Log Collection

Log Collection and Analysis

Log Collection and AI-driven Log Analysis

log integrity SIEMs

Log Integrity: How SIEMs Address the Issue and Is It Enough?

Log Integrity Capabilities of SIEMs Log integrity and non-repudiation are key properties of audit logs. As SIEMs are usually the way to collect audit logs (among many other things) in large organizations, we have to make sure they give us those properties. We have discussed previously that it’s not… Read More »Log Integrity: How SIEMs Address the Issue and Is It Enough?

SentinelTrals-on-Heroku

SentinelTrails Is Now Available On Heroku Beta

The SentinelTrails add-on, LogSentinel’s blockchain-protected, secure audit trail, is now available on Heroku marketplace, starting at $0/mo. Swiftly deploy SentinelTrails add-on using Heroku, and ensure that all your logs, data and documents are protected. SentinelTrails Features Immutable Evidence The blockchain-based technology does not allow any… Read More »SentinelTrails Is Now Available On Heroku Beta

Log Collectors - SIEM, Audit Trail, UEBA, Forensics logs

Log Collectors Landscape: SIEM, Log Collectors, UEBA, and Audit Trail

Logs are ubiquitous in IT – they are semi-structured pieces of information about the behavior of a system and its users. Many standards, regulations and best practices assume and require the existence of logs. Consequently, many systems collect those logs and make use of them for… Read More »Log Collectors Landscape: SIEM, Log Collectors, UEBA, and Audit Trail

Track-What-you-have-never-tracked-before

Track Events You Have Not Tracked Before

There are a lot of products that allow collecting data, aggregating it, and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors, and catch-all multi-purpose data platforms (like Splunk). And… Read More »Track Events You Have Not Tracked Before

Protecting documents on blockchain

Protecting Documents Against Fraud and Manipulation With Blockchain

Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to a document can modify it and it will be hard to reconstruct the original document.… Read More »Protecting Documents Against Fraud and Manipulation With Blockchain

GDPR-Logging-And-Monitoring

GDPR Logging Requirements

The hype about GDPR is dying off, as apparently the world didn’t end on May 25th. However, best practices in data protection are still valid, and we’d like to focus on logging as one of them.