Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logsign

Ten Cool Things Logsign SIEM Does

Easy deployment, an interface to be used intuitively and easily and a rule-based alert, bucket, dashboard and reports are the factors creating the simplicity mindset behind Logsign, who believes in “Simplicity is the ultimate sophistication”. The user interface used for the SOC teams’ threat and anomaly analysis has been designed in order to be understood easily and simply.

Suggestions to business organizations regarding security operations center and log management?

Logsign is a full feature, all-in-one SIEM solution which unifies Log Management, Security Analytics and Compliance. Smartly designed, NoSQL and hdfs embedded architecture keeps the capabilities of clustering, vertical and horizontal scalability, support for both centralized and distributed scenarios, fast indexing and real time monitoring.

Building and Evaluating a Threat Intelligence Program (Part 1)

In the previous post, we discussed the basics of Threat Intelligence and its types by throwing light on the concept of knowns and unknowns. In information security, any information which can aid the internal security team in the decision-making process and reduce the recovery time accordingly is considered as threat intelligence. This first part in this series of articles will discuss threat intelligence cycle and its importance.

Information Leakage of Threat Intelligence, Incident & Status Data

Information leakage of threat intelligence, incident data, and status data can have several legal consequences for organizations. Information leakage can occur due to the misconduct of disgruntled employees or results in by virtue of a nefarious cyber-attack. The underlying sections will take a deep dive into two different scenarios—namely, The Trauma of IP Address Leakage and The Menace of Product Vulnerability Leakage.

Introduction to Threat Intelligence and Types

The phrase Threat Intelligence has slowly gained significance in the information security community and their discussions. With the decision makers considering it as a high priority requirement, vendors have launched an array of products which are indeed confusing for an executive with the managerial background. This is an introductory post in our series of detailed discussion on threat intelligence.

In-Depth Visibility, Increased Awareness and Real-Time Response:LOGSIGN SIEM Is Now Available on the Azure Marketplace

Logsign proudly announces that our customers now have the opportunity to deploy Logsign on the Microsoft Azure cloud platform. As a next-gen, all-in one SIEM solution, Logsign primarily focuses on security intelligence, log management and easier compliance reporting for cloud, physical and virtual environments. In addition, Logsign unifies the view and monitoring of cloud and on-premises environments, and increases awareness via smartly designed, security-oriented dashboards.

In-house v. Cloud-based Log Management

Data generated by various devices connected in a network and operations being carried out on them is called as log data and we have already discussed why log management is important, considering the exponentially increasing number of attacks and their sophistication. Further, in the last blog post, we dealt with questions that you must your cloud-based log management service provider.