Operations | Monitoring | ITSM | DevOps | Cloud

Automated incident response with Flowmon and FortiGate

Flowmon has teamed up with Fortinet to provide security administrators with an integrated solution for automated threat detection and incident response. Join this webinar to learn about the benefits of the integration between Flowmon and the FortiGate next-generation firewall. You will experience a live demo demonstrating how Flowmon’s detection capabilities can enhance FortiGate’s security enforcement to create a truly automated security matrix. Incident logging to FortiSIEM included.

Getting started with adding a new security data source in your Elastic SIEM: Part 1

What I love about our free and open Elastic SIEM is how easy it is to add new data sources. I’ve learned how to do this firsthand, and thought it’d be helpful to share my experience getting started. Last October, I joined Elastic Security when Elastic and Endgame combined forces. Working with our awesome security community, I’ve had the opportunity to add new data sources for our users to complement our growing catalog of integrations.

A Journey of Elastic SIEM: Getting Started through Threat Analysis Part 1

Calling all security enthusiasts! Many of us are now facing similar challenges working from home. Introduced in 7.2, Elastic SIEM is a great way to provide security analytics and monitoring capabilities to small businesses and homes with limited time and resources. In this three-part meetup series we will take you on a journey from zero to hero, getting started with the Elastic SIEM to becoming a threat hunter.

5 Reasons You Should Start Analyzing Your Logs

In IT environments, all software applications and systems produce logs with varying levels of details or context about different events. These log files are automatically generated, and you can see them as a time-stamped record of events. Traditionally, organizations maintained logs locally or in a self-hosted setup. This was done primarily to meet various compliance mandates.

Integration and Shipping Okta Logs to Logz.io Cloud SIEM

Company security usually depends on your ability to come up with a diverse set of passwords and then manage them. Remembering all of them is considered a tad too difficult for most mere mortals, so a number of password storage apps have emerged. But they too have to be secured, and ultimately results in inefficient access and flawed security. Single-sign on (SSO) is still preferred, but to make it effective, companies like Okta have to secure integration across a number of apps.

Best Log Management Tools in 2020, and How to Select One for Your Organization

In modern digital environments, logs are present everywhere. From networking devices, servers, and databases, to operating systems, cloud-based services, and applications, every component produces some form of digital records of events. These records or logs provide an audit trail for Security Information Event Management (SIEM) and help in performance monitoring of servers and applications.

Generating MITRE ATT&CK® signals in Elastic SIEM: Sysmon data

Many mature security teams look to the MITRE ATT&CK® matrix to help improve their understanding of attacker tactics, techniques, and procedures (TTPs) and to better understand their own capabilities relative to these common adversarial approaches. With the release of Elastic Security 7.6, Elastic SIEM saw 92 detection rules for threat hunting and security analytics aligned to ATT&CK.

Elastic SIEM is free and open for security analysts everywhere

Security teams must protect attack surfaces that are becoming bigger and more distributed due to the growth of remote work, cloud infrastructure, and other dynamics. These teams understand that meeting this challenge at scale requires the successful incorporation of the appropriate technology into their security operations program.

The Cost of Doing SIEM & Security Analytics on Your Own

Security information and event management, or SIEM, has become part of the vocabulary of every organization. SIEM solutions gather events from multiple systems and analyze them—both in real time and through historical data. SIEM costs—as cyber security costs in general—can be high, but there is a tradeoff if you opt for the FOSS route (free and open source solutions).