SlideShare a Scribd company logo
1 of 10
Download to read offline
TheEasiest
Solutionfor
Next-GenerationSIEM
SureLog
International
Edition
www.anetusa.net
ANET
SURELOG
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
3
SureLog
Next-GenerationSIEM
ANETSURELOGMAINADVANTAGES
*Forensiccapabilities
*Correlationengine
*Performance
*MachineLearning
*DashboardsIncidentresponse
*ComplianceReporting
*ScalabilityLogcompatibility
*Taxonomymodule
*ThreatIntelligence
*Themoresophisticatedcorrelationenginethantheothercompetitive
products.
*Advancedrules
*Visualruleeditor
*Creatingrulesfromthedynamiclists
*Updatingthegloballistsdynamically
*Rulesuspending
*Timebasedrules
*Automaticactionstoatriggeredcorrelatedevent
*BigData
*Distributedarchitecture
Theproducts
Scalability:
SureLogcanscaleintoanyorganization—bigorsmall,locallybasedoroperating
globally.ANETSureLog“HierarchicalMaster-SlaveModel”manageeventsinadistrib-
utedmannerforoffloadingtheprocessingrequirementsofthelogmanagement
systemfortaskssuchascollecting,filtering,normalization,aggregation.
Thismodelalsoissolutionforsecurityrelatedissuesandincrementalapproach.
Themainadvantageof“HierarchicalMaster-SlaveModel”iseasilyextendableand
scalablebyaddingregionalSIEMimplementations.
Logcompatibility:
SIEMfunctionsbasednotjustonitscorrelationrulesbutonthedatayoufeedit.
FeedingyourSIEMsecurity-relateddataresultsinmoreaccuratealerts.
Ifthereisalogformatthatisnotsupported,thereisanAPIforcustomlogparser.
SureLoghasnearly500+supporteddevice.
Dashboards:
Real-Timemonitoringanddashboardspermitsvisibilityatthedesiredlevelvia
security-based,pre-definedandcustomizableanalysis.
Inaddition,youcancreaterealtimeandeasyreportsbypreparingdashboardsand
widgetswhichareappropriateforyournewadhocrequirements.
TheSureLogapplicationfeaturesdashboardsonvarioussecuritytopics.
Dashboardsdelivermonitoringandreportingmetricstotrackthestateofsecurity
throughoutthenetwork.
Thesearesimpletoconfigureanduserfriendly,whileallowinguserstoreada
summaryofexistingnetworkinfrastructuredatausinggraphsandtables.
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
4
SureLog
Next-GenerationSIEM
ThreatIntelligence
Threatsaredynamicandattackvectorschangeconstantly.
Respondquicklyandminimizedamagebyusingtherichexternalcontext
enabledbythreatintelligence.ImmediatelyknowaboutdangerousIPaddress-
es,files,processes,andotherrisksinyourenvironment.SureLogcombines
multiplethreatintelligencefeedsandgeneratesalertsforthebenefitofthe
securityteam.SureLogusesthisdatatoeducefalse-positives,detecthidden
threats,andprioritizeyourmostconcerningalarms.
ComplianceReporting
Regulatorycomplianceisnecessary.SIEMwillhelptosavetimeandensurecom-
pliancewithpredefinedreports.CreatingaproductiveSIEMenvironmentrequires
plentyofpredefinedreportsyouneedonadaily,weeklyormonthlybasisandalso
easytocreatereportinginfrastructureSureLoghasmorethan1400predefined
reportsandveryeasy&fastreportinginfrastructure.
Incidentresponse
IncidentresponseisanactionthatSIEMtakesinresponsetosuspiciousactivityor
anattack.ActiveresponseactionsincludetheBlockIPactiveresponse,theDisable
Networkingactiveresponse,theLogoffUseractiveresponse,theKillProcess
activeresponseandsoon.SureLogalsosupportstoexecuteanyexecutablefileasa
responsewithparametersfromdetectionrules
MachineLearning
MachinelearninginSIEMtakescybersecurityrulesanddatatohelpfacilitatesecurity
analytics.Asaresult,itcanreducetheeffortortimespentonrotetasksoreven
moresophisticatedduties.Withtherightconfigurations,machinelearningcanactual-
lymakedecisionsbasedonthedataitreceivesandchangeitsbehavioraccordingly.
SureLoghasmanyMLmodels.SomeoftheMLmodelsusedbySureLog.
·Detectingtoolsusedbycybercriminals
·Huntingcriticalprocessmasquerade
·Huntingmalwareandvirusesbydetectingrandomstrings
·Domaingenerationalgorithm(DGA)detection
·Profilinguserandentitybehaviour
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
5
SureLog
Next-GenerationSIEM
Performance
TheperformanceanalysesofSIEMproductsareveryimportantintermsofevaluation.
TherunningperformanceofSIEMproducts,theresourceswhichtheyrequire(CPU,RAM,DISK)andhowtheywillshowperformanceintheEPSvalueneededisvery
important.
SureLoghasthebestSIEMperformanceespeciallyCPU,RAM,andDiskperformance
Forensiccapabilities
Almosteverycompanyneedsasolutionforprotectingitssensitivedataanddetectingsuspiciousactivityinrealtime.Besides,whenanincidentoccurs,companies
wanttobeabletoprovidedigitalevidenceinthecourtroom.Integrityalsocritical.Thisisusuallyachievedbyusingintegritymechanisms,suchasrunninghashchecks
onblocksofstoredlogdata.Historicallogdatamustbesecuredeitherwithachecksumintheformofapopularhash—MD5,SHA1,SHA2,etc.—orwithadigital
signature.Easilyaggregateandsearchlogswithinasingleplatformiscritical.SureLogcompressesindexes.CompressingindexesgiveSureLogtheadvantageoflive
search,real-timesearchcapabilityforyears.AnexampleofaSureLogdiskcapacityrequirementofalivesearchfor5000EPSforoneyearis5GB.SureLoglivesearch
diskusageperformanceisthebestamongcompetitors.WhenSureLogdiskusageforlivesearchcomparestoElasticsearchandLucenebasedsystems,theresult
depictedinthebelowgraph.ItisshownthatSureLogcompressmuchmorethanElasticsearchandLucene.
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
CORRELATION
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
7
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
SureLog
Next-GenerationSIEM
SIEMusecasesorrulesarethe%80ofthevalueoftheproduct.ANext-GenSIEMcorrelationenginewillbeveryhelpfultoanalystsindeed.
NotallSIEMcorrelationrules,usecasesarecreatedequalanditishardtofindaSIEMthatsupportsbothcore,advancedandintelligentusecasesatanaffordable
price.AlltheSIEMproductshavecorrelationbutnotallSIEMsolutionsarecreatedequal.Detailedanalysisrequiredtounderstandthedifferenceofcorrelationcapabili-
ties.Forexample,mostoftheSIEMsolutionshavewatchlistorlistmanagementfeature,butSureLoghasmultidimensionallistmanagementcapabilityincorrelation.
Correlationanddetectionmethodsandcorrelationfeaturesdiversityareimportantlikedetectingwhatneverseenbeforeandmanyothers.
SureLogcanplayahugeroleinmakinganalysts’jobseasierwithmanymoderndetectionandcorrelationfeatureslikeneverseenbeforetypeofrules
SureLogSIEMruletypeexamples:
·Neverseentypeofrules
·Trendrules
·UBArules
·Anomalydetectionrules
·Changecomparisonrules
·Listmanagement
·Taxonomyrules
SampledistinguishingusecasessupportedbySureLog:
•Returnsdayswhereauseraccessedmorethanhis95thpercentilenumberofassets
•LookforauserwhoseHTTPtoDNSprotocolratiois%300morethan%95oftheotherusersforthelastfour-weekratiofor4thdayofweek
•Ifausernumberoffailedauthenticationratiotonumberofsuccessfulauthenticationis%10,alert
•Datalossdetectionbymonitoringallendpointsforanabnormalvolumeofdataegress
•Measuresthesimilaritybetweenwell-knownprocessnameswiththerunningonesusingLevenshteindistanceinreal-timeanddetectprocessmasquerade
•DGAdetection
•Failedlogontoanassetthatauserhaspreviouslyneverloggedonto
•Firsttimeuserisperforminganactivityfromacountry
•FirstVPNconnectionfromadeviceforauser
•FirstconnectionfromasourceIP
•Firstaccesstoadeviceforauser
•FirstaccesstodatabaseMSSQLforpeergroupHR
•FirstaccesstodatabaseMSSQLforuser
•Firstmailto/fromadomainfortheorganization
•Firstaccesstothiswebdomainwhichhasbeenidentifiedasriskybyareputationfeed
•Firstexecutionofaprocessonahost
•Firstaccesstoobjectfdghsdydhas
•Firstaccessfromahosttoadatabaseforauser
•FirstaccessfromsourcezoneAtlantaofficetoadatabaseforauser
•Suspicioustemporaryaccountactivity
•Abnormalaccountadministration
•Unusualaccountprivilegeescalation
•Unusualfilemodifications
•Abnormalpasswordactivity
SURELOG
SIEMAND
ADVANCED
THREAT
DETECTION
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
9
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
0100000111110001010101010001000010001000010001001101010101010101010101010101010010000100100001000000000101001101001000100010000100101000100010000100100101001000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
0101010101010101000100010100100101010101010100001001101011110001001000100001011110010010001000100100010001000100101100101010101010100001010010101001000101001001010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
1000100100100001000101010101010100100101011111000000100010001010101010101010101010100101011111101010101010100001001010101010101010101010101010101010001000100101010001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
SureLogSIEMcomeswithadvancedcorrelationengine,behavioralanalytics
andMachineLearning(ML)modelstoautomatepatterndiscoverywhile
facilitatingintelligentrulecreation.
AsasubfieldofArtificialIntelligence(AI),SureLog’sMLusesalgorithmsto
findpatternsindataandmodelsthemtodetectanomalousbehaviorofusers
andentities.SureLog’smachinelearninglibrary,pre-packagedwithover1,000
modelsandcorrelationrules,enablesorganizationstobetteridentifyadvanced
persistentthreats(APTs)thathavepreviouslybeenflyingundertheradar.
SureLogSIEMFederatedAnomalyDetectionEngineUsing
Classification
NextgenerationdetectionengineofSureLogSIEMcombiningrulebasedand
MachineLearning(ML)basedtechniques.SureLogutilizesmachinelearning
modelsandadvancedcorrelationrulestogetheranddynamicallyupdateeach
ofthem.
AnomalydetectionwithSureLoginfersaprobabilisticmodelforthenetwork
behaviorsofeachIPaddress.Eachnetworkeventisassignedanestimated
probability(henceforth,theevent’s“score”).Thoseeventswiththelower
scoresareflaggedas“suspicious”forfurtheranalysis.
SureLogutilizesLinearDiscriminantAnalysis(LDA)asclassifier.
UserandEntityProfilingwithSureLog
Organizationsneedtoguardagainstnotonlyoutsidercybercriminalsbut
alsorogueinsiders.Toeffectivelydealwithinsiderthreats,alayeredsecurity
approachleveragingbothpreventiveanddetectivesecuritycontrolsshould
beinplace.SureLogfocusesoninsiderthreats,suchasemployeeswhohave
alreadybeencompromisedormaliciousemployeeswhohavegonecorruptand
carryouttargetedattacks.
DomainGenerationAlgorithm(DGA)DetectioninSureLog
DNSisprobablythebestsourceofdatafordetectinganattacker’scommandand
controlactivity,whichcanbeisolatedbylookingatoutboundDNSrequests.
Botnetsplayanimportantroleinmalwaredistributionandtheyarewidelyusedfor
spreadingmaliciousactivitiesintheInternet.
Identifyingalgorithmicallygenerateddomainsinnetworktrafficisakeyaspectfor
analyzing,detectingandmitigatingbotnetbehavior
HuntingCriticalProcessMasqueradeUsingSureLogSIEM
Apopulartechniqueforhidingmalwarerunningonoperatingsystemsistogiveita
namethat’sconfusinglysimilartoalegitimateoperatingsystemprocess,preferably
onethatisalwayspresentonallsystems.Processeswhosenamesareconfusinglysim-
ilartothoseofcriticalsystemprocessesarelikelytobemalicious.Maliciousprocess
detectionusingprocessnameiscritical.
SureLog
Next-GenerationSIEM
10
011011100000101010111110000000000100101010010010101010101000010101010010101010101010101011100000100010010010100101110010010101010101010101000010010101010100001
01000001111100010101010100010000100010000100010011010101010101010101010101010100100001001000010000000001010011010010001000100001001010001000100001001001010
101010110100100000010010101010100100100010010100000011111100010001001001010101010101000100101010001001000100100010001001001010010101010101011010101010101010101
01010101010101010001000101001001010101010101000010011010111100010010001000010111100100100010001001000100010001001011001010101010101000010100101010010001010010
10001001001000010001010101010101001001010111110000001000100010101010101010101010101001010111111010101010101000010010101010101010101010101010101010100010001001010
HuntingMalwareandVirusesbyDetectingRandomStrings
UsingSureLogSIEM
TherearemalwaretoolsavailablethatcancreateWindowsserviceswith
randomservicenamesanddescriptions.Emotetinfectionisanexampleof
maliciousservicescreatedonthemachine.ThisisduetohowEmotetinstalls
itselfonamachine,creatingrandomlynamednumericservices,whichinturn
trytorunanotherrandomlynamedexecutablein“C:Windows”Theexample
belowshowsfourEmotetservices(othermayhavemore)thathavebeen
createdonaninfectedmachine.
Figure1.MaliciousService
DETECTINGTOP4TOOLSUSEDBYCYBERCRIMINALS
RECENTLYWITHSURELOG
CyberCriminalsareusingvariousmalicioustoolsforcyber-attacksbasedonthe
target’sstrengthtoinfiltratethesensitivedataandmoreoftennowadaysPublicly
AvailableHackingToolsaremainlyusedbythreatactorsforvariousattacksaround
theworld.Herewecanseethemostusedtop4publiclyavailablehackingtoolsby
threatactors:
*ChinaChopper
*Mimikatz
*PowerShellEmpire
*HUCPacketTransmitter
Thosetoolsarewell-knowntypeof
*Webshells
*CredentialStealers
*Lateralmovementframeworks
*Commandandcontrol(C2C)obfuscators
LargeScaleSureLogSIEMImplementation
Today’scomputernetworksproduceahugeamountofsecuritylogdata.Thesecurity
eventcorrelationscalabilityhasbecomeamajorconcernforsecurityanalystsand
ITadministratorswhenconsideringcomplexITinfrastructuresthatneedtohandle
hugeamountofsecuritylogdata.ThecurrentcorrelationcapabilitiesofSecurity
InformationandEventManagement(SIEM),basedonasinglenodeincentralized
servers,haveprovedtobeinsufficienttoprocesslargeeventstreams.
SureLog
Next-GenerationSIEM

More Related Content

Similar to SureLog SIEM

HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...Linaro
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basicsBHAWESH RAJPAL
 
Engineering products for scale, speed and agility
Engineering products for scale, speed and agilityEngineering products for scale, speed and agility
Engineering products for scale, speed and agilityAtul Narkhede
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
System z virtualization and security
System z  virtualization and securitySystem z  virtualization and security
System z virtualization and securityJim Porell
 
Product! - The road to production deployment
Product! - The road to production deploymentProduct! - The road to production deployment
Product! - The road to production deploymentFilippo Zanella
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical EnvironmentsMEN Micro
 
From ci to cd - LavaJug 2012
From ci to cd  - LavaJug 2012From ci to cd  - LavaJug 2012
From ci to cd - LavaJug 2012Henri Gomez
 
OrangeScape Cool Facts That You Did Not Know!!!
OrangeScape Cool Facts That You Did Not Know!!!OrangeScape Cool Facts That You Did Not Know!!!
OrangeScape Cool Facts That You Did Not Know!!!OrangeScape
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014Amazon Web Services
 
Fine line between performance and security
Fine line between performance and securityFine line between performance and security
Fine line between performance and securityAlmudena Vivanco
 
Unified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HourUnified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HoureG Innovations
 
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationHiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationVEDLIoT Project
 
IyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptx
IyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptxIyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptx
IyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptxZaheerAbbas270452
 

Similar to SureLog SIEM (20)

HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
HKG18-301 - Dramatically Accelerate 96Board Software via an FPGA with Integra...
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
Ethical hacking basics
Ethical hacking basicsEthical hacking basics
Ethical hacking basics
 
Engineering products for scale, speed and agility
Engineering products for scale, speed and agilityEngineering products for scale, speed and agility
Engineering products for scale, speed and agility
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
System z virtualization and security
System z  virtualization and securitySystem z  virtualization and security
System z virtualization and security
 
Product! - The road to production deployment
Product! - The road to production deploymentProduct! - The road to production deployment
Product! - The road to production deployment
 
Why SureLog?
Why SureLog?Why SureLog?
Why SureLog?
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments
 
From ci to cd - LavaJug 2012
From ci to cd  - LavaJug 2012From ci to cd  - LavaJug 2012
From ci to cd - LavaJug 2012
 
OrangeScape Cool Facts That You Did Not Know!!!
OrangeScape Cool Facts That You Did Not Know!!!OrangeScape Cool Facts That You Did Not Know!!!
OrangeScape Cool Facts That You Did Not Know!!!
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
 
Fine line between performance and security
Fine line between performance and securityFine line between performance and security
Fine line between performance and security
 
Unified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HourUnified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The Hour
 
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentationHiPEAC Computing Systems Week 2022_Mario Porrmann presentation
HiPEAC Computing Systems Week 2022_Mario Porrmann presentation
 
Sql ppt
Sql pptSql ppt
Sql ppt
 
Infrastructure Automation
Infrastructure Automation Infrastructure Automation
Infrastructure Automation
 
IyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptx
IyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptxIyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptx
IyCnet_Soluciones_Rockwell_CompactLogix_para_Maquinaria-min.pptx
 

More from Ertugrul Akbas

BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve  ISO27001 Denetiml...BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve  ISO27001 Denetiml...
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...Ertugrul Akbas
 
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
Olay Müdahale İçin Canlı Kayıtların Saklanmasının ÖnemiOlay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
Olay Müdahale İçin Canlı Kayıtların Saklanmasının ÖnemiErtugrul Akbas
 
SOC ve SIEM Çözümlerinde Korelasyon
SOC ve SIEM Çözümlerinde KorelasyonSOC ve SIEM Çözümlerinde Korelasyon
SOC ve SIEM Çözümlerinde KorelasyonErtugrul Akbas
 
SIEM den Maksimum Fayda Almak
SIEM den Maksimum Fayda AlmakSIEM den Maksimum Fayda Almak
SIEM den Maksimum Fayda AlmakErtugrul Akbas
 
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
SureLog SIEM Fast Edition Özellikleri ve FiyatıSureLog SIEM Fast Edition Özellikleri ve Fiyatı
SureLog SIEM Fast Edition Özellikleri ve FiyatıErtugrul Akbas
 
SureLog SIEM Fast Edition
SureLog SIEM Fast EditionSureLog SIEM Fast Edition
SureLog SIEM Fast EditionErtugrul Akbas
 
SureLog intelligent response
SureLog intelligent responseSureLog intelligent response
SureLog intelligent responseErtugrul Akbas
 
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).Ertugrul Akbas
 
Detecting attacks with SureLog SIEM
Detecting attacks with SureLog SIEMDetecting attacks with SureLog SIEM
Detecting attacks with SureLog SIEMErtugrul Akbas
 
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
SIEM ve KVKK Teknik Tedbirlerinin  ANET SureLog SIEM  ile uygulanması SIEM ve KVKK Teknik Tedbirlerinin  ANET SureLog SIEM  ile uygulanması
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması Ertugrul Akbas
 
KVKK Siperium Data Analyzer & Data Discovery
KVKK Siperium Data Analyzer & Data DiscoveryKVKK Siperium Data Analyzer & Data Discovery
KVKK Siperium Data Analyzer & Data DiscoveryErtugrul Akbas
 

More from Ertugrul Akbas (20)

BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve  ISO27001 Denetiml...BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve  ISO27001 Denetiml...
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
 
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
Olay Müdahale İçin Canlı Kayıtların Saklanmasının ÖnemiOlay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
 
SOC ve SIEM Çözümlerinde Korelasyon
SOC ve SIEM Çözümlerinde KorelasyonSOC ve SIEM Çözümlerinde Korelasyon
SOC ve SIEM Çözümlerinde Korelasyon
 
SIEM den Maksimum Fayda Almak
SIEM den Maksimum Fayda AlmakSIEM den Maksimum Fayda Almak
SIEM den Maksimum Fayda Almak
 
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
SureLog SIEM Fast Edition Özellikleri ve FiyatıSureLog SIEM Fast Edition Özellikleri ve Fiyatı
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
 
Neden SureLog?
Neden SureLog?Neden SureLog?
Neden SureLog?
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
SureLog SIEM Fast Edition
SureLog SIEM Fast EditionSureLog SIEM Fast Edition
SureLog SIEM Fast Edition
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
SureLog intelligent response
SureLog intelligent responseSureLog intelligent response
SureLog intelligent response
 
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
 
Detecting attacks with SureLog SIEM
Detecting attacks with SureLog SIEMDetecting attacks with SureLog SIEM
Detecting attacks with SureLog SIEM
 
Siem tools
Siem toolsSiem tools
Siem tools
 
KVKK
KVKKKVKK
KVKK
 
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
SIEM ve KVKK Teknik Tedbirlerinin  ANET SureLog SIEM  ile uygulanması SIEM ve KVKK Teknik Tedbirlerinin  ANET SureLog SIEM  ile uygulanması
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
 
KVKK Siperium Data Analyzer & Data Discovery
KVKK Siperium Data Analyzer & Data DiscoveryKVKK Siperium Data Analyzer & Data Discovery
KVKK Siperium Data Analyzer & Data Discovery
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

SureLog SIEM