|
By Daniel Ballmer
Observability pipelines help cybersecurity teams maximize the value of their data by giving them critical visibility into telemetry. This visibility allows them to eliminate visibility gaps, enhance security operations center (SOC) efficiency, and reduce spending on high-cost SIEM tools. Until recently, the observability space has been dominated by point solutions like Cribl, Monad, and Observo.
|
By Daniel Ballmer
If you ask the Organization for Economic Cooperation and Development (OECD) how Australians feel about their country, their response would paint a rosy picture. For example, on average people around the world rate their satisfaction with their country at 6.7 out of 10. Australians rate their satisfaction at 7.1. The average electoral participation among nations is 69%, in Australia it’s 92%.
|
By Daniel Ballmer
LimaCharlie is a different kind of security vendor—and this gives managed security services providers (MSSPs) a competitive advantage unlike anything else in the industry. For MSSP users that want to deepen their partnership with LimaCharlie, we’ve developed a special MSSP Partner Program. Here’s what it’s all about.
|
By John Tuckner
As browsers increasingly become users' primary operating systems for accessing analytics, financial, and other sensitive data, their security requirements are evolving. While browser developers invest significant resources in secure development, one vulnerability remains difficult to address: browser extensions. Browser companies must maintain extension flexibility to allow users to customize their web browsing experience.
|
By David Burkett
We are excited to announce the integration of the CelesTLSH Malware Scanner into the LimaCharlie ecosystem. Developed by Magonia Research, CelesTLSH enhances your security operations by scanning files collected via the BinLib extension. It identifies known malware and threat actor tools through advanced fuzzy hashing techniques.
|
By Daniel Ballmer
Vendors increasingly claim to offer SecOps platforms. Yet, their solutions are so different from each other that buyers find themselves wondering what the term “SecOps platform” even means. We’d like to give a straightforward answer to that question.
|
By Daniel Ballmer
This blog was originally published on MSSP Alert on November 20, 2024. Imagine being able to offer your customers instant value for selecting your MSSP over others. This sounds like a tricky proposition, given that organizations seeking managed security solutions can be extremely diverse. What could a medical institution need that would also benefit an energy company? Where do the needs of a tech startup and a dairy farm intersect?
|
By Daniel Ballmer
Managed security service providers (MSSPs) must confront a worrying trend: More and more cybersecurity solutions vendors are developing—or acquiring—managed services offerings of their own. This places MSSPs in direct competition with the vendors on whose tools they depend. Large EDR/XDR providers like CrowdStrike, Palo Alto, and Check Point already have managed detection and response (MDR) services. And more large security firms are moving in this direction.
|
By Daniel Ballmer
This blog was originally published on MSSP Alert on October 16, 2024. MSSPs want to grow—but the complexity of modern security operations (SecOps) and the unique demands of the security services market make this challenging. In this post, we’ll look at how tools with public cloud or public cloud-like pricing—pricing that is usage- or consumption-based rather than fixed fee or license-based—can help MSSPs grow more effectively and efficiently.
|
By Daniel Ballmer
This blog was originally published on MSSP Alert on September 20, 2024 Cybersecurity platformization is usually discussed as it relates to large organizations. But cybersecurity service businesses stand to benefit as much from platformization as enterprises — if not more so.
|
By LimaCharlie
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.
|
By LimaCharlie
Learn how to automate and strengthen your browser extension security through LimaCharlie's integration with Secure Annex. As browsers become the primary operating system for accessing sensitive data, the security risks posed by browser extensions continue to grow. In this session, you'll learn.
|
By LimaCharlie
David Burkett, Cloud Security Researcher at Corelight, joined us for Defender Fridays to chat about building a new threat intel program.
|
By LimaCharlie
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.
|
By LimaCharlie
On this episode of The Cybersecurity Defenders Podcast we talk about talent acquisition, training, and retention in the MSSP space with Paul Ihme, Cofounder & Managing Principle at Soteria.
|
By LimaCharlie
Alex Dow, Chief Innovation Officer at Mirai Security, joined Defender Fridays to discuss the convergence of security operations and compliance, and why standardization and codification matters.
|
By LimaCharlie
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.
|
By LimaCharlie
On this episode of The Cybersecurity Defenders Podcast we speak with Garret Grajek, CEO of YouAttest, about how MSSPs help clients meet regulatory requirements and what it means for the MSSP.
|
By LimaCharlie
Security expert Ken Westin hosted a technical session focused on advancing your Identity Security Posture Management (ISPM) capabilities with LimaCharlie. Through practical demonstrations, you'll learn: Leave this session with actionable insights for strengthening your identity security monitoring program.
- February 2025 (12)
- January 2025 (14)
- December 2024 (8)
- November 2024 (11)
- October 2024 (8)
- September 2024 (14)
- August 2024 (9)
- July 2024 (9)
- June 2024 (11)
- May 2024 (11)
- April 2024 (12)
- March 2024 (9)
- February 2024 (14)
- January 2024 (3)
- November 2023 (3)
- October 2023 (4)
- September 2023 (2)
- August 2023 (6)
- July 2023 (4)
- June 2023 (2)
- May 2023 (5)
- April 2023 (9)
- March 2023 (7)
- February 2023 (7)
- January 2023 (7)
- December 2022 (6)
- November 2022 (6)
- October 2022 (9)
- September 2022 (6)
- August 2022 (6)
- July 2022 (4)
- June 2022 (6)
- May 2022 (4)
- April 2022 (3)
- March 2022 (6)
- February 2022 (3)
- January 2022 (3)
- December 2021 (5)
- November 2021 (6)
- October 2021 (3)
- September 2021 (4)
- August 2021 (9)
LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility into your coverage, build what you want, control your data, get the security capabilities you need, for however long you need them, and pay only for what you use.
LimaCharlie Sensors enable organizations to collect relevant security telemetry, logs and artifacts in real-time from any source and process that data at wire speed using a universal detection, response and automation engine. Use signature based detections, your favourite threat feed or subscribe to curated detection rules.
An engineering approach to cybersecurity:
- Endpoint detection & response: Respond to threats at wire speed and create powerful automations. Leverage solutions custom designed for your environment and control your security posture without having to rely on external vendors.
- Software-defined networking: Secure and monitor network access to your endpoints by providing advanced instrumented Zero Trust VPN access. LimaCharlie’s Secure Access Service Edge (SASE) makes secure remote networking easy and affordable.
- Windows Event Log monitoring: Gain the ability to capture and analyze Windows Event Logs (WEL) in real-time. Ingested WEL are indexed along common indicators of compromise and run through the Detection & Response engine.
- File & registry integrity monitoring: LimaCharlie's File & Registry Integrity Monitoring capability allows you to monitor specific file path patterns and registry patterns for changes.
- Monitoring cloud deployments: Secure your cloud using LimaCharlie’s advanced Sensor technology. Run in a VM, Docker, or as a privileged container in Kubernetes. Optimize your costs with fine-grained event collection control, autoscaling and automated sensor culling.
- YARA scanning at scale: Various YARA scanning methods are available. Run a scan on any given endpoint or continuously across the entire fleet in a way that does not impact performance. Pull YARA signatures from Github repositories and other sources, both private and public.
- Cutting edge detections: Leverage the work of best-in-class professionals with an unparalleled cost efficiency. Subscribe to threat feeds and curated detection rules. Easily write your own custom rules and apply them instantly to your entire fleet.
- Log and artifact monitoring: Ingest logs, or any file type, from any source and run them through the detection, automation and response engine. One year of full telemetry storage included - not just detections or select entries, but all endpoint, network, and external logs telemetry.
Detect and respond on everything.