Logsign

2010
Istanbul, Turkey
Mar 30, 2020   |  By Fakhar Imam
The menace of coronavirus pandemic is accelerating significantly and hackers are capitalizing the element of fear to collect shear currency. They are creating thousands of websites as baits. According to the Check Point Research report, threat actors are registering phony COVID-19-related domains and selling them on discounted off-the-shelf malware on the dark web. In this article, we will delve into some essential details regarding the coronavirus-related bait sites. Here is some help.
Mar 26, 2020   |  By Fakhar Imam
The Coronavirus (COVID-19) pandemic is increasing tremendously and disrupting the global health at large extent, in addition to the damages to economics, social and political systems. More importantly, the digital world is also on the verge of destruction because, due to this menace, the people at large scale are compelled to work remotely and doing so will make them rely heavily on remote communication and digital tools.
Mar 25, 2020   |  By atlastugce
Transport layer security (TLS for short) refers to a protocol that aims to offer authentication, data integrity and privacy during the communication between two different computer applications. Keep reading to learn why it is important for your organization. Every web developer aims to keep the communications conducted over the internet as safe as possible but despite all the good intentions, this is an involved task due to the flawed designs and sub par implementations of Transport Layer Security.
Mar 23, 2020   |  By atlastugce
If you have been keeping up with the recent advancements in the cyber realm, you must have heard of cryptography. From popular films to ancient times, cryptography has always been discussed but gained much more significance in the recent years. Read our article and learn why! You must have done online shopping or created an account on a web platform before. While you are completing these tasks, you share sensitive and very valuable information.
Mar 20, 2020   |  By atlastugce
Identity and access management solutions are one of the best friends of your IT department. Keep reading to learn how and why. Identity and access management solutions (also known as the IAM solutions) offer unique and useful technologies for the cyber security professionals to help them control the user access within the limits of their organization. These solutions allow cyber security professionals to manage which user can access which information for how long.
Jan 27, 2020   |  By Logsign
Tayfun Toka tells the story of our collaboration with ETS Tur. Being a leader in the travel industry, ETS Tur has unique needs regarding the security of their organization. We offer our SIEM solutions to ensure their safety. Mr. Toka emphasizes the efficiency of our customer support and user friendly design of our SIEM solutions. Watch the full testimonial video to learn more about our partnership with ETS Tur and how Logsign can help your business.
Sep 20, 2018   |  By Logsign
Logsign is a full feature, all-in-one SIEM solution which unifies Log Management, Security Analytics and Compliance. Smartly designed, NoSQL and hdfs embedded architecture keeps the capabilities of clustering, vertical and horizontal scalability, support for both centralized and distributed scenarios, fast indexing and real time monitoring.
Sep 20, 2018   |  By Logsign
Logsign is a full feature, all-in-one SIEM solution which unifies Log Management, Security Analytics and Compliance. Smartly designed, NoSQL and hdfs embedded architecture keeps the capabilities of clustering, vertical and horizontal scalability, support for both centralized and distributed scenarios, fast indexing and real time monitoring.