Blockchain-inspired secure audit trail
All your logs, documents and data - protected by blockchain technology.
Our blockchain-based solutions ensure that no one can tamper the audit trail and sensitive data without your knowledge.
Outsource your IT and business risk and achieve regulatory compliance. Protect the sensitive information and audit trail your organisation stores
Real-time detailed analysis of everything that happens, as well as AI-driven fraud detection will help you improve your information security
Achieve high cost efficiency and decrease development time with our easy and straightforward RESTful API as well as ready-to-use plugins
We are happy to announce that you can now use SentinelTrails in your Heroku deployments. The SentinelTrails addon can be found here. SentinelTrails is a blockchain-enabled secure audit trail. It will help you take control over the data you store, and will ease your log management and monitoring. Features of SentinelTrails Unmodifiable evidence – the Read more about Try SentinelTrails In Your Heroku Deployment[…]
Identity and Access Management (IAM) is core to many enterprise architectures. Centralizing the authentication is mandatory once you have more than a few systems, and IAM providers fill that requirement nicely. On first thought it might seem blockchain has nothing to do with IAM. But that would not be entirely correct. There are two aspects Read more about Blockchain Use-Cases for IAM[…]
At LogSentinel, we are passionate about giving our clients the top-notch data protection they need. This is why we are proud to announce that FinancesOnline, a premier directory for business software, has certified us with the prestigious 2019 Rising Star Award and the 2019 Premium Usability Award. In their evaluation of the SentinelDB features, experts Read more about SentinelDB Honored with Compliance Management Software Awards by Premier Directory for Business Software[…]
2019 starts fantastic for LogSentinel: onboarding some of the Fortune100 companies like IBM, getting SentinelDB on the market, and scoping projects with new partners and clients. The latest great recognition we received was related with the GovTech.Pioneers event. The GovTech.Pioneers event: Manifesting innovation Europe’s leading GovTech event organized by Pioneers gathered together forward-thinking politicians, public CIOs and Read more about LogSentinel Wins the Cyber Security Award by Pioneers[…]
Hash functions are at the core of many, many technologies, including ours. We rely on SHA-512 to create a hash chain to guarantee the integrity of logs. Hash functions have one very important property – collision resistance. If two different inputs generate the same hash, it may mean the hash function is broken. It may Read more about We Found Collision For SHA-512[…]
An audit trail (or audit log) is something both intuitive and misleading at the same time. There are many definitions of an audit trail, and all of them give you an idea of what it is about: A system that traces the detailed transactions relating to any item in an accounting record. A record of Read more about What is an Audit Trail in IT Context?[…]
Security Information and Event Management (SIEM) systems are vital to each organisation. They transform simple event logs from various applications to detailed, in-depth behaviour analysis thanks to advanced visualizations and analytics and sometimes machine learning and AI. They contain a palette of aspects covering the most crucial information security issues. The final goal is achieving full Read more about SIEM Solutions and Data Protection Compliance[…]
What is California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act which becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know what data a business collected on them Right to object to Read more about How will CCPA change the business landscape?[…]
What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The act contains five titles covering: Prevention of group health plans Read more about HIPAA IT Compliance Guide: Main Things You Need to Consider[…]
A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking IT potential. How to unlock the IT potention of Bulgaria? Read more about Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)[…]