Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Secure Feature

Log Endpoint Security

Threat Intelligence

Security Operations

Cloud Security

Endpoint Security Th r e a t I n t e l l i g e n c e
Configuration Assessment Threat Hunting
Extended Detection and Response IT Hygiene
File Integrity Monitoring Vulnerability Detection

Security Operations Cloud Security


Log Data Analysis Posture Management
Malware Detection Workload Protection
Audit and Compliance Container Security

A comprehensive SIEM solution


SecureLog Security Information and Event
Management (SIEM) solution provides monitoring,
detection, and alerting of security events and
incidents

Active XDR protection

from modern threats

SecureLog provides analysts real-time


correlation and context. Active responses are
granular, encompassing on-device remediation
so endpoints are kept clean and operational.

Architecture
The SecureLog architecture is based
on agents, running on the monitored
endpoints, that forward security data to a
central server. Agentless devices such as
firewalls, switches, routers, and access points
are supported and can actively submit log
data via Syslog, SSH, or using their API. The
central server decodes and analyzes the
incoming information and passes the results
along to the SecureLog indexer for indexing
and storage.

The SecureLog indexer cluster is a collection


of one or more nodes that communicate with
each other to perform read and write
operations on indices. Small SecureLog
deployments, which do not require
processing large amounts of data, can easily
be handled by a single-node cluster. Multi-
node clusters are recommended when there
are many monitored endpoints, when a large
volume of data is anticipated, or when high
availability is required.

You might also like