a single correlation rule, when accounts are being hijacked or shared. In addition to the few existing correlation rules, the new version adds single correlation rules to detect the common threats that include: user account sharing, user account hijacking, distributed DOS and distributed Port scan.

The new version introduces pre-built collection policies and filtering rules to simplify the deployment. Companies have choice to collect all, none or only particular raw logs. The default settings are pre-configured for regulatory compliance with all standards, including PCI DSS, SOX, and HIPAA.

The new Security Event Manager v3.3 is expected to be available at the end of this month, starting at $25,500.