How LOGTITAN can help organization to comply with the GDPR.

LOGTITAN can play an important role in helping your organization comply with the requirements of the European Union’s looming General Data Protection Regulations (GDPR). We will show you how LOGTITAN SIEM can effectively identify and stop Personally Identifiable Information (PII) breaches.   Use Case: Personally Identifiable Information (PII) breached · [...]

How LOGTITAN can help organization to comply with the GDPR.2019-07-24T12:00:48+00:00

LOGTITAN Rule Model For A User VPNs To the Network from A New Location for The First Time Then Accesses A Shared File System

Step 1: Update VPN Users To Locations list. You must have 30 days of data available for this rule. The rule can be configured to start and stop 30 days later automatically by using “Start Time” and “Stop Time” parameters.     There are different types of lists, and each [...]

LOGTITAN Rule Model For A User VPNs To the Network from A New Location for The First Time Then Accesses A Shared File System2019-11-10T13:09:01+00:00

The Power of LOGTITAN Taxonomy

LOGTITAN standardizes the category of activities collected from log and machine data. LOGTITAN has a common taxonomy that provides many advantages. The basic idea here is that LOGTITAN attempt to map various properties of the event into standard taxonomies or classifications. This feature is more important than parsing since it [...]

The Power of LOGTITAN Taxonomy2019-11-10T12:18:39+00:00

27 LOGTITAN SIEM Use Cases Examples for Threat Detection

A SIEM’s power is in its correlation. LOGTITAN has advanced threat detection capabilities. LOGTITAN combines alerts, advanced correlations, profiles, user behavior rules to detect threats.     Below list is sample use cases from LOGTITAN correlation library:   If a user is in the administrator group and trying to authenticate [...]

27 LOGTITAN SIEM Use Cases Examples for Threat Detection2019-07-17T20:19:59+00:00

LOGTITAN’s Integration with SNORT

Snort is a free open source network intrusion detection system and intrusion prevention system. It is capable of real-time traffic analysis and packet logging on IP networks. Snort is a one of the IDS/IPS technology solutions supported by LOGTITAN. All Snort identified incidents are gathered and interpreted by LOGTITAN to [...]

LOGTITAN’s Integration with SNORT2019-08-03T18:33:19+00:00

LOGTITAN SIEM Security Data Visualization Enrichment With Kibana

    LOGTITAN is integrated with Kibana, an open-source data visualization tool that provides additional flexibility when navigating data. This allows users to create custom visualizations and interactive dashboards for greater visibility into an environment. Why Use Kibana? Kibana offers histograms, line graphs, pie charts, sunbursts, geospatial map displays, and [...]

LOGTITAN SIEM Security Data Visualization Enrichment With Kibana2019-09-14T22:51:28+00:00

DETECT AND STOP MALWARE WITH LOGTITAN

   Organizations still get hit with malware and ransomware in spite of that fact that antivirus and firewall solutions are in place. For this reason, a layered security approach will be more effective to catch malware infections before they start running. We will show you how LOGTITAN SIEM can effectively [...]

DETECT AND STOP MALWARE WITH LOGTITAN2019-11-10T12:42:34+00:00

Anatomy of an Intrusion Detection Using LOGTITAN

      The primary benefit of a SIEM system to any organization, is the fact it immensely increases the effectiveness of incident response teams. The early detection of occurrences is a key factor for incident containment and eradication, which means a reduced overall impact. Since SIEMs can correlate events [...]

Anatomy of an Intrusion Detection Using LOGTITAN2019-07-17T20:21:18+00:00
Load More Posts
Go to Top