SlideShare a Scribd company logo
Security Information & Event Management
01Copyright © 2016 logsign.com, All rights reserved.
02
About Logsign
2010
Founded
2011
Firewall Log Management
Solution
2012
Log Management
Solution
2014
Comprehensive SIEM
Solution
Copyright © 2016 logsign.com, All rights reserved.
03
What is Logsign?
Security
Intelligence
Compliance
Log
Management
are unified on a single platform.
Logsign is a full-feature, all-in-one SIEM Solution.
Copyright © 2016 logsign.com, All rights reserved.
04
Why Logsign?
Copyright © 2016 logsign.com, All rights reserved.
Faster Indexing,
Quick Response
Diligent Technical
Support Team
Delegation
Capability
Simple & Flexible
Deployment
Higher ROI
Clear Pricing
Scalable
Architecture
Customization
05
Higher ROI
Increase Uptime
Performance
Effective Storage
Capability, Clustering
Easy Compliance,
Forensics and Auditing
Real-Time Threat
and Anomaly Detection
Low Deployment Costs
and Flexibility
Less Demand on
Human Resources,
and Time
Copyright © 2016 logsign.com, All rights reserved.
06
How Logsign Works?
Integration
with
Sources
More than 200
pre-defined integration
and free plugin services.
Collects Logs
and Creates
Understandable
Insight.
Normalize logs,
filters, parses,
and classifies to provide
better understanding.
Monitors Logs
and Events in
near Real Time.
Indexes high volume of data,
monitors and visualises
with pre-defined dashboards
and widgets.
Improves Security
and Automates
Security Actions.
Takes action, alerts
and triggers you
to take action.
Security Analytics / Log Management / Compliance
Copyright © 2016 logsign.com, All rights reserved.
Logsign Focus
07Copyright © 2016 logsign.com, All rights reserved.
08
Simple & Flexible
Deployment
Deploy on all physical, virtual and
cloud environments within a week.
More than 200 pre-defined
integrations such as firewalls, routers,
IDS, Windows, Linux, web/mail
servers, databases, …
Easy to integrate with CRM, ERP,
HR systems, SAAS apps via
free plugins.
Hundreds of pre-defined reports,
dashboards, widgets.
1
2
3
4
Copyright © 2016 logsign.com, All rights reserved.
09
Scalable Architecture
Integrate any sources.
Add more users.
Collect and index higher volume of data.
Archive and store terabytes of logs
live or offline with an unlimited capacity.
1
2
3
4
Copyright © 2016 logsign.com, All rights reserved.
10
Integrated Sources
Comprehensive Log Collection
Active Directory
DatabasesWindows
Web Servers
Sensors
Firewalls
Mail Servers
Applications Virtual Machines
Security Devices
Copyright © 2016 logsign.com, All rights reserved.
11
Event Classification
Comprehensive Log Collection
Security Data OS Data Database Network Business
Security Data
• Firewall
• IPS - Attack
• Virus - Malware - Spyware
• Content
• DLP - NAC
• …
OS Data
• User Management
• Computer Management
• Policy Management
• …
Databases
• Select - Update - Delete
• Audit
• …
Network
• Router - Modem - WiFi - RFID
• …
Business
• Web App, CRM, ERP, Call Center
• …
Copyright © 2016 logsign.com, All rights reserved.
12
How To Collect?
Comprehensive Log Collection
Logsign Data Policy Manager
Effective Log Management!
Define custom rulesets for
each source to manage effectively!
Variety of Data Amount of Data Storage
Wide Variety of
Log Collection Techniques
SyslogFile Share
NFS Share
CEF
FTP / SFTP
ODBC
SQL
Oracle
LEA API
WMI
Copyright © 2016 logsign.com, All rights reserved.
13
Faster Search
Real-Time Monitoring
• Faster search, response in
seconds.
• Accurate and valuable
results, actionable insights.
• Drill-down search, take a
deeper look.
• Filter and narrow search
results.
• Easy to write new,
customised queries.
Copyright © 2016 logsign.com, All rights reserved.
Alerts & Correlation
Real-Time Monitoring
Increase your security with real-time action!
14
• Correlates data from
heterogenous sources,
real-time or historical.
• Has a wide correlation
rule library.
• Discovers any
vulnerabilities and attacks.
• Generates alerts, triggers
team with sms or emails.
• Takes automated security
actions and stops
vulnerabilities, breaches.
Copyright © 2016 logsign.com, All rights reserved.
Dashboards
Real-Time Monitoring
15
• Pre-defined dashboards and
widgets in near real time.
• Ability to create new ones,
clone or customize others.
• Provides actionable insights
and clear understanding.
• Drill-down dashboards,
enables to take a deeper look.
Copyright © 2016 logsign.com, All rights reserved.
Real-Time & Scheduled Reporting
Reporting
• Real-time, scheduled,
automated reports.
• Web-based, analytics
driven reports.
• Ability to create new ones,
ad hoc reports, clone or
customise others.
• Share reports both PDFs
and excels
16Copyright © 2016 logsign.com, All rights reserved.
Compliance Made Easy
Automated Compliance Reporting
17
5651PCI DSS
ISO 27000 Serisi
NERC
GLBASOX
HIPAA
FISMA
Compliance
Timestamp Integration
Predefined Reports
Digital Hashing
Data Retention Policy
Digital Certificate Integration
Copyright © 2016 logsign.com, All rights reserved.
Industries
18
Retail
Health Care
Higher Education
Energy & Utility
Public Government
Finance Services
Media & Entertainment
Others
Copyright © 2016 logsign.com, All rights reserved.
Solutions
19
Auditing
&Compliance
Security Intelligence Log Management
Machine Data Analytics Internet of Things
Copyright © 2016 logsign.com, All rights reserved.
Thank You!
For More Details and Support:
20- Jan 2016
logsign.com
info@logsign.com
support.logsign.com
Copyright © 2016 logsign.com, All rights reserved.

More Related Content

Viewers also liked

European Lawyer - Admission
European Lawyer - AdmissionEuropean Lawyer - Admission
European Lawyer - Admission
Szasz Sandor Attila
 
D03 SUCCESS Final Report
D03 SUCCESS Final ReportD03 SUCCESS Final Report
D03 SUCCESS Final Report
William Z. Pardee
 
проблема словосочетания в отечественной и зарубежной лингвистике
проблема словосочетания в отечественной и зарубежной лингвистикепроблема словосочетания в отечественной и зарубежной лингвистике
проблема словосочетания в отечественной и зарубежной лингвистикеIreneBarley1
 
Aprovechamiento de las tic en los procesos de enseñanza aprendizaje
Aprovechamiento de las tic en los procesos de enseñanza aprendizajeAprovechamiento de las tic en los procesos de enseñanza aprendizaje
Aprovechamiento de las tic en los procesos de enseñanza aprendizaje
GRUPO TICS
 
Tp1 cristian oliva correcciones.
Tp1 cristian oliva correcciones. Tp1 cristian oliva correcciones.
Tp1 cristian oliva correcciones.
cristian oliva
 
cv.islam abo amra
cv.islam abo amracv.islam abo amra
cv.islam abo amra
Islam Abo Amra
 
mis ultimas vacaciones
mis ultimas  vacacionesmis ultimas  vacaciones
mis ultimas vacaciones
jessikadamian
 
Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...
Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...
Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...
ArkaDPalit
 
Prelims zugzwang 2016
Prelims zugzwang 2016Prelims zugzwang 2016
Prelims zugzwang 2016
Bedanga Das
 
Finals
FinalsFinals
Localized Electrons with Wien2k
Localized Electrons with Wien2kLocalized Electrons with Wien2k
Localized Electrons with Wien2k
ABDERRAHMANE REGGAD
 
MELA Prelims
MELA PrelimsMELA Prelims
MELA Prelims
Somnath Chanda
 
Китай в XVI-XVIII вв.
Китай в XVI-XVIII вв.Китай в XVI-XVIII вв.
Китай в XVI-XVIII вв.
Галина Свентуховская
 

Viewers also liked (13)

European Lawyer - Admission
European Lawyer - AdmissionEuropean Lawyer - Admission
European Lawyer - Admission
 
D03 SUCCESS Final Report
D03 SUCCESS Final ReportD03 SUCCESS Final Report
D03 SUCCESS Final Report
 
проблема словосочетания в отечественной и зарубежной лингвистике
проблема словосочетания в отечественной и зарубежной лингвистикепроблема словосочетания в отечественной и зарубежной лингвистике
проблема словосочетания в отечественной и зарубежной лингвистике
 
Aprovechamiento de las tic en los procesos de enseñanza aprendizaje
Aprovechamiento de las tic en los procesos de enseñanza aprendizajeAprovechamiento de las tic en los procesos de enseñanza aprendizaje
Aprovechamiento de las tic en los procesos de enseñanza aprendizaje
 
Tp1 cristian oliva correcciones.
Tp1 cristian oliva correcciones. Tp1 cristian oliva correcciones.
Tp1 cristian oliva correcciones.
 
cv.islam abo amra
cv.islam abo amracv.islam abo amra
cv.islam abo amra
 
mis ultimas vacaciones
mis ultimas  vacacionesmis ultimas  vacaciones
mis ultimas vacaciones
 
Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...
Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...
Inquisitive 2015 ~ General Quiz Finals~ Pailan College of Management & Techno...
 
Prelims zugzwang 2016
Prelims zugzwang 2016Prelims zugzwang 2016
Prelims zugzwang 2016
 
Finals
FinalsFinals
Finals
 
Localized Electrons with Wien2k
Localized Electrons with Wien2kLocalized Electrons with Wien2k
Localized Electrons with Wien2k
 
MELA Prelims
MELA PrelimsMELA Prelims
MELA Prelims
 
Китай в XVI-XVIII вв.
Китай в XVI-XVIII вв.Китай в XVI-XVIII вв.
Китай в XVI-XVIII вв.
 

Similar to Logsign Focus Overview

Logsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution OverviewLogsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution Overview
Logsign
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Ocean9, Inc.
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
Luca Martelli
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization
Splunk
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
Thomas Teske
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
Splunk
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Adelaide Hill
 
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Splunk
 
Make Streaming Analytics work for you: The Devil is in the Details
Make Streaming Analytics work for you: The Devil is in the DetailsMake Streaming Analytics work for you: The Devil is in the Details
Make Streaming Analytics work for you: The Devil is in the Details
DataWorks Summit/Hadoop Summit
 
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Cynthia Saracco
 
Choosing Your Log Management Approach: Buy, Build or Outsource
Choosing Your Log Management Approach: Buy, Build or OutsourceChoosing Your Log Management Approach: Buy, Build or Outsource
Choosing Your Log Management Approach: Buy, Build or Outsource
Anton Chuvakin
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
Adam Faeder
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
Adam Faeder
 
Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8
OpenSense Labs
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Glen Roberts, CISSP
 
Flare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationFlare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its Information
Iman Ruth Ali, CL, ACB
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
Splunk
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA
Kai Wähner
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 

Similar to Logsign Focus Overview (20)

Logsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution OverviewLogsign Forest Enterprise Solution Overview
Logsign Forest Enterprise Solution Overview
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Drive more value through data source and use case optimization
Drive more value through data source and use case optimization Drive more value through data source and use case optimization
Drive more value through data source and use case optimization
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
 
Make Streaming Analytics work for you: The Devil is in the Details
Make Streaming Analytics work for you: The Devil is in the DetailsMake Streaming Analytics work for you: The Devil is in the Details
Make Streaming Analytics work for you: The Devil is in the Details
 
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
 
Choosing Your Log Management Approach: Buy, Build or Outsource
Choosing Your Log Management Approach: Buy, Build or OutsourceChoosing Your Log Management Approach: Buy, Build or Outsource
Choosing Your Log Management Approach: Buy, Build or Outsource
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Flare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationFlare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its Information
 
Taking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - Manager
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Logsign Focus Overview

  • 1. Security Information & Event Management 01Copyright © 2016 logsign.com, All rights reserved.
  • 2. 02 About Logsign 2010 Founded 2011 Firewall Log Management Solution 2012 Log Management Solution 2014 Comprehensive SIEM Solution Copyright © 2016 logsign.com, All rights reserved.
  • 3. 03 What is Logsign? Security Intelligence Compliance Log Management are unified on a single platform. Logsign is a full-feature, all-in-one SIEM Solution. Copyright © 2016 logsign.com, All rights reserved.
  • 4. 04 Why Logsign? Copyright © 2016 logsign.com, All rights reserved. Faster Indexing, Quick Response Diligent Technical Support Team Delegation Capability Simple & Flexible Deployment Higher ROI Clear Pricing Scalable Architecture Customization
  • 5. 05 Higher ROI Increase Uptime Performance Effective Storage Capability, Clustering Easy Compliance, Forensics and Auditing Real-Time Threat and Anomaly Detection Low Deployment Costs and Flexibility Less Demand on Human Resources, and Time Copyright © 2016 logsign.com, All rights reserved.
  • 6. 06 How Logsign Works? Integration with Sources More than 200 pre-defined integration and free plugin services. Collects Logs and Creates Understandable Insight. Normalize logs, filters, parses, and classifies to provide better understanding. Monitors Logs and Events in near Real Time. Indexes high volume of data, monitors and visualises with pre-defined dashboards and widgets. Improves Security and Automates Security Actions. Takes action, alerts and triggers you to take action. Security Analytics / Log Management / Compliance Copyright © 2016 logsign.com, All rights reserved.
  • 7. Logsign Focus 07Copyright © 2016 logsign.com, All rights reserved.
  • 8. 08 Simple & Flexible Deployment Deploy on all physical, virtual and cloud environments within a week. More than 200 pre-defined integrations such as firewalls, routers, IDS, Windows, Linux, web/mail servers, databases, … Easy to integrate with CRM, ERP, HR systems, SAAS apps via free plugins. Hundreds of pre-defined reports, dashboards, widgets. 1 2 3 4 Copyright © 2016 logsign.com, All rights reserved.
  • 9. 09 Scalable Architecture Integrate any sources. Add more users. Collect and index higher volume of data. Archive and store terabytes of logs live or offline with an unlimited capacity. 1 2 3 4 Copyright © 2016 logsign.com, All rights reserved.
  • 10. 10 Integrated Sources Comprehensive Log Collection Active Directory DatabasesWindows Web Servers Sensors Firewalls Mail Servers Applications Virtual Machines Security Devices Copyright © 2016 logsign.com, All rights reserved.
  • 11. 11 Event Classification Comprehensive Log Collection Security Data OS Data Database Network Business Security Data • Firewall • IPS - Attack • Virus - Malware - Spyware • Content • DLP - NAC • … OS Data • User Management • Computer Management • Policy Management • … Databases • Select - Update - Delete • Audit • … Network • Router - Modem - WiFi - RFID • … Business • Web App, CRM, ERP, Call Center • … Copyright © 2016 logsign.com, All rights reserved.
  • 12. 12 How To Collect? Comprehensive Log Collection Logsign Data Policy Manager Effective Log Management! Define custom rulesets for each source to manage effectively! Variety of Data Amount of Data Storage Wide Variety of Log Collection Techniques SyslogFile Share NFS Share CEF FTP / SFTP ODBC SQL Oracle LEA API WMI Copyright © 2016 logsign.com, All rights reserved.
  • 13. 13 Faster Search Real-Time Monitoring • Faster search, response in seconds. • Accurate and valuable results, actionable insights. • Drill-down search, take a deeper look. • Filter and narrow search results. • Easy to write new, customised queries. Copyright © 2016 logsign.com, All rights reserved.
  • 14. Alerts & Correlation Real-Time Monitoring Increase your security with real-time action! 14 • Correlates data from heterogenous sources, real-time or historical. • Has a wide correlation rule library. • Discovers any vulnerabilities and attacks. • Generates alerts, triggers team with sms or emails. • Takes automated security actions and stops vulnerabilities, breaches. Copyright © 2016 logsign.com, All rights reserved.
  • 15. Dashboards Real-Time Monitoring 15 • Pre-defined dashboards and widgets in near real time. • Ability to create new ones, clone or customize others. • Provides actionable insights and clear understanding. • Drill-down dashboards, enables to take a deeper look. Copyright © 2016 logsign.com, All rights reserved.
  • 16. Real-Time & Scheduled Reporting Reporting • Real-time, scheduled, automated reports. • Web-based, analytics driven reports. • Ability to create new ones, ad hoc reports, clone or customise others. • Share reports both PDFs and excels 16Copyright © 2016 logsign.com, All rights reserved.
  • 17. Compliance Made Easy Automated Compliance Reporting 17 5651PCI DSS ISO 27000 Serisi NERC GLBASOX HIPAA FISMA Compliance Timestamp Integration Predefined Reports Digital Hashing Data Retention Policy Digital Certificate Integration Copyright © 2016 logsign.com, All rights reserved.
  • 18. Industries 18 Retail Health Care Higher Education Energy & Utility Public Government Finance Services Media & Entertainment Others Copyright © 2016 logsign.com, All rights reserved.
  • 19. Solutions 19 Auditing &Compliance Security Intelligence Log Management Machine Data Analytics Internet of Things Copyright © 2016 logsign.com, All rights reserved.
  • 20. Thank You! For More Details and Support: 20- Jan 2016 logsign.com info@logsign.com support.logsign.com Copyright © 2016 logsign.com, All rights reserved.