Can Cloud SIEM Solutions Satisfy Compliance Regulations?

  Cloud SIEM are now popular and considered a cheaper solution. There is no software to purchase, cybersecurity professionals to hire or additional training needed to the staff up. But you have to consider log shipping costs, data sensitivity, data sovereignty as potential cons with this approach. There is a [...]

Can Cloud SIEM Solutions Satisfy Compliance Regulations?2020-07-01T14:53:14+00:00

LOGTITAN is the right NG-SIEM for you

The right SIEM tool varies based on a business’ security posture, its budget, and other factors. However, the top SIEM tools, such as LOGTITAN, usually offer the following capabilities: 1. Scalability — Ensure the solution can accommodate the current and the projected growth. 2. Log compatibility — Ensure that the [...]

LOGTITAN is the right NG-SIEM for you2020-04-15T13:56:38+00:00

LOGTITAN NG-SIEM HAS THE MOST VALUABLE SIEM USE CASES

LOGTITAN Rule As a Code [1] streaming platform detection capability is more than the traditional SIEM correlation engine. LOGTITAN is a real-time security analytics platform that ingests, normalizes, enriches, triages, and manages application and security data at scale. Let’s look at a chain of suspicious events. A user clicks on [...]

LOGTITAN NG-SIEM HAS THE MOST VALUABLE SIEM USE CASES2019-11-25T22:30:24+00:00

Alerting On Quiet Log Sources

Data sources that stop logging to your SIEM put your organization at risk. If one of your organization’s firewalls stops logging to the SIEM, your SOC will be blind to malicious traffic traversing it. If your endpoint protection application stops logging, your analysts won’t be able to see if malicious [...]

Alerting On Quiet Log Sources2019-11-10T10:32:58+00:00

Hunting Malware by Detecting Random Strings in LOGTITAN NG SIEM

There are malware tools available that can create Windows services with random service names and descriptions. Emotet infection is an example of malicious services created on the machine. This is due to how Emotet installs itself on a machine, creating randomly named numeric services, which in turn try to run [...]

Hunting Malware by Detecting Random Strings in LOGTITAN NG SIEM2019-11-08T22:06:38+00:00

Critical Process Masquerade Detection in LOGTITAN NG SIEM

A popular technique for hiding malware running on operating systems is to give it a name that’s confusingly similar to a legitimate operating system process, preferably one that is always present on all systems. Processes whose names are confusingly similar to those of critical system processes are likely to be [...]

Critical Process Masquerade Detection in LOGTITAN NG SIEM2019-11-08T23:01:45+00:00

Domain Generation Algorithms Detection in LOGTITAN NG SIEM

DNS is probably the best source of data for detecting an attacker’s command and control activity, which can be isolated by looking at outbound DNS requests. Botnets play an important role in malware distribution and they are widely used for spreading malicious activities on the Internet. Identifying algorithmically generated domains [...]

Domain Generation Algorithms Detection in LOGTITAN NG SIEM2019-11-08T23:06:34+00:00

LOGTITAN NG SIEM Federated Anomaly Detection Engine Using Classification

Next-generation detection engine of LOGTITAN Next-Generation SIEM combining rule-based and ML-based techniques. LOGTITAN Next-Generation SIEM utilizes machine learning models and advanced correlation rules together, and dynamically update each of them. [1] Anomaly detection via classification Anomaly detection with LOGTITAN SIEM infers a probabilistic model for the network behaviors of each [...]

LOGTITAN NG SIEM Federated Anomaly Detection Engine Using Classification2019-11-08T23:10:43+00:00

Malware Fighting with LOGTITAN

We will show you how LOGTITAN can effectively identify and stop malware on the host.   Use case: Malware Dropped to a HOST   URL link over an email received The user clicked on it and provided the required information The user received a LOG-IN notification from a system, he/she [...]

Malware Fighting with LOGTITAN2019-08-06T07:51:29+00:00
Load More Posts
Go to Top