{"id":7265,"date":"2022-09-07T14:09:46","date_gmt":"2022-09-07T11:09:46","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7265"},"modified":"2022-09-07T14:21:50","modified_gmt":"2022-09-07T11:21:50","slug":"siem-software","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/siem-software","title":{"rendered":"SIEM Software"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7265\" class=\"elementor elementor-7265 elementor-6329\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d345852 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"d345852\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53e528b ot-flex-column-vertical\" data-id=\"53e528b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b7fc43 elementor-widget elementor-widget-iheading\" data-id=\"9b7fc43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Take full control of your logs and events<\/span>\r\n\t        <h2 class=\"main-heading\">Security information and event management (SIEM)<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83cfd89 elementor-widget elementor-widget-heading\" data-id=\"83cfd89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><b>Security information and event management (SIEM)<\/b> is a combined security solution containing software products and services that enable real-time monitoring of various rule-based cybersecurity log files and logs targeting data from multiple different IT systems and integrated into incidents that can be correlated and processed.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0be5242 elementor-widget elementor-widget-heading\" data-id=\"0be5242\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The SIEM solutions we can offer are some of the most popular and have proven success in detecting and preventing attacks.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dec114 elementor-widget elementor-widget-heading\" data-id=\"2dec114\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">This type of solution also helps prevent malicious actions by company employees, as the administrator has complete information about what actions and operations they are performing.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c7abbed ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7abbed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-28a065a ot-flex-column-vertical\" data-id=\"28a065a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10bdc8e elementor-widget elementor-widget-image\" data-id=\"10bdc8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1106\" height=\"370\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/wazuh-logo.png\" class=\"attachment-full size-full wp-image-6333\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/wazuh-logo.png 1106w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/wazuh-logo-300x100.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/wazuh-logo-1024x343.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/wazuh-logo-768x257.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/wazuh-logo-720x241.png 720w\" sizes=\"(max-width: 1106px) 100vw, 1106px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-48601f4 ot-flex-column-vertical\" data-id=\"48601f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2035032 elementor-widget elementor-widget-image\" data-id=\"2035032\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"855\" height=\"186\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/rapid7-1.png\" class=\"attachment-full size-full wp-image-6337\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/rapid7-1.png 855w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/rapid7-1-300x65.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/rapid7-1-768x167.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/rapid7-1-720x157.png 720w\" sizes=\"(max-width: 855px) 100vw, 855px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9565cf elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"a9565cf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f20bf4c ot-flex-column-vertical\" data-id=\"f20bf4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a86b7be elementor-widget elementor-widget-iheading\" data-id=\"a86b7be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Why do you need SIEM software?<\/span>\r\n\t        <h2 class=\"main-heading\">Benefits and added value<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e23e6a elementor-widget elementor-widget-heading\" data-id=\"0e23e6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The reason an organization needs a SIEM solution to monitor systems and report suspicious activity is because the amount of data generated by a medium-sized organization today is too large to handle manually. Log file and log management is at the core of SIEM functionality, as the more diverse types of log files from different sources feed the SIEM system, the more it generates reports that can be easily understood and managed. This capability allows the SIEM to correlate relevant events by cross-referencing log files from different sources against correlation rules.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b653522 elementor-widget elementor-widget-heading\" data-id=\"b653522\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Most companies own many servers or cloud services and typically cannot handle either monitoring or security at scale. By using SIEM, your company can provide security and monitoring more easily. Our software will allow you to generate reports in seconds for hundreds or even thousands of servers.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6259f55 elementor-widget elementor-widget-heading\" data-id=\"6259f55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Last but not least, the ability to notify against specific events or a group of recorded actions remains an invariable part of the benefits for every single IT team. Being able to be notified through a variety of communication channels is also a good approach, especially if you have a ticketing system or system to manage notifications from different systems.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e49923d ot-flex-column-vertical\" data-id=\"e49923d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8aa41bd elementor-widget elementor-widget-image\" data-id=\"8aa41bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1.png\" class=\"attachment-full size-full wp-image-6463\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1.png 2000w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-amico-1-720x720.png 720w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f5b237 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"0f5b237\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66ecf0a ot-flex-column-vertical\" data-id=\"66ecf0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e711fe0 elementor-widget elementor-widget-iheading\" data-id=\"e711fe0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ How does the solution work?<\/span>\r\n\t        <h2 class=\"main-heading\">Architecture and operations<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f65adf elementor-widget elementor-widget-heading\" data-id=\"7f65adf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The central instance in a cloud infrastructure is responsible for analyzing the data received by the agents, processing events through decoders and rules, and using threat intelligence to look for well-known IOCs (indicators of compromise). A single instance can analyze data from hundreds or thousands of agents and scale horizontally when set up in cluster mode.\nThe server is also used to manage the agents, configuring and updating them remotely as needed. In addition, the server can send commands to the agents, for example to trigger a response when a threat is detected.\n<br>\nWhen the data is not received through a software agent, but for example through Syslog - then network devices or other cloud services simply need to be directed to your instance. This makes it quite seamless to deliver the logs from network devices to the SIEM instance.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a9aa1 elementor-widget elementor-widget-image\" data-id=\"e9a9aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1052\" height=\"674\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/siem-architecture.png\" class=\"attachment-full size-full wp-image-6346\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/siem-architecture.png 1052w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/siem-architecture-300x192.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/siem-architecture-1024x656.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/siem-architecture-768x492.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/siem-architecture-720x461.png 720w\" sizes=\"(max-width: 1052px) 100vw, 1052px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8adcb8a elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"8adcb8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d9b7571 ot-flex-column-vertical\" data-id=\"d9b7571\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1d7376 elementor-widget elementor-widget-iheading\" data-id=\"e1d7376\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Useful functionalities and impeccable quality<\/span>\r\n\t        <h2 class=\"main-heading\">Features and capabilities<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0fd33d elementor-widget elementor-widget-image\" data-id=\"b0fd33d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1230\" height=\"239\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture2.png\" class=\"attachment-full size-full wp-image-6348\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture2.png 1230w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture2-300x58.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture2-1024x199.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture2-768x149.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture2-720x140.png 720w\" sizes=\"(max-width: 1230px) 100vw, 1230px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03fc6be elementor-widget elementor-widget-image\" data-id=\"03fc6be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1013\" height=\"481\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture1.png\" class=\"attachment-full size-full wp-image-6347\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture1.png 1013w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture1-300x142.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture1-768x365.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Picture1-720x342.png 720w\" sizes=\"(max-width: 1013px) 100vw, 1013px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84dff8a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"84dff8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Host-based Threat Detection System (HIDS)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Compliance and security management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitoring and security for AWS and GCP<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Custom rule set and rule customization<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitoring for proprietary or proprietary software<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security configuration monitoring of workstations and servers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Software agents for Linux, Windows and MacOS (Win XP+)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Complete list of information about monitored endpoints (Software, Hardware, etc.)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Policies for verifying specific requirements<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vulnerability management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5cf1219 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"5cf1219\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0c4ed66 ot-flex-column-vertical\" data-id=\"0c4ed66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3805fe elementor-widget elementor-widget-iheading\" data-id=\"a3805fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Advantages of our solution<\/span>\r\n\t        <h2 class=\"main-heading\">Advantages over other SIEM software<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8243ce8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8243ce8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The agent is compatible with many operating systems: Linux, Windows, Mac, Solaris, AIX and HP-UX.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">We have a unified security monitoring platform that analyzes security events in real time.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Built module to manage and comply with PCI, HIPAA, GDPR, NIST, GPG13 policies.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Custom rule set and rule customization<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Infrastructure monitoring: Clouds and cloud services: AWS, Azure, Google.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitoring virtual containers: Docker, Kubernetes.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Possibility of virtual and physical (on-prem) instance<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">It has the ability to scale, thanks to the structure of our cluster infrastructure (1 + 3 + ?).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ability to integrate with threat intelligence feeds from the Internet and third parties.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Notification by email, REST API, Telegram, Slack, Teams and more.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Extremely easy to create fully customized interfaces and dashboards.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c5ac4e elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"4c5ac4e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e10733 ot-flex-column-vertical\" data-id=\"3e10733\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c13c4f elementor-widget elementor-widget-iheading\" data-id=\"0c13c4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Applications and benefits for you<\/span>\r\n\t        <h2 class=\"main-heading\">Added value for your company<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-04f8462 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"04f8462\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ba3d6f7 ot-flex-column-vertical\" data-id=\"ba3d6f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45d0cd5 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"45d0cd5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-30d8de4 ot-flex-column-vertical\" data-id=\"30d8de4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82211be elementor-widget elementor-widget-iiconbox2\" data-id=\"82211be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Cyber incident detection<\/h5>\r\n\t            <p>A SIEM system detects incidents that might otherwise go unnoticed. This technology analyzes log file entries to detect indicators of malicious activity. Additionally, because it collects events from all sources on the network, the system can reconstruct the timeline of an attack to help determine its nature and impact. The platform communicates recommendations to security controls \u2013 for example, directing a firewall to block malicious content.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-51e583c ot-flex-column-vertical\" data-id=\"51e583c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69985b7 elementor-widget elementor-widget-iiconbox2\" data-id=\"69985b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Improved efficiency<\/h5>\r\n\t            <p>SIEM tools can greatly improve your efficiency when it comes to understanding and processing events in your IT environment. With SIEM, you can view security log data from many different hosts on your network from a single interface. This speeds up the incident handling process in several ways. First, the ability to easily see log data from the hosts in your environment allows your IT team to quickly identify an attack path. Second, centralized data allows you to easily identify the hosts that have been affected by an attack.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d0a6b88 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"d0a6b88\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f31585c ot-flex-column-vertical\" data-id=\"f31585c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d62d45e elementor-widget elementor-widget-iiconbox2\" data-id=\"d62d45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Compliance with requirements<\/h5>\r\n\t            <p>Companies use SIEM to meet compliance requirements by generating reports that address all logged security events among these sources. Without a SIEM, an organization must manually extract log data and compile the reports.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9169df6 ot-flex-column-vertical\" data-id=\"9169df6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d05da72 elementor-widget elementor-widget-iiconbox2\" data-id=\"d05da72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Incident Management<\/h5>\r\n\t            <p>SIEM improves incident management by enabling the security team to identify the attack path across the network, identifying compromised hosts and providing automated mechanisms to stop ongoing attacks.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ba102f3 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"ba102f3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b2ce9e6 ot-flex-column-vertical\" data-id=\"b2ce9e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e9f6aa elementor-widget elementor-widget-iiconbox2\" data-id=\"5e9f6aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Security analysis<\/h5>\r\n\t            <p>A SIEM is used to collect, aggregate, index, and analyze security data, helping organizations detect unauthorized access, threats, and behavioral anomalies.\nAs cyber threats become more sophisticated, real-time monitoring and security analytics are required to quickly detect and remediate threats. Therefore, our lightweight agent provides the necessary monitoring and response capabilities, while our server component provides security intelligence and performs data analysis.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4e001d4 ot-flex-column-vertical\" data-id=\"4e001d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e2b511 elementor-widget elementor-widget-iiconbox2\" data-id=\"9e2b511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Unauthorized access detection<\/h5>\r\n\t            <p>Agents scan monitored systems looking for malware, rootkits, and suspicious anomalies. They can detect hidden files, masked processes or unregistered network adapters, as well as inconsistencies in system call responses to the OS.\nIn addition to the agent's capabilities, the server component uses a signature-based approach to detect unauthorized access, using its regular expression engine to analyze the collected log data and look for indicators of compromise.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-66aaaba elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"66aaaba\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5a97227 ot-flex-column-vertical\" data-id=\"5a97227\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-990a93d elementor-widget elementor-widget-iiconbox2\" data-id=\"990a93d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Log analysis<\/h5>\r\n\t            <p>Agents can read operating system and application log files and securely forward them to a central manager for rule-based analysis and consistent storage.\n\nLogs help keep you informed of application or system errors, misconfigurations, attempted and\/or successful malicious activities, policy violations, and various other security issues.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6ed87bd ot-flex-column-vertical\" data-id=\"6ed87bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99c4acd elementor-widget elementor-widget-iiconbox2\" data-id=\"99c4acd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>File integrity monitoring<\/h5>\r\n\t            <p>SIEM monitors the file system by identifying changes in the content, permissions, ownership, and attributes of the files you need to monitor. In addition, it identifies users and applications used to create or modify files.\nFile integrity monitoring capabilities can be used in conjunction with threat intelligence to identify threats or compromised hosts. In addition, several regulatory compliance standards, such as PCI DSS, require it.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-26b0e8d elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"26b0e8d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fe5a6a9 ot-flex-column-vertical\" data-id=\"fe5a6a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4ce983 elementor-widget elementor-widget-iiconbox2\" data-id=\"c4ce983\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Vulnerability detection<\/h5>\r\n\t            <p>SIEM agents pull software inventory data and send this information to the server, where it is linked to continuously updated CVE (Common Vulnerabilities and Exposure) databases to identify well-known vulnerable software.\n\nAutomated vulnerability assessment helps you find weak points in your critical assets and take corrective action before attackers use them to sabotage your business or steal confidential data.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-61f5beb ot-flex-column-vertical\" data-id=\"61f5beb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8908a65 elementor-widget elementor-widget-iiconbox2\" data-id=\"8908a65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Configuration evaluation<\/h5>\r\n\t            <p>SIEM monitors system and configuration settings on hosts to ensure they are compliant with your security policies, standards and\/or security guidelines. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured.\nIn addition, configuration checks can be customized by tailoring them to properly match your organization. Alerts include recommendations for better configuration and external references.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0c7e9a2 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"0c7e9a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a9801bc ot-flex-column-vertical\" data-id=\"a9801bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5772b3e elementor-widget elementor-widget-iiconbox2\" data-id=\"5772b3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Cloud security<\/h5>\r\n\t            <p>SIEM helps monitor cloud infrastructure at the API level by using integration modules that are able to pull security data from well-known cloud providers, such as Amazon AWS, Azure or Google Cloud. In addition, it provides rules to evaluate the configuration of your cloud environment, easily detecting weaknesses.\n\nIn addition, SIEM lightweight and multi-platform agents are commonly used to monitor cloud environments at the instance level.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-13680bd ot-flex-column-vertical\" data-id=\"13680bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36bdeae elementor-widget elementor-widget-iiconbox2\" data-id=\"36bdeae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Container security<\/h5>\r\n\t            <p>Wazuh provides security visibility into your Docker hosts and containers by monitoring their behavior and detecting threats, vulnerabilities and anomalies. The Wazuh agent has built-in integration with the Docker API, allowing users to monitor images, disks, network settings, and running containers.\nWazuh continuously collects and analyzes detailed runtime information. For example, warning about containers running in privileged mode, vulnerable applications, shells, etc<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Take full control of your logs and events Security information and event management (SIEM) Security information and event management (SIEM) is a combined security solution containing software products and services that enable real-time monitoring of various rule-based cybersecurity log files and logs targeting data from multiple different IT systems and integrated into incidents that [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7265","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7265"}],"version-history":[{"count":11,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7265\/revisions"}],"predecessor-version":[{"id":7283,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7265\/revisions\/7283"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}