LimaCharlie

Mountain View, CA, USA
2018
  |  By Daniel Ballmer
Managed security service providers (MSSPs) must confront a worrying trend: More and more cybersecurity solutions vendors are developing—or acquiring—managed services offerings of their own. This places MSSPs in direct competition with the vendors on whose tools they depend. Large EDR/XDR providers like CrowdStrike, Palo Alto, and Check Point already have managed detection and response (MDR) services. And more large security firms are moving in this direction.
  |  By Daniel Ballmer
This blog was originally published on MSSP Alert on October 16, 2024. MSSPs want to grow—but the complexity of modern security operations (SecOps) and the unique demands of the security services market make this challenging. In this post, we’ll look at how tools with public cloud or public cloud-like pricing—pricing that is usage- or consumption-based rather than fixed fee or license-based—can help MSSPs grow more effectively and efficiently.
  |  By Daniel Ballmer
This blog was originally published on MSSP Alert on September 20, 2024 Cybersecurity platformization is usually discussed as it relates to large organizations. But cybersecurity service businesses stand to benefit as much from platformization as enterprises — if not more so.
  |  By Christopher Luft
October brought another round of enhancements to LimaCharlie, strengthening your security operations toolkit. Let's dive into the latest features and improvements we've rolled out, plus get a preview of upcoming events.
  |  By Daniel Ballmer
The second most popular OS in today’s business environment, macOS, is often neglected in cybersecurity discussions. This is likely due to Windows OS holding a dominant share (72.1%) of the global workstation market and Linux (4.03%) running critical parts of IT infrastructure. This often leaves macOS excluded from the conversation.
  |  By Daniel Ballmer
Security spending is losing momentum with a third of CISOs reporting flat or reduced budgets this year. These numbers come from a recent annual survey of 755 cybersecurity decision-makers conducted by IANS Research. Decreased spending in the face of growing cyberattacks put pressure on security leaders to find better ways to optimize their processes. Fortunately, CISOs are discovering solutions for this problem by following the tried-and-true tactics of simplification, consolidation, and innovation.
  |  By Daniel Ballmer
The SecOps Cloud Platform (SCP) helps managed security service providers (MSSPs) improve their response times in several ways. Here is an overview of the most significant use cases.
  |  By Maxime Lamothe-Brassard
The platform approach in cybersecurity is gaining traction. However, it’s becoming clear that two very different models of platformization are in play. In this piece, we’ll talk about platformization in cybersecurity, the two major approaches to security platforms, and what it all means for the future of cybersecurity.
  |  By Eric Capuano
As a security professional, you know that the ability to swiftly and effectively respond to threats is crucial. In this post, we’ll explore how LimaCharlie, a SecOps Cloud Platform, can help automate comprehensive Incident Response (IR) workflows, including forensic triage acquisition, evidence processing, and forensic timeline generation.
  |  By Christopher Luft
This session of Defender Fridays highlighted the importance of enterprise security monitoring. As cyber threats become more complex, the ability to detect and respond to them is crucial for modern business operations. Wes discussed various tools that help collect and analyze data from both networks and user endpoints, clarifying the limitations of TLS interception and concluded by recommending a blend of network and endpoint visibility for a comprehensive and robust security strategy. Links.
  |  By LimaCharlie
Maxime Lamothe-Brassard, CEO and Co-Founder of LimaCharlie, joined us to discuss the role of reverse engineering in modern defense.
  |  By LimaCharlie
On this episode of The Cybersecurity Defenders Podcast we explore the reality of modern browser threats with John Tuckner, Founder at Secure Annex.
  |  By LimaCharlie
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.
  |  By LimaCharlie
MSSPs face a difficult 2025 as several prominent security vendors move toward offering services. Staying profitable will be challenging in an environment where licensing fees are increasing, partners are becoming competitors, and emerging technologies threaten traditional security practices. Create a winning plan by joining Matt Bromiley, Lead Solutions Engineer at LimaCharlie, for an informative webinar on MSSP pricing strategies.
  |  By LimaCharlie
Michael Robertson, Senior Security Analyst at Recon InfoSec, joined us to discuss Email Threat Hunting with Detection as Code.
  |  By LimaCharlie
On today's episode of The Cybersecurity Defenders Podcast we talk about cybercrime cottage industries with Reed McGinley-Stempel, the Co-Founder and CEO of Stytch.
  |  By LimaCharlie
Jonathan Johnson, Principal Product Researcher at Huntress, joined us for Defender Fridays to discuss Scoping Telemetry for Defender Needs.
  |  By LimaCharlie
On this episode of The Cybersecurity Defenders Podcast we speak with Jibby Saetang, Security Researcher with Microsoft GHOST, about his novel path to a career in cybersecurity.
  |  By LimaCharlie
As an MSSP or MDR, your success hinges on the quality of your services and growing your customer base - not on managing infrastructure or worrying about uptime. Join us as we look at how LimaCharlie's SecOps Cloud Platform efficiently handles infrastructure, allowing you to focus on service, innovation and delivery. We'll explore how LimaCharlie's flexible, vendor-agnostic platform.
  |  By LimaCharlie
Jessica Hebenstreit, Faculty Member at IANS, presented "SOC It to 'em: Shifting from Reactivity to Proactivity in Sec Ops" for this weeks Defender Fridays session. Be part of our weekly interactive discussion where security professionals share real-world insights and practical knowledge.

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility into your coverage, build what you want, control your data, get the security capabilities you need, for however long you need them, and pay only for what you use.

LimaCharlie Sensors enable organizations to collect relevant security telemetry, logs and artifacts in real-time from any source and process that data at wire speed using a universal detection, response and automation engine. Use signature based detections, your favourite threat feed or subscribe to curated detection rules.

An engineering approach to cybersecurity:

  • Endpoint detection & response: Respond to threats at wire speed and create powerful automations. Leverage solutions custom designed for your environment and control your security posture without having to rely on external vendors.
  • Software-defined networking: Secure and monitor network access to your endpoints by providing advanced instrumented Zero Trust VPN access. LimaCharlie’s Secure Access Service Edge (SASE) makes secure remote networking easy and affordable.
  • Windows Event Log monitoring: Gain the ability to capture and analyze Windows Event Logs (WEL) in real-time. Ingested WEL are indexed along common indicators of compromise and run through the Detection & Response engine.
  • File & registry integrity monitoring: LimaCharlie's File & Registry Integrity Monitoring capability allows you to monitor specific file path patterns and registry patterns for changes.
  • Monitoring cloud deployments: Secure your cloud using LimaCharlie’s advanced Sensor technology. Run in a VM, Docker, or as a privileged container in Kubernetes. Optimize your costs with fine-grained event collection control, autoscaling and automated sensor culling.
  • YARA scanning at scale: Various YARA scanning methods are available. Run a scan on any given endpoint or continuously across the entire fleet in a way that does not impact performance. Pull YARA signatures from Github repositories and other sources, both private and public.
  • Cutting edge detections: Leverage the work of best-in-class professionals with an unparalleled cost efficiency. Subscribe to threat feeds and curated detection rules. Easily write your own custom rules and apply them instantly to your entire fleet.
  • Log and artifact monitoring: Ingest logs, or any file type, from any source and run them through the detection, automation and response engine. One year of full telemetry storage included - not just detections or select entries, but all endpoint, network, and external logs telemetry.

Detect and respond on everything.