Security Log Monitoring

Advanced real-time tracking and threat analysis.

Identify, Correlate, and Prioritize Incidents in Real Time

CenturyLink Security Log Monitoring is a rapid threat detection and response platform that collects system and application logs within our hosted data centers, on your premise, or within other hosted or cloud environments.

Our platform identifies indicators of compromise within your logs or security events and then adds deeper context. Log Collection adapters consolidate and correlate publicly sourced threat intelligence along with proprietary threat intelligence from CenturyLink’s global network to alert on potential incidents, generating leads and forming cases for your internal staff or our security operations center to investigate and escalate as warranted.

Managed Security Services Portal User Roles

Whether we manage your systems or you manage them in-house, we offer this service so you can focus on your core business functions. You can’t do business online without cybersecurity, so our predictable business model helps you keep the cost of security and compliance within your budget. Services are available for all CenturyLink Cloud and Managed Hosting platforms, including third party cloud providers, with consolidation, SIEM rules, and monitoring and escalation.

Security Log Monitoring Benefits

Meets Security and Compliance Challenges

  • Highly cost competitive: first 10 GB/Day of log ingestion included. Flexible subscription model lets customers subscribe to features they need
  • Comprehensive compliance-driven report template library
  • Flexibility allows targeting of key concerns while optimizing security budgets
  • Foundational level of service focuses on monitoring for operational integrity
  • Options available to meet various log retention guidelines
  • Enhanced compliance reporting features available as needed
  • Maintains raw log storage for future access

Visibility Across IT Sprawl

  • Maintains logging visibility during cloud migration
  • One pane of glass to see security logging throughout entire organization
  • Interactive dashboard widgets offer high degree of customization
  • Role-based access to portal that supports federated integration
  • Options available to scale investment around technology needs
  • Vital to planning for organizational growth

Security Expertise

  • Helps with PCI/HIPPA compliance. Meets diverse regulatory compliance needs for data retention and retrieval, including PCI section 10
  • Employs real-time threat intelligence with a highly skilled team of security analysts 24/7
  • Consolidated threat alerts on events of interest across all customer data. Investigations created from leads and analyzed to determine if they require response
  • 24x7x365 SOC monitoring available
  • Protects CenturyLink platforms: Managed Hosting, Private and Public Cloud, plus AWS, Azure
  • Incident handling and breach response services available

Security Log Monitoring Features

  • Simple pricing model based on volume of security-related data transmitted per day
  • Comprehensive role-based web portal for instant visibility and analysis of events
  • Ongoing configuration of the monitoring technology
  • Proactive customer notification and escalation of items of interest
  • Unique risk-based alert process combines automation with rigorous human review
  • Log collection appliance software provided at no charge, with no annual subscription or licensing costs
  • Correlates multiple streams of data from real-time events to detect threats at the earliest stages
  • 90 days backup and storage
  • 12 months historical visibility on log data for deep context of threat trends
  • 24/7 support from CenturyLink’s GIAC Certified Intrusion Analysts with multiple years of experience and certifications such as CISSP, GCIH, CCiP, CRISC, CISM, Security+, CCNA, ACIA, CCNA, CEH, CCNA, CEH, and ITIL
  • Multiple service options available
  • Extensive use case library of algorithms to detect anomalies across all log sources with option for custom rules
  • Query capability from past 90 days to 12 months of investigative data
  • Option to consolidate hyperscalers’ cloud-native events
  • Mobile app optimizes user experience and ability to effectively monitor events of interest

Use Cases

Staying Ahead of Security Threats

As technology becomes more advanced, so do threats to security. As the variety and forms of attacks increase, most organizations proactively measure and monitor threat management.



Countering Insider Breaches

Detecting insider threats is essential to the protection of a network. Organizations must maintain a consistent level of security policies for both internal and external threats.



Why You Need A Risk Score

Security Analysts require high fidelity threat intelligence to prioritize work for themselves, their teams and stakeholder organizations. The Risk Score is a powerful metric to use for such prioritization.




Contact Us

Interested in learning more? We'll schedule a no-obligation consultation to discuss your unique IT Security challenges and see how CenturyLink can help you solve them.

Related Products

Managed Services Anywhere

Maximize your investment in multi-cloud infrastructure, with better governance, lower costs and faster application delivery.

Advanced Managed Services

Engage experienced professionals to architect, optimize and elevate operational governance for Hybrid IT environments.

Cloud Application Manager

A scalable platform for deploying applications into production across any cloud infrastructure – private, public or hosted.