Search

OpenService Announces Availability of Security Threat Manager (STM) Version 3.0.

0 views

What’s New in Security Threat Manager 3.0

Security Threat Manager (STM) 3.0 arrives with a suite of updates designed to give security teams a sharper edge against ever‑evolving threats. The core of STM’s evolution lies in its ability to connect real‑time alerts to the business units that matter most, while providing a structured framework for operators to act before a breach can take hold. The release brings a new layer of intelligence, a more intuitive visual engine, and expanded platform support that together form a more comprehensive and actionable security posture.

First, the new Security Business Intelligence module transforms raw alerts into business‑centric risk scores. STM 3.0 assigns a weight to each event based on the value of the affected asset, the severity of the attack, the vulnerability exploited, and the location of the sensor that detected it. These weighted scores are then aggregated across business lines, producing a heat map that highlights which departments or functions are under the most pressure. The visualization is not a static image; users can drill down to individual hosts or services within any region, applying custom rules that map specific vulnerabilities to the parts of the enterprise that rely on them. With this approach, security managers see not only what is happening but why it matters to the bottom line.

The new guided threat response capability addresses a long‑standing pain point: inconsistent, ad‑hoc incident handling after hours. STM 3.0 lets second‑ and third‑line staff trigger pre‑defined response actions for common threat scenarios. Instead of calling on‑call experts, the operator can run a script that isolates a host, blocks malicious IPs, or rolls back a configuration to a known safe state - all within minutes. The platform also tracks every action taken, adding versioning and configuration management to the process. This traceability proves invaluable during regulatory audits, where documentation of response actions can be the difference between compliance and a costly penalty.

On the architectural front, STM 3.0 introduces a custom correlation rules editor that extends the existing stateful risk‑analysis engine. Administrators can now build complex correlation logic using a visual interface, tailoring the system to the nuances of their environment. The update also brings full support for Red Hat Linux, expanding the operating systems on which STM can run. The platform’s log forensics database receives an overhaul, allowing it to ingest, index, and analyze years of firewall, server, and IDS logs without performance loss. Combined, these changes give STM a broader reach and deeper memory, making it easier to spot long‑term trends and emerging attack vectors.

The release is not only about new features. STM 3.0 also refines its automated update service, ensuring that signature, exploit, and vulnerability data stay current without manual intervention. The update process is now fully integrated into the main deployment, meaning that the system pulls fresh threat intelligence and security patches in the background while it continues to serve live alerts. This reduces the window of exposure for new vulnerabilities and keeps the risk assessment engine operating at peak accuracy.

Industry experts weigh in on the significance of these enhancements. Dan Keldsen, Senior Analyst and CTO at Delphi Group, notes that security information management software is growing in importance as teams wrestle with the avalanche of alerts generated by dozens of solutions. “Organizations need to analyze and categorize the threats they face in terms of the risk to their business and operations, not just theoretical risk as viewed by many other security layers,” he says. “The value of using SIM software to integrate these disparate data sets is to guide organizations toward the most critical threats in their planning and response.”

Phil Hollows, VP of Product Marketing at OpenService, highlights the platform’s dual role in both proactive risk reduction and reactive incident response. “STM 3.0 is the first SIM to become a platform that guides both proactive and reactive IT security risk management and incident response processes,” Hollows explains. “Its ability to easily map enterprise risk and real‑time threats to business operations - and to provide operators with the structure they need to respond appropriately - enables our customers to prove compliance with Sarbanes‑Oxley and HIPAA mandates while saving time not chasing false alarms that have been eliminated by its state‑of‑the‑art correlation algorithms.”

In short, STM 3.0 unifies data from multiple sensors, normalizes it into business‑relevant risk scores, and provides a structured, repeatable path for operators to mitigate those risks. The result is a more focused, evidence‑based approach that aligns directly with regulatory requirements and business objectives.

How STM 3.0 Helps Organizations Meet Compliance and Reduce Risk

Regulatory frameworks like Sarbanes‑Oxley and HIPAA impose strict requirements on data protection, breach notification, and auditability. Meeting those mandates demands a security solution that can prove the organization’s intent to monitor, detect, and respond to threats in a timely manner. STM 3.0 delivers this proof in three tangible ways: real‑time risk correlation, consistent operator actions, and comprehensive audit trails.

First, the real‑time risk correlation engine translates low‑level alerts into high‑level business impact scores. By tying every intrusion attempt, vulnerability discovery, or anomalous network flow to the value of the asset it threatens, STM turns an overwhelming flood of events into a clear hierarchy of priorities. Compliance auditors look for evidence that an organization is aware of its most valuable data and that it takes steps to protect it. With STM’s visual dashboards, managers can generate on‑demand reports that show, for example, that the finance department’s transactional database has been the subject of the most critical attacks this quarter, and that those attacks were flagged and responded to within minutes.

Second, the guided threat response framework provides a documented, repeatable path for handling incidents. In a compliance audit, the ability to show that a specific incident triggered a predefined sequence of actions - such as isolating a compromised host, revoking credentials, and notifying stakeholders - demonstrates that the organization has a structured incident response plan. STM 3.0 records each step in the response workflow, assigning timestamps, user IDs, and the exact commands executed. This granular audit trail satisfies auditors’ demands for evidence that an incident was handled in accordance with the organization’s policy.

Third, the platform’s integrated configuration management and versioning add a layer of assurance that security controls are consistently applied across the enterprise. STM’s settings for sensor placement, correlation rules, and response scripts are stored in a central repository. When an update is pushed to the system, the platform logs the change, records who authorized it, and captures the previous state for rollback if necessary. Regulators expect to see proof that security controls were not only in place but also kept current. STM’s automated update service keeps threat signatures and vulnerability databases fresh, while the versioning system ensures that any drift from baseline configurations can be identified and corrected promptly.

Beyond compliance, the risk‑based approach in STM 3.0 leads to a measurable reduction in incident impact. By focusing attention on high‑value assets and orchestrating consistent response actions, organizations can reduce the mean time to containment and, in many cases, eliminate breaches before they materialize. The platform’s historical log analysis feature lets teams look back at past incidents to identify patterns, adjust correlation thresholds, and refine response playbooks. This continuous improvement loop not only hardens defenses but also strengthens the organization’s position when presenting evidence to regulators.

For companies that already run multiple security tools - firewalls, IDS/IPS, endpoint protection, and cloud security posture management - STM 3.0 offers a single pane of glass to view and act on data from all those sources. The platform’s ability to ingest and normalize logs across diverse vendors eliminates data silos and ensures that compliance requirements are addressed holistically rather than piecemeal. This consolidation is especially valuable for smaller security teams that must manage complex threat landscapes with limited staff.

In practice, an organization might use STM 3.0 to monitor a new e‑commerce platform that processes credit card transactions. The system assigns a high risk weight to any alert affecting the payment gateway, triggers an automated isolation script if a credential‑stealing attempt is detected, and logs every action in a tamper‑evident audit trail. When the payment regulator requests proof of breach response, the company can export a report that shows the exact steps taken, the time elapsed between detection and isolation, and the final resolution status - all generated by the same tool that identified the threat in the first place.

By aligning threat detection, risk assessment, and incident response into one cohesive workflow, STM 3.0 turns compliance from a bureaucratic hurdle into a strategic advantage. It allows security leaders to demonstrate, in clear and measurable terms, that they are actively protecting the organization’s most critical assets and are prepared to respond swiftly when the unexpected occurs.

Pricing and Deployment Options

Security Threat Manager 3.0 is available for purchase today and is priced according to the volume of log events the organization needs to manage. The tiered model scales from a small deployment handling tens of thousands of events per day to large enterprise installations that process millions of events across multiple sites. Because the system uses a lightweight agentless architecture for most sensor connections, the cost of hardware is limited to the baseline server footprint required to run the core application and the forensics database.

OpenService offers both on‑premises and cloud‑based deployment choices. For organizations that require full control over their security data, the on‑premises version installs on Windows, Solaris, or Red Hat Linux servers. The deployment includes a central dashboard, a log aggregation engine, and the correlation and response modules. For those who prefer a managed solution, the cloud option hosts the entire STM stack in a private virtual network, automatically handling scaling, patching, and backup. In either case, the licensing cost covers the core features: real‑time threat intelligence, business‑centric risk scoring, guided response playbooks, and the audit‑ready logging framework.

In addition to the standard license, OpenService offers a professional services package that covers initial configuration, integration with existing security tools, custom rule development, and training for security analysts. This package can be especially useful for large organizations or those with complex compliance obligations, ensuring that the platform is configured to match their unique risk profile from day one.

Because the cost is driven by log volume, the investment can be adjusted as the organization grows. If an enterprise expands its network or introduces new data centers, the licensing tier can be upgraded without a full re‑architecture. The platform’s modular design allows additional sensors and data sources to be added incrementally, keeping the deployment flexible and cost‑effective over time.

OpenService provides a transparent pricing model with no hidden fees. Customers can request a custom quote based on their expected event volume, deployment environment, and any additional services they require. Once the license is issued, the product includes two years of free updates, during which the automated update service keeps the threat database current and pushes any new correlation rules or response templates. After the two‑year period, customers can opt for an extended support plan that continues to provide updates, bug fixes, and access to the OpenService technical support team.

In summary, STM 3.0 offers a scalable, compliant‑ready security platform that can grow with an organization’s needs. Whether deployed on‑premises or in the cloud, the licensing structure aligns directly with operational cost, making it a pragmatic choice for security teams looking to maximize protection while managing budgets efficiently.

Suggest a Correction

Found an error or have a suggestion? Let us know and we'll review it.

Share this article

Comments (0)

Please sign in to leave a comment.

No comments yet. Be the first to comment!

Related Articles