ArcSight Recon

Implement a SIEM log management solution created for security analytics, investigation, and compliance.

Recon is a comprehensive SIEM log management tool and security analytics solution that eases compliance burdens and accelerates forensic investigation.
Centralized Log Management
Centralized Log Management

Collect millions of events per day from across your organization and take advantage of centralized visibility into all of your security event logs. Learn more.

Search for threats
Search for threats

Sift through mountains of log data with minimal effort using dynamic query suggestions and get results faster with powerful security analytics technology. Learn more.

Report for compliance
Report for compliance

Prepare compliance documentation faster with built-in reporting content that eases the burden of requirements and audits. Learn more.

Store data at scale
Store data at scale

Store data more efficiently with Recon’s event aggregation and log compression. Learn more.

Integrate with your security environment
Integrate with your security environment

Gain a complete view of security events by integrating existing security operations solutions. Learn more.

Empower your SOC with automated response
Empower your SOC with automated response

Recon customers can implement native Security Orchestration Automation and Response (SOAR) capabilities to speed up daily security operations. Learn more.

Interested in Recon? Contact us today to learn how your organization's log management will benefit from ArcSight Recon.

Contact us ›

Dive deeper. Discover more.

  • Centralized log management

    Centralized log management

    Centralized log management

    Centralized log management

    Recon can ingest terabytes of data from any source. It provides siem log management for all your data, facilitated by SmartConnectors, which collect, normalize, aggregate, and enrich data from 480+ source types, including: syslog, clickstreams, stream network traffic, security devices, web servers, custom applications, social media, and cloud services.

    Centralized log management
  • Search for threats

    Search for threats

    Search for threats

    Search for threats

    Recon’s columnar database responds to queries faster than traditional databases, enabling it to quickly and efficiently investigate within millions of events. It facilitates threat hunting in massive datasets, enabling security analytics at scale.

    Search for threats
  • Store data at scale

    Store data at scale

    Store data at scale

    Store data at scale

    ArcSight Recon cost-effectively stores your security event log data, thanks to its impressive compression ratio. ArcSight SmartConnectors allow aggregation and filtering of events for additional log storage savings.

    Store data at scale
  • Empower your SOC with automated response

    Empower your SOC with automated response

    Empower your SOC with automated response

    Empower your SOC with automated response

    Automate your response with ArcSight’s native Security Orchestration Automation and Response solution with no additional cost. Speed up daily security operations and enhance operational efficiency with scenario driven playbooks, workflow processing, extreme automation and seamless orchestration.

    Business Resiliency through Extreme Automation

Related Products

Need business security solutions? Take a look at these security products offered by Micro Focus.