IAM and blockchain usecases for enterprises

Blockchain Use-Cases for IAM

Identity and Access Management (IAM) is core to many enterprise architectures. Centralizing the authentication is mandatory once you have more than a few systems, and IAM providers fill that requirement nicely. On first thought it might seem blockchain has nothing to do with IAM. But that would not be entirely correct. There are two aspects Read more about Blockchain Use-Cases for IAM[…]

audit trail in practice

What is an Audit Trail in IT Context?

An audit trail (or audit log) is something both intuitive and misleading at the same time. There are many definitions of an audit trail, and all of them give you an idea of what it is about: A system that traces the detailed transactions relating to any item in an accounting record. A record of Read more about What is an Audit Trail in IT Context?[…]

Reasons not to ignore data integrity

3 Reasons Not To Ignore Data Integrity

Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered with before we use it to take any decision. Unfortunately, Read more about 3 Reasons Not To Ignore Data Integrity[…]

Sentineldb-Heroku-marketplace

Try SentinelDB In Your Heroku Deployment

We are happy to announce that you can now use SentinelDB, our GDPR-compliant datastore, in your Heroku deployments. The SentinelDB addon can be found here. We are keen on providing multiple options for easy integration of SentinelDB and thus ensuring full data protection for cloud applications. If your application is running on Heroku and you Read more about Try SentinelDB In Your Heroku Deployment[…]

Data Breach Prevention: Types

Preventing Various Types of Data Breaches

Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit cards and locations of people at a given time were Read more about Preventing Various Types of Data Breaches[…]

sentineldb-key-features

Releasing SentinelDB, the Privacy By Design Database

Data breaches are happening practically every day. Reputations are damaged, customers are unhappy and regulators are more and more demanding. Data protection is no longer just a hassle that the legal department has to handle – it must be an integral part of each software system. That’s why we leveraged our in-depth experience with GDPR Read more about Releasing SentinelDB, the Privacy By Design Database[…]

Compliant Audit Logs

Flexible Log Collection: Configuring The LogSentinel Agent

When audit logs are concerned, there are many ways to generate and collect them. Ideally, audit logs are generated in code, depending on the business logic of each application and sent for secure storage to another service, like SentinelTrails. However, refactoring a system to include dedicated audit log functionality may not be feasible, as there Read more about Flexible Log Collection: Configuring The LogSentinel Agent[…]

How LogSentinel Complements Log Collectors

How LogSentinel Complements Log Collectors

You are likely using a log collector – Graylog, Splunk, Loggly, logstash, logz.io, scylar, CloudWatch logs, etc. And log collectors are absolutely mandatory for any deployment of more than one machine (though they are very useful even in that case). They collect all your logs in one place, allowing you to search, “tail”, define alerts. Read more about How LogSentinel Complements Log Collectors[…]

Comparison_log_aggregation_tools

Comparison: LogSentinel vs Splunk vs Loggly, etc.

Logs – every system has them, but companies don’t usually pay much attention to them. At least not until a problem occurs. Log aggregation solutions come handy in many scenarios – tracing production issues, alerting on service degradation, fixing bugs, forensics, fraud detection. We’ve argued, however, that logs have a dual nature – on the Read more about Comparison: LogSentinel vs Splunk vs Loggly, etc.[…]