Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Security Information & Event Management
Your teammate in cyber security
Copyright ©2019. Logsign All rights reserved. logsign.com
Copyright ©2019. Logsign All rights reserved. logsign.com
Who we are?
We believe security products should be a lot more smarter.While we continuously improve in the security intelligence area, we thrive to supply our customers with an easy to deploy, user friendly solution to cope with their cyber security problems.While doing this we never loose our focus on being a good teammate.
2010
2016
2017
Logsign founded in
Istanbul
HDFS &
Elastic Search
All-in-one SIEM
Petabyte level design
Co-managedSIEM
2013
2014
2019
SIEM Entegrated
SOAR
Copyright ©2019. Logsign All rights reserved. logsign.com
Industry Recognitions & Locations
İSTANBUL - ATAŞEHİR ANKARA - TEPE PRIME SAN FRANCISCO
Our Offices
Copyright ©2019. Logsign All rights reserved. logsign.com
Security Intelligence Compliance with Regulations Log Management
Logsign is a full feature, all-in-one SIEM solution that unifies Log Management, Security Intelligence and Compliance, delivering great value via clear visualization and better understanding to organizations.
What Is Logsign Siem?
Your teammate in cyber security
Copyright ©2019. Logsign All rights reserved. logsign.com
More than 200 out-of-box integration and free plugin
services.
Integrates with sources
Normalization,filtering,
enrichment,prioritization.
Collects logs and normalizes
Visualizes detects anomalies, threats with
over hundreds of reports and dashboards
makes your data understandable.
Traces logs,visualizes threats
Takes automatic actions and gives you clues about
your needed actions.
Hightens your security and automatizesyour responses
How Does It Work?
1 2 3 4
Copyright ©2019. Logsign All rights reserved. logsign.com
WHAT DOES REALLY MATTER FOR
ENTERPRISES?
Copyright ©2019. Logsign All rights reserved. logsign.com
Deployment and Support Simplicity
Real-time Monitoring
Security Analytics
User and Behaviour Monitoring
Data and App Monitoring
Early Threat Detection
Incident Response and Management
Security Intelligence and Correlation
Automated Reporting for IT Compliance and Internal Auditing
SpeedMassive
ScalabilityAvailability and
ClusteringDelegation
Copyright ©2019. Logsign All rights reserved. logsign.com
Easy Installation And Integration200+ Pre-Defined Integrations and Free Plugin Service
On all bare metal, virtual or cloud environment! Deployment in a day is not a dream.
Copyright ©2019. Logsign All rights reserved. logsign.com
Scalable Cluster Architecture
Big log data
More admin/users, more locations
SOC usage and visualizations
Why?
Stack tens of servers with similar roles
Distribute different servers for different roles
Granular services distributions
Multicore
Multimachine
Vertical and horizontal scalability
How does Logsign scale?
Scalability Matters
Copyright ©2019. Logsign All rights reserved. logsign.com
High Availability & Redundancy
2x, 3x, nx data backup capability
Automatic failover
Services discovery and load balancing
Self healing
Redundancy at any layer
Terabytes of live data capability
Storage and backup capability of petabytes
of data both live and offline
High Backup Capacity
Copyright ©2019. Logsign All rights reserved. logsign.com
Speed Does It
100 Millons of Data < 1 Second
Copyright ©2019. Logsign All rights reserved. logsign.com
Delegation
Every IT member and/or group can easily and flexibly be involved in cyber security. You can give permissions to every single member / group and assign unique roles, dashboards and reports.
Security admin
Linux admin
Windows admin
Network admin
Web admin
DB admin
DATABASES
REPORTS
ROLES
DASHBOARDS
Flexible Delegation Capability For Greater Team Effectiveness
Copyright ©2019. Logsign All rights reserved. logsign.com
Data Policy Manager
Logsign Dpm Efficient Data Management
Logsign has a robust data management system to optimize system and storage capacity in input, process and storage levels.
Key, Value, Field, Device, regex, Message Level data processing
All Data / Logs, BranchesMassive SendersSecurity DevicesNetwork DevicesApaplications
Input Layer Policies
Storage Layer Policies
Process Layer Policies
Copyright ©2019. Logsign All rights reserved. logsign.com
Threat Intelligence
Combine The Internal Security Sources With The Global Threat Intelligence In Real Time!
Counts threat intelligence data in correlation.Provides early threat detection and response in real-time.
Prioritizes threat intelligence data and minimizes risk.Prevents false-positives via advanced correlation capability.
Usom - abuse.ch - malwaredomains - sans - torproject - blocklist - malc0de - arbor - snort - openbl - talosintel - cyberthreatalliance - maxmind - malwaredomainlist - badips - projecthoneypot
INTERNAL FEEDS EXTERNAL FEEDS
Copyright ©2019. Logsign All rights reserved. logsign.com
Alerts And Correlation
Correlates data from different sources in real-time or historical context.
Detects security vulnerabilities and attacks.
Real-time statistical and historical correlation.
Counts threat intelligence data in correlation.
Analyzes the correlated event with dashboard and reports.
Has a wide correlation library.
High Capacity Correlation
Any Data
FirewallIPS DatabaseFileServerAPI......
Enrichment
FilteringAggregerationNormalizationClassification
Alert/ CorrelationEngine
AssetsBehavioursHistorical DataStatisticsReal Time ConditionsThreat IntelligenceVulnerabilities
REAL TIME / HISTORICAL DATA
ACTIONS
ACTIONABLE
INSIGHTS
INCIDENT
RESPONSE
Copyright ©2019. Logsign All rights reserved. logsign.com
Alerts And Correlation
Detects security vulnerabilities and attacks.
Produces alarms and informs the admins with sms and/or e-mail.
Connects to API enabled security devices and takes action, thus establishes real time security.
Detect Early & Response in Real-Time
Copyright ©2019. Logsign All rights reserved. logsign.com
Fast & Flexible Search
Logsign can help you find what you search within seconds.
Supplies correct, relevant and actionable results.
Drill down search.
Ability to filter and focus.
Ability to write new querries or modify current ones.
Flexible Search Capability
Copyright ©2019. Logsign All rights reserved. logsign.com
Dashboard
Default dashboard and widgets helps you to monitor your system and network in real time.
You can build your own dashboards for new or adhoc requirements..
Focuses on actionable results.
Customizable analysis help you visualize according to the detail level you need.
Drill down analysis.
Seamless Awareness
Copyright ©2019. Logsign All rights reserved. logsign.com
On Demand & Scheduled Reporting
Supplies default, automatic or adhoc reports, according to the demand of the users.
Lets you customize hundreds of analytics based reports.
You can easily share our web based/html/pdf or excel reports with your co-workers.
Copyright ©2019. Logsign All rights reserved. logsign.com
Easy Compliance
NERC
PCI DSS
5651
ISO 27000 Serisi
SOX
GLBA
HIPAA
FISMA
Regulations
Time Stamp
Default, Automated Reports
Digital Log Signing
Signing Of Each Log Line
End Of Day Signing
Archieve Management
Digital Certificate Management
Requirements
Copyright ©2019. Logsign All rights reserved. logsign.com
Customer Satisfaction
CUSTOMER SATISFACTION INDEX
%94*
According to ZenDesk 01.01.2019-28.02.2019 data*
Copyright ©2019. Logsign All rights reserved. logsign.com
Happy Customers
THANK YOU
For more info please contact us [email protected]
HELP CENTERsupport.logsign.net
0 850 660 0 850
İSTANBUL - ATAŞEHİR ANKARA - TEPE PRIME SAN FRANCISCO