Reasons not to ignore data integrity

3 Reasons Not To Ignore Data Integrity

Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered with before we use it to take any decision. Unfortunately, Read more about 3 Reasons Not To Ignore Data Integrity[…]

Sentineldb-Heroku-marketplace

Try SentinelDB In Your Heroku Deployment

We are happy to announce that you can now use SentinelDB, our GDPR-compliant datastore, in your Heroku deployments. The SentinelDB addon can be found here. We are keen on providing multiple options for easy integration of SentinelDB and thus ensuring full data protection for cloud applications. If your application is running on Heroku and you Read more about Try SentinelDB In Your Heroku Deployment[…]

Data Breach Prevention: Types

Preventing Various Types of Data Breaches

Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit cards and locations of people at a given time were Read more about Preventing Various Types of Data Breaches[…]

sentineldb-key-features

Releasing SentinelDB, the Privacy By Design Database

Data breaches are happening practically every day. Reputations are damaged, customers are unhappy and regulators are more and more demanding. Data protection is no longer just a hassle that the legal department has to handle – it must be an integral part of each software system. That’s why we leveraged our in-depth experience with GDPR Read more about Releasing SentinelDB, the Privacy By Design Database[…]

Compliant Audit Logs

Flexible Log Collection: Configuring The LogSentinel Agent

When audit logs are concerned, there are many ways to generate and collect them. Ideally, audit logs are generated in code, depending on the business logic of each application and sent for secure storage to another service, like SentinelTrails. However, refactoring a system to include dedicated audit log functionality may not be feasible, as there Read more about Flexible Log Collection: Configuring The LogSentinel Agent[…]

How LogSentinel Complements Log Collectors

How LogSentinel Complements Log Collectors

You are likely using a log collector – Graylog, Splunk, Loggly, logstash, logz.io, scylar, CloudWatch logs, etc. And log collectors are absolutely mandatory for any deployment of more than one machine (though they are very useful even in that case). They collect all your logs in one place, allowing you to search, “tail”, define alerts. Read more about How LogSentinel Complements Log Collectors[…]

election-security-logging

Election Security and the Importance of Audit Trail

A recent EU report on the cybersecurity of elections has warned member states of potential threats for the upcoming European elections. The US midterms are just a week away and concerns about the integrity of the election process are mounting. Even though very few countries vote online, practically every country and every state has at Read more about Election Security and the Importance of Audit Trail[…]

innovation-summit

LogSentinel Was Presented at the Innovation Summit on Banking and Insurance

LogSentinel was presented by our CEO at the Innovation Summit on Banking and Insurance in Austria earlier this month, organized by LSZ consulting, whom we thank for inviting us. The talk was an overview of the problems of existing audit trail solutions in use in many organizations and the ways to address these problems, utilizing Read more about LogSentinel Was Presented at the Innovation Summit on Banking and Insurance[…]

logging requirements_dashboard

GDPR Logging Requirements

The hype about GDPR is dying off, as apparently the world didn’t end on May 25th. However, best practices in data protection are still valid, and we’d like to focus on logging as one of them. The Regulation isn’t explicitly talking about logs, however many data protection authorities consider logs to be a good way Read more about GDPR Logging Requirements[…]

Comparison_log_aggregation_tools

Comparison: LogSentinel vs Splunk vs Loggly, etc.

Logs – every system has them, but companies don’t usually pay much attention to them. At least not until a problem occurs. Log aggregation solutions come handy in many scenarios – tracing production issues, alerting on service degradation, fixing bugs, forensics, fraud detection. We’ve argued, however, that logs have a dual nature – on the Read more about Comparison: LogSentinel vs Splunk vs Loggly, etc.[…]