Skip to content
  • Products
        • LogSentinel SIEM
        • Webinar SIEM



          Ebook top 3 cybersecurity threats
        • Solutions
          • Financial Sector
          • SaaS Security Monitoring
          • Legacy Application Security
          • E-Commerce
          • Phishing Detection
          • SAP Security Monitoring
          • Healthcare
          • Secure Audit Trail
          • IAM Security Monitoring
          • Government
          • Insider Threat Detection
          • Antivirus Log Collection
          • Critical Infrastructure
          • Website Integrity Monitoring
          • ActiveDirectory Monitoring
          • AWS Security Monitoring
          • GCP Security Monitoring
          • Azure Security Monitoring
          • Office365 Security Monitoring
          • Google Workplace Monitoring
          • IoT Security Monitoring
          • Ransomware Prevention
          • Secure Work From Anywhere
          • LogSentinel SIEM For MSSPs
        • Standards and Regulations
          • GDPR Compliance
          • HIPAA Compliance
          • SOX Compliance
          • PSD2 Compliance
          • SWIFT Compliance
          • NIST Compliance
          • US Cybersecurity Laws
          • EU NIS Directive Compliance
  • Products
    • LogSentinel SIEM
  • LogSentinel SIEM
    • Overview
    • LogSentinel SIEM and XDR Features
    • Pricing
    • How Is LogSentinel SIEM Better?
  • Solutions
    • Financial Sector
    • Healthcare
    • Government
    • E-Commerce
    • Critical Infrastructure
    • SaaS Security Monitoring
    • Office365 Security Monitoring
    • Google Workplace (G Suite) Security Monitoring
    • SAP Security Monitoring
    • Phishing Detection
    • LogSentinel SIEM Honeypot
    • Website Integrity Monitoring
    • Antivirus Log Collection And Analysis
    • AWS Security Monitoring
    • Azure Security Monitoring
    • GCP Security Monitoring
    • IAM Security Monitoring
    • IoT Security Monitoring
    • Ransomware Prevention
    • Secure Work From Anywhere
    • LogSentinel SIEM For MSSPs
  • Resources
    • Case Studies
    • Webinars
    • Ebooks
    • Solutions Briefs
    • Compliance Mappings
    • SIEM Service FAQ
    • Documentation
    • Integrations And Data Sources
    • Roadmap
  • Partners
    • Partner Portal
    • Become a partner
    • Find a Partner
  • About us
    • About LogSentinel
    • Contact us
    • Careers
  • Blog
  • Sign in
  • Book a Demo
  • Products
        • LogSentinel SIEM
        • Webinar SIEM



          Ebook top 3 cybersecurity threats
        • Solutions
          • Financial Sector
          • SaaS Security Monitoring
          • Legacy Application Security
          • E-Commerce
          • Phishing Detection
          • SAP Security Monitoring
          • Healthcare
          • Secure Audit Trail
          • IAM Security Monitoring
          • Government
          • Insider Threat Detection
          • Antivirus Log Collection
          • Critical Infrastructure
          • Website Integrity Monitoring
          • ActiveDirectory Monitoring
          • AWS Security Monitoring
          • GCP Security Monitoring
          • Azure Security Monitoring
          • Office365 Security Monitoring
          • Google Workplace Monitoring
          • IoT Security Monitoring
          • Ransomware Prevention
          • Secure Work From Anywhere
          • LogSentinel SIEM For MSSPs
        • Standards and Regulations
          • GDPR Compliance
          • HIPAA Compliance
          • SOX Compliance
          • PSD2 Compliance
          • SWIFT Compliance
          • NIST Compliance
          • US Cybersecurity Laws
          • EU NIS Directive Compliance
  • Products
    • LogSentinel SIEM
  • LogSentinel SIEM
    • Overview
    • LogSentinel SIEM and XDR Features
    • Pricing
    • How Is LogSentinel SIEM Better?
  • Solutions
    • Financial Sector
    • Healthcare
    • Government
    • E-Commerce
    • Critical Infrastructure
    • SaaS Security Monitoring
    • Office365 Security Monitoring
    • Google Workplace (G Suite) Security Monitoring
    • SAP Security Monitoring
    • Phishing Detection
    • LogSentinel SIEM Honeypot
    • Website Integrity Monitoring
    • Antivirus Log Collection And Analysis
    • AWS Security Monitoring
    • Azure Security Monitoring
    • GCP Security Monitoring
    • IAM Security Monitoring
    • IoT Security Monitoring
    • Ransomware Prevention
    • Secure Work From Anywhere
    • LogSentinel SIEM For MSSPs
  • Resources
    • Case Studies
    • Webinars
    • Ebooks
    • Solutions Briefs
    • Compliance Mappings
    • SIEM Service FAQ
    • Documentation
    • Integrations And Data Sources
    • Roadmap
  • Partners
    • Partner Portal
    • Become a partner
    • Find a Partner
  • About us
    • About LogSentinel
    • Contact us
    • Careers
  • Blog
  • Sign in
  • Book a Demo
Lessons Learned from the Biggest FinTech Breaches (1)

Lessons Learned from the Biggest FinTech Breaches

December 16, 2019 Category: Data Protection
The FinTech industry is rapidly growing and although it has seen a decrease in the number of deals in recent months, it still maintains a good growth pace. It has…
Dutch-Bulgarian Security Startup Raised €1M to Guard Sensitive Data (1)

Dutch-Bulgarian Security Startup LogSentinel Raised €1M to Guard Sensitive Data From Breaches

November 22, 2019 Category: LogSentinel News
LogSentinel raised €1M to expand market opportunities so the company can take information security to a brand new level globally. LogSentinel will aim to expand fast on the global market,…
Blockchain and Open Data Bringing Transparency to Governments (1)

Blockchain and Open Data – LogSentinel Brings More Transparency to Government Audit Trail

November 20, 2019 Category: LogSentinel News
Bulgarian e-government’s main data exchange component is storing its audit trail in LogSentinel’s SentinelTrails solution since June last year, as LogSentinel donated it to the state e-government agency. We have recently…
LogSentinel joins the Paris Call for Trust and Security in Cyberspace

LogSentinel joins the Paris Call for Trust and Security in Cyberspace

November 8, 2019 Category: LogSentinel News
As an information security company, LogSentinel is committed to mitigating cyber threats leveraging the latest technologies including blockchain and Artificial Intelligence. We truly believe in the need for an initiative…
Visa-innovation_startup

LogSentinel at Visa Innovation Program – Redefining Financial Cybersecurity Standards

October 29, 2019 Category: LogSentinel News
About Visa Innovation Program Visa Innovation Program, powered by Eleven Ventures and Visa, is created to address some of the most challenging problems in the financial industry, with the main…
NIST Digital Identity Requires Secure, Unmodifiable Audit Trail (1)

NIST: Digital Identity Requires Secure Audit Trail

October 23, 2019 Compliance
Digital Identity is a hot topic and is applicable to a wide range of scenarios. Virtually any organization has some form of digital identity in order to authenticate its employees,…
Logsentinel Pushes The Next Frontier Putting Docs On The Ledger (1)

PRESS RELEASE: Blockchain company LogSentinel Pushes The Next Frontier Putting Corporate Docs On The Ledger

October 3, 2019 Category: LogSentinel News
Highlights: Blockchain and AI are now responsible for keeping confidential commercial files safe New Models of strategic partnership keep data on the blockchain Revolutionizing supply chains – no more confusion…
Protecting Documents Against Fraud and Manipulation With Blockchain

Protecting Documents Against Fraud and Manipulation With Blockchain

October 2, 2019 Category: Data Protection
Documents are at the center of many organizational processes. They make processes traceable and people accountable. However, documents are by default not protected from manipulation – anyone with access to…
LogSentinel Founders celebrating CESA award recognitions

LogSentinel Wins 2 Awards at the Central European Startup Awards Bulgaria 2019

September 27, 2019 Category: LogSentinel News
Central European Startup Awards (CESA) is part of the Global Startup Awards, aiming to unlock startups’ full potential by gathering the best ideas and minds from 63 countries across Europe,…
Digital Transformation and Government Data Breaches

Digital Transformation and Government Data Breaches

September 24, 2019 Category: Data Protection
Digital transformation led to many changes on a large scale. Innovative companies became the new market leaders in less than a decade. In fact, the understanding of digitalization changed in…
Facebook Social Plugins and GDPR The Court of Justice Ruling

Facebook Social Plugins and GDPR: The Court of Justice Ruling

August 2, 2019 Compliance
This week The Court of Justice of the European Union ruled that websites are liable for Facebook’s tracking activities. This is an important decision that clarifies one of the most important…
Digital Transformation Happens Too Fast to Be Secure

Digital Transformation Happens Too Fast to Be Secure

July 4, 2019 Category: Data Protection
Digital transformation is the process of turning paper-based processes into digital ones or even completely eliminating unnecessary steps via automation. Digital transformation is innovation, but not in the “flying cars”,…
Previous 1 … 7 8 9 10 11 12 13 Next
Naarden, The Netherlands
Sofia, Bulgaria

Copyright © 2022 LogSentinel, All Rights Reserved
team@logsentinel.com

Facebook link Twitter link Linkedin link
Support
Privacy policy
Terms of use
LogSentinel SIEM Documentation
LogSentinel SIEM Solutions
LogSentinel Services Status