Aug 31, 2023
|
By Maxime Lamothe-Brassard
When we put forward a vision for cybersecurity talking about building one platform that covers all security operations - or as we call it SecOps Cloud Platform - we could not have imagined that a month later, the world’s largest pure-play cybersecurity company would buy into this vision. This alignment is flattering, to say the least. Yesterday, Cole Grolmus of Strategy of Security published an article titled The Audacious Future of Palo Alto Networks.
Aug 8, 2023
|
By Matt Bromiley
Binary Library, or “BinLib”, is a collection of data and metadata pertaining to executable binaries, such as EXE or ELF files, that have been observed within your organization(s). When enabled, this extension collects observed data into your own private collection of historical executables, then subsequently available for searching, tagging, and analysis.
Aug 2, 2023
|
By Christopher Luft
Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. After switching from their custom-engineered security stack to the LimaCharlie SecOps Cloud Platform, they achieved an annual cost savings of $100,000, improved their mean detection and response times by 98%, and laid the groundwork for scalable, long-term growth.
Jul 25, 2023
|
By Christopher Luft
The current model of the security operations center (SOC) is in need of change. In this post, we’ll discuss why that is the case, what changes are needed, and how a new approach—the SecOps Cloud Platform—can solve challenges for security teams and organizations.
Jul 18, 2023
|
By Christopher Luft
Today we are launching an evolution of the LimaCharlie brand as part of our refreshed identity. The intention of this post is to simply let you know about the change, so you won’t be surprised when things coming from us look a little different. Similar to our introduction of the SecOps Cloud Platform, this evolution of our logo and brand is not driven by change for the sake of change.
Jul 3, 2023
|
By Christopher Luft
The team at LimaCharlie continues down the path of changing the way cybersecurity tools and supporting infrastructure are delivered. We have been heads down for the month of June working towards something really exciting that we are launching in July. Details about what has been happening, and what is coming up, can be found below. As always, if you have any questions or concerns, please do not hesitate to contact us.
Jun 7, 2023
|
By Matt Bromiley
LimaCharlie gives you the ability to collate and correlate data of any type, enriching it with threat intelligence and allowing for real-time, actionable decisions. Today, we are excited to discuss our new integration with alphaMountain.
May 31, 2023
|
By Christopher Luft
The team at LimaCharlie continues down the path of changing the way cybersecurity tools and supporting infrastructure are delivered. Details about what has been happening for the month of May, and what is coming up, can be found below. As always, if you have any questions or concerns, please do not hesitate to contact us.
May 3, 2023
|
By Christopher Luft
We hope you're all doing well and staying secure. The team at LimaCharlie has been hard at work developing cybersecurity solutions that are accessible and effective, and we're excited to share some recent updates with you. Last week, we had the opportunity to attend both BSides San Francisco and RSA, where we were able to connect with other cybersecurity professionals and showcase some of our latest developments.
Apr 24, 2023
|
By Matt Bromiley
Here at LimaCharlie, we believe in utilizing as much telemetry as possible to gain insight into suspicious activity within your environment. Our platform allows for you to create or import detection rules, like Sigma or SnapAttack, quickly, so your team can get up and running. Wider visibility means higher fidelity detections. However, what if we could utilize a simple, yet effective, tool to provide an earlier warning of potential attacks? This is where Canarytokens come in.
Sep 20, 2023
|
By LimaCharlie
In this session, we look at how to best use LimaCharlie’s schedule driven detection & response rules. Schedule-driven events allow you to utilize D&R rules to help automate information collection and other organization-specific operations. They can also be critical to gathering health details from your organization, allowing for easy package enumeration or sensor health checks.
Sep 8, 2023
|
By LimaCharlie
A hosted panel discussion with industry leaders to explore what advantages the SecOps Cloud Platform confers for ecosystem builders. The panel is moderated by LimaCharlie's Head of Product, Matt Bromiley. The panel participants are: Senior Security Researcher at Thinkst, Casey Smith Security Evangelist at RunZero, Huxley Barbee Head of Tines Labs, John Tuckner.
Aug 29, 2023
|
By LimaCharlie
A hosted panel discussion with industry leaders to explore the advantages of the SecOps Cloud Platform for product builders. The panel is moderated by LimaCharlie's Head of Product, Ross Haleliuk. The panel participants are: Founder & CTO of Recon InfoSec, Eric Capuano Lead Incident Detection Engineer at Blumira, Amanda Berlin What is the SecOps Cloud Platform?
Aug 22, 2023
|
By LimaCharlie
On this episode of The Cybersecurity Defenders Podcast, we chat with John Hammond, Principal Security Researcher at Huntress, about security research.
Aug 22, 2023
|
By LimaCharlie
Binary Library, or “BinLib”, is a collection of data and metadata pertaining to executable binaries, such as EXE or ELF files, that have been observed within your organization(s). When enabled, this extension collects observed data into your own private collection of historical executables, then subsequently available for searching, tagging, and analysis. BinLib also features YARA scanning, allowing you to import rules and search across observed executables - all without impacting system resources or production systems.
Jul 20, 2023
|
By LimaCharlie
LimaCharlie is inviting you to join us to change the way you view cybersecurity tools and how you manage security operations as you know it. By watching this video you will have the opportunity to learn how the SecOps Cloud Platform works—an environment where your key cybersecurity solutions can exist, not as a collection of random tools, but as a series of solutions designed to interoperate in an un-opinionated way.
Jun 13, 2023
|
By LimaCharlie
With how quickly threat actors move, your network and security teams need additional data to triangulate security investigations and ensure your users are safe. Learn how you can leverage LimaCharlie's integration with alphaMountain to provide domain and IP intelligence feeds for cyber protection based on continuously trained AI models. alphaMountain helps security architects and analysts make better, faster decisions about the risks posed by a host on the internet.
May 8, 2023
|
By LimaCharlie
LimaCharlie's Lead Solution Engineer, Matt Bromiley, talks about our engineering-centric approach to cybersecurity.
May 5, 2023
|
By LimaCharlie
LimaCharlie is a cybersecurity middleware platform to connect sources of security telemetry, automate activity based on what's being observed, and forward data where you need it. LimaCharlie puts you in complete control of your data, allowing you to build the security program that your organization wants and needs.
May 4, 2023
|
By LimaCharlie
The new Secrets feature within our Config Hive lets you decouple secret values, API keys, etc. from users, allowing for more granular secret control in LimaCharlie.
- September 2023 (2)
- August 2023 (6)
- July 2023 (4)
- June 2023 (2)
- May 2023 (5)
- April 2023 (9)
- March 2023 (7)
- February 2023 (7)
- January 2023 (7)
- December 2022 (6)
- November 2022 (6)
- October 2022 (9)
- September 2022 (6)
- August 2022 (6)
- July 2022 (4)
- June 2022 (6)
- May 2022 (4)
- April 2022 (3)
- March 2022 (6)
- February 2022 (3)
- January 2022 (3)
- December 2021 (5)
- November 2021 (6)
- October 2021 (3)
- September 2021 (4)
- August 2021 (9)
LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility into your coverage, build what you want, control your data, get the security capabilities you need, for however long you need them, and pay only for what you use.
LimaCharlie Sensors enable organizations to collect relevant security telemetry, logs and artifacts in real-time from any source and process that data at wire speed using a universal detection, response and automation engine. Use signature based detections, your favourite threat feed or subscribe to curated detection rules.
An engineering approach to cybersecurity:
- Endpoint detection & response: Respond to threats at wire speed and create powerful automations. Leverage solutions custom designed for your environment and control your security posture without having to rely on external vendors.
- Software-defined networking: Secure and monitor network access to your endpoints by providing advanced instrumented Zero Trust VPN access. LimaCharlie’s Secure Access Service Edge (SASE) makes secure remote networking easy and affordable.
- Windows Event Log monitoring: Gain the ability to capture and analyze Windows Event Logs (WEL) in real-time. Ingested WEL are indexed along common indicators of compromise and run through the Detection & Response engine.
- File & registry integrity monitoring: LimaCharlie's File & Registry Integrity Monitoring capability allows you to monitor specific file path patterns and registry patterns for changes.
- Monitoring cloud deployments: Secure your cloud using LimaCharlie’s advanced Sensor technology. Run in a VM, Docker, or as a privileged container in Kubernetes. Optimize your costs with fine-grained event collection control, autoscaling and automated sensor culling.
- YARA scanning at scale: Various YARA scanning methods are available. Run a scan on any given endpoint or continuously across the entire fleet in a way that does not impact performance. Pull YARA signatures from Github repositories and other sources, both private and public.
- Cutting edge detections: Leverage the work of best-in-class professionals with an unparalleled cost efficiency. Subscribe to threat feeds and curated detection rules. Easily write your own custom rules and apply them instantly to your entire fleet.
- Log and artifact monitoring: Ingest logs, or any file type, from any source and run them through the detection, automation and response engine. One year of full telemetry storage included - not just detections or select entries, but all endpoint, network, and external logs telemetry.
Detect and respond on everything.