Blockchain-inspired secure audit trail
All your logs, documents and data - protected by blockchain technology.
Our blockchain-based solutions ensure that no one can tamper sensitive data without your knowledge.
Outsource your IT and business risk and achieve regulation compliance. Protect the sensitive information your organisation stores
Real-time detailed analysis of everything that happens, as well as AI-driven fraud detection will help you improve your information security
Achieve high cost efficiency and decrease development time with our easy and straightforward RESTful API as well as ready-to-use plugins
You are likely using a log collector – Graylog, Splunk, Loggly, logstash, logz.io, scylar, CloudWatch logs, etc. And log collectors are absolutely mandatory for any deployment of more than one machine (though they are very useful even in that case). They collect all your logs in one place, allowing you to search, “tail”, define alerts. Read more about How LogSentinel Complements Log Collectors[…]
We at LogSentinel are striving to deliver high quality products, ensuring a 360-degree compliance integration, improved control over cyber security, and minimizing the risk of data breach. It’s been a busy summer season for everyone from the team – we have consulted companies in relation to GDPR, PCI-DSS, PSD-2 and other standards and regulations concerning information Read more about SentinelDB Is Coming Soon![…]
This Thursday, 15th of October, Startup Europe Summit 2018 will take place at Sofia. The event connects leading startup founders and tech leaders helping them to collaborate during the day. The list of the featured guests of the event includes Mariya Gabriel, Ana Brnabić, Zoran Zaev, Duško Marković, Simon Schaefer and Anja Monrad. What to Expect from Startup Europe Summit Within the Read more about LogSentinel Will Be Presenting SentinelDB at Startup Europe Summit[…]
A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online, practically every country and every state has at Read more about Election Security and the Importance of Audit Trail[…]
With the explosive growth of data businesses now can have a look at the very minutae of their processes. This includes details on which user took what action in which system, ranging from mission critical payments and asset transactions to the ultimately mundane users’ login in their own computers. On the one hand this trove Read more about Fraud Detection: Approaches and Pitfalls[…]
LogSentinel was presented by our CEO at the Innovation Summit on Banking and Insurance in Austria earlier this month, organized by LSZ consulting, whom we thank for inviting us. The talk was an overview of the problems of existing audit trail solutions in use in many organizations and the ways to address these problems, utilizing Read more about LogSentinel Was Presented at the Innovation Summit on Banking and Insurance[…]
Organizations, especially those collecting and using personal data, must take the necessary measures to ensure the confidentiality, integrity and security of the data, therefore to be GDPR compliant as stated in Article 5. This objective could be achieved only by following the best practices in protecting and maintaining the IT systems. Below are some cyber Read more about 11 Cyber Security Tips to Achieve GDPR Compliance[…]
The hype about GDPR is dying off, as apparently the world didn’t end on May 25th. However, best practices in data protection are still valid, and we’d like to focus on logging as one of them. The Regulation isn’t explicitly talking about logs, however many data protection authorities consider logs to be a good way Read more about GDPR Logging Requirements[…]
Nowadays, the data security and data protection are crucially important not only for the business but also for the public sector. To safeguard the customers’ rights, organizations must follow established rules and regulations and the best security standards such as the GDPR and PCI DSS. Overall In essence, the GDPR and PCI DSS overlap in Read more about GDPR vs PCI DSS: Differences and Similarities[…]
The Payment Services Directive (Directive (EU) 2015/2366, PSD2) has been hailed as a game-changer that will transform the payment services landscape in Europe. While this outspoken enthusiasm reflects the deep changes it will bring, it sometimes fails to note that the increased freedom and elimination of market entry barriers is carefully counterbalanced with a robust Read more about The Payment Services Directive (PSD2) and its Logging Requirements[…]