Logsign Unified Security Operations Platform Overview

Logsign helps organizations to improve their cyber resilience through avoiding risks and chaos, besides ensures compliance with relevant regulations by bringing together all data, threat detection, investigation and incident response capabilities on a single, unified-whole platform. This is achieved through the integration of various native Logsign tools such as Security Information and Event Management (SIEM), Threat Intelligence, User Entity Behaviour Analytics (UEBA), Threat Detection, Investigation, Response (TDIR).

Logsign Unified Security Operations Platform is a comprehensive security tool that enables you to create a data lake, investigate threats and vulnerabilities, analyze risks, and respond to threats automatically. The platform’s automation and orchestration capabilities come from SOAR experience and are involved in every stage of the detection, investigation, and response processes. This enables the eradication and mitigation of threats and vulnerabilities in seconds, reducing MTTD and MTTR.

Logsign Unified Security Operations Platform integrates seamlessly with all other SOC tools to enable the best security management and team experience. Logsign is at the heart of the process. It has an extensive integration library with more than 500 pre-defined integrations, free plugin services, and custom parsing capabilities. As an Unified Security Operations Platform, it works seamlessly with other components of a Security Operations Center.

The product allows unlimited log collection and storage, investigation and detection of threats, incident- case management, UEBA and response automatically.

Security: Logsign Unified Security Operations Platform collects logs and events data from any IT source at any time. Managing the volume of data is also available with the Data Policy Manager, eliminating the need to consider the storing volume. After normalization, it enriches the data with user identity and behavior data. It also indexes all data for security analytics and visualization. Logsign detects security incidents in real-time via built-in alerts, correlation rules, and advanced investigation capabilities. Detecting internal and external threats, threat hunting, and behavior analysis enable security teams to see what is hidden and provide understandable, actionable outcomes, so comes the response.

Compliance: Being compliant with GDPR, PCI DSS, or any other regulation requires a USO Platform that has automated and scheduled reports and continuously logs without loss. Besides that, detecting threats both inside and outside your organization has never been crucial. Logsign Unified Security Operations Platform makes compliance management easy and rapid, with more than 1,200 comprehensive reports pre-prepared for global regulation and control frameworks.

Deployment:

  • Amount of collected and processed events
  • Data storage estimation
  • High availability and disaster recovery requirement
  • Organizational network topology

General Features

  • NoSQL and High Speed
  • High Availability
  • HDFS Based Active-Active NoSQL Architecture
  • Scalability as Horizontally & Vertically
  • 500 + Predefined Correlation Rules
  • Actions Integrated into Correlation
  • 100 + Predefined Dashboards
  • 1000 + Reports (Vendor Specific and General)
  • Advanced Delegation Feature
  • Incident & Case Management
  • Identity and Asset Management
  • User Entity Behavior Analytics (UEBA)

Logsign Unified Security Operations Platform offers you a single-pane holistic view of your organization’s information security. Whether you need a strong security posture or be compliant, an intelligent USO Platform leverages your security event management and makes your life easier. 

 

Capabilities of Product

Infrastructure

  • Vertical and horizontal, unlimited scalability cluster, high availability
  • Unlimited log storage and long-term data retention
  • Simple deployment both on-premise and cloud environments

Limitless Log Collection & Storage

  • 400+ built-in integrations and vendor-free integration capabilities
  • Free plugin service
  • Real-time enrichment
  • Controls your data volume with the Data Policy Manager

Enrichment

  • Asset & identity enrichment
  • Geo IP, position, location, LDAP/AD
  • Context, custom enrichment
  • Behavior enrichment
  • Threat intelligence feeds
  • Network position, branch, etc.
  • Instant data processing

User Entity Behavior Analysis (UEBA)

  • Monitors user access to critical data
  • Prevents botnet infections
  • Detects risky user and watchlist user behaviour
  • Realtime entity context
  • Stop data exfiltration

Detect Complicated Threats

  • Drill-down, full-text, advanced
  • Lucene search Response to queries in milliseconds
  • Investigates correlated and enriched data
  • Threat hunting for hidden threats
  • IOCs and IOAs Threat level validation
  • Incident triage Forensic investigation MITRE ATT&CK and Cyber Kill Chain Frameworks
  • Risk scoring

Security Analytics

  • Hundreds of built-in widgets, alerts, dashboards & reports result in actionable insights with the help of wizards.
  • Easy to customize and configure new dashboards & widgets Powerful wizards
  • Delegation: Role-based access control
  • Dynamic search filters, drill-down search on dashboards
  • Filtering in dashboards with customisable time frame

Incident- Case Management

  • Artifacts, assets, and identity management
  • Incident timeline
  • NIST incident life cycle
  • Incident summary and detailed views
  • Visual cards for investigation, detection, and response

Protect Your IT

  • Mitigate or eradicate cyber security incidents
  • Automated response on security devices
  • Automated notifications
    Automated remediation actions

Logsign Unified Security Operations Platform has lots of Data Collection Methods, Log Enrichment Technology, the opportunity to track all threat activities, calculate risk scoring, and monitor all kinds of activities in your environment.

USO_Arch.png

 

Active-Active Cluster Architecture

With HDFS-based NoSQL architecture, you can access millions of data in seconds. It enables you to detect advanced attacks such as zero-day / zero-second attacks thanks to File Integrity, User, and Behavior Monitoring features offered in the same solution. You can perform in-depth analysis on all reports and visuals created. You can filter and narrow the results and easily access the action-oriented outputs.

 

Logsign has multi-layer data and service backup capacity. You can store and backup live and offline data at the petabyte level. It provides redundancy at every layer and stores your data in a distributed or centralized manner. In possible disaster scenarios, it protects your data securely and makes it accessible at any time with automatic startup, service replication, and failover, self-healing capabilities. These capabilities give you flexibility, mobility in sudden situations, and the opportunity to take action.

 

Logsign is easily scalable horizontally and vertically as your needs grow. You can add more users, more admins, or locations. You can configure the cluster architecture to work with a minimum of 3 servers. The number of servers can be scaled. For the example of 3 Cluster Architecture;

All archive logs are kept in HDFS and stored as three backups. Logsign services are positioned as redundant on these three servers.

In this way, Logsign provides you with both data and service redundancy automatically. In cluster architecture, the three servers talk to each other with a private network without gateway and DNS.

  

Introduction to Menu Bar

Dashboard

Create with ready or custom control panel, dashboard preparation wizard, comprehensive widget architecture.

Search

You can make various inquiries about the event activities that you have gathered.

Reports

Allows you to analyze and create reports on the logs that you have decomposed.

UEBA

UEBA solutions use various data sources, such as log files, network traffic data, and user activity logs, to analyze and detect unusual behavior that could indicate a security threat. 

Incidents

You can write alarm rules for the applications, devices, or systems for which you want to be alerted.

Settings

You can access advanced settings about the product.

 

 

 

Was this article helpful?
1 out of 1 found this helpful

Articles in this section

Become a Certified Logsign User/Administrator
Sign-up for Logsign Academy and take the courses to learn about Logsign USO Platform in detail. Enjoy the courses, and get your badges and certificates. In these courses, you'll learn how to use Logsign in your work and add value to your career.
Visit Our Blog
Our Logsign USO Platform illustrate our expertise. So do the blog. Through our blog posts, deepen your knowledge on various SecOps topics or get updated about important news & modern approaches for cybersecurity. Get into the habit of reading valuable information provided by Logsign. Be a step ahead.