What is Snare Central and what problem does it solve?
Snare Central is an enterprise log management and security event forwarding platform. It sits between your log sources, endpoints, cloud services, and network infrastructure, and your SIEM. Its core job is to collect logs at scale, normalise and enrich them, reduce volume through aggregation, de-duplication and filtering, and forward high-fidelity data to destinations like Microsoft Sentinel, Splunk, Securonix, Google SecOps etc. The result is dramatically lower SIEM ingestion costs, higher analyst signal-to-noise ratios, and full visibility across hybrid environments.
How does Snare Central reduce SIEM ingestion costs?
The Log Aggregation and De-duplication feature (introduced in v8.8.0) consolidates duplicate or similar events from the same source into a single enriched event within a configurable time window. Aggregation rules are defined per destination based on Log Type, Event ID, or specific field values. The original event detail is preserved in aggregation metadata, so nothing is lost, only the volume forwarded to your SIEM is reduced.
Is Snare Central suitable for MSSPs managing multiple clients?
Yes. Snare Central v8.8.0 explicitly supports multi-tenancy destinations for MSSPs. You can create multiple destinations with the same connection details to serve separate client tenancies. Each destination maintains independent statistics that persist even when names or connection details change. Snare Agent Manager provides centralised remote management of endpoint agents across all tenants, and the Executive Dashboard provides per-destination telemetry suitable for client-facing reporting.
What cloud log sources does Snare Central collect from?
Snare Central’s Cloud Logs Collection module supports Microsoft Office 365, Amazon Web Services (AWS), and Oracle Cloud Infrastructure. Cloud logs are collected, normalised, and fed into the same enrichment, aggregation, and forwarding pipeline as endpoint and network logs.
Does Snare Central Support High Availability deployments?
Yes. Snare Central includes a High Availability configuration module. v8.8.0 adds IP uniqueness validation in the HA configuration to prevent accidental misconfiguration. HA deployments are recommended for enterprise environments where log collection continuity is a compliance requirement.
What SIEM platforms does Snare Central integrate with?
Snare Central forwards to Microsoft Sentinel (with full Event Replay support), Splunk via HEC (with enhanced Splunk CIM field mapping for Windows events), Securonix, Elasticsearch (bundled for analytics and threat intelligence), QRadar (on-premises), Secureworks, Tagis, Google SecOps and any Syslog RFC 5424 or Generic JSON destination. Field remapping is supported for all destination formats as of v8.8.0.