Blockchain-inspired secure audit trail
All your logs, documents and data - protected by blockchain technology.
Our blockchain-based solutions ensure that no one can tamper sensitive data without your knowledge.
Outsource your IT and business risk and achieve regulation compliance. Protect the sensitive information your organisation stores
Real-time detailed analysis of everything that happens, as well as AI-driven fraud detection will help you improve your information security
Achieve high cost efficiency and decrease development time with our easy and straightforward RESTful API as well as ready-to-use plugins
What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The act contains five titles covering: Prevention of group health plans Read more about HIPAA IT Compliance Guide: Main Things You Need to Consider[…]
A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking IT potential. How to unlock the IT potention of Bulgaria? Read more about Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)[…]
The past year saw the acceleration of two already important information security trends: the ever-increasing threat of data breaches a rising consumer and regulatory oversight on corporate data processing. Indeed, the year was not a good one for privacy – high profile data breaches range from the Marriott Hotels (500 million people), through marketing firm’s Read more about Privacy by Design in Practice[…]
Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered with before we use it to take any decision. Unfortunately, Read more about 3 Reasons Not To Ignore Data Integrity[…]
We are happy to announce that you can now use SentinelDB, our GDPR-compliant datastore, in your Heroku deployments. The SentinelDB addon can be found here. We are keen on providing multiple options for easy integration of SentinelDB and thus ensuring full data protection for cloud applications. If your application is running on Heroku and you Read more about Try SentinelDB In Your Heroku Deployment[…]
Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit cards and locations of people at a given time were Read more about Preventing Various Types of Data Breaches[…]
Data breaches are happening practically every day. Reputations are damaged, customers are unhappy and regulators are more and more demanding. Data protection is no longer just a hassle that the legal department has to handle – it must be an integral part of each software system. That’s why we leveraged our in-depth experience with GDPR Read more about Releasing SentinelDB, the Privacy By Design Database[…]
When audit logs are concerned, there are many ways to generate and collect them. Ideally, audit logs are generated in code, depending on the business logic of each application and sent for secure storage to another service, like SentinelTrails. However, refactoring a system to include dedicated audit log functionality may not be feasible, as there Read more about Flexible Log Collection: Configuring The LogSentinel Agent[…]
You are likely using a log collector – Graylog, Splunk, Loggly, logstash, logz.io, scylar, CloudWatch logs, etc. And log collectors are absolutely mandatory for any deployment of more than one machine (though they are very useful even in that case). They collect all your logs in one place, allowing you to search, “tail”, define alerts. Read more about How LogSentinel Complements Log Collectors[…]
We at LogSentinel are striving to deliver high quality products, ensuring a 360-degree compliance integration, improved control over cyber security, and minimizing the risk of data breach. It’s been a busy summer season for everyone from the team – we have consulted companies in relation to GDPR, PCI-DSS, PSD-2 and other standards and regulations concerning information Read more about SentinelDB Is Coming Soon![…]