Request a cybersecurity demo from DefenseStorm

Need more information or a product demo?

DefenseStorm://Securing the Cloud

Security monitoring and alerting for cloud systems, applications, and data

 

Adored by security heroes, DevOps geeks, and fresh-thinking CISOs

A SECURITY DATA PLATFORM THAT WATCHES EVERYTHING. AGGREGATE YOUR ON-PREMISE, COLO AND CLOUD LOGS INTO A SINGLE SYSTEM FOR BETTER CYBERSECURITY MANAGEMENT

Cloud security is different than traditional network security, and as a fast-paced tech company, Tealium needed a unified security data platform to manage our entire cybersecurity program. DefenseStorm is the fastest, easiest to use solution we could find.

Tealium CEO, Jeff Lunsford.

Cloud Security Done Right

SECURITY MONITORING + SMART ALERTS

FOR THE HYBRID CLOUD

Monitoring your cloud logs without a zillion coding hours or a full time team of security analysts can seem impossible. DefenseStorm Cloud monitors all your cloud logs and provides customizable, automated alerts, so you can sleep at night knowing that you are secure and compliant.

METICULOUSLY DESIGNED TO ELIMINATE THE NOISE

ROBUST CYBERSECURITY MANAGEMENT TOOLS WITH A CLEAN UI THAT FINDS HARMONY BETWEEN FORM AND FUNCTION.

Purpose-built to save time and reduce busy work. Monitor your logs, detect and investigate security alerts, and report on resolved incidents all within the same system.

A SINGLE PANE OF GLASS FOR ALL LOG DATA

A SECURITY DATA PLATFORM THAT AGGREGATES YOUR CLOUD, COLO AND ON-PREMISE LOGS

Modern institutions have moved to the hybrid cloud and need a cybersecurity management tool that covers everything, from the ground to the cloud. No more pivoting from system to system, getting slowed down while you decipher each log format. DefenseStorm ingests all your logs and standardizes them into the DefenseStorm Event Format.

DASHBOARDS MAKE DATA SIMPLE

EYE-PLEASING GRAPHS THAT VISUALIZE DATA AT-A-GLANCE

Reporting that works for the C-suite has become a must. You should be able to see your events, alerts, incidents, SLAs and policy compliance in real-time. With DefenseStorm you can prepare a report for your auditor or regulator in minutes.

WICKED FAST SEARCH

SEARCH THAT’S INTUITIVE, CONTEXTUAL AND USES EVERYDAY NATURAL LANGUAGE.

In cybersecurity, every minute matters. Don’t waste time waiting for search results – you deserve a SIEM that works as fast as you do and can provide before and after context, natural language search, one-click drill down filters and a easy to use timeline slider.

PROMOTES SHARING AND COLLABORATION

EVERYTHING IS IN ONE PLACE SO YOU CAN ASSIGN, COLLABORATE OR ESCALATE AN INCIDENT WITH A CLICK OF A BUTTON.

Resolving a cybersecurity incident takes a village. Collaboration is key – share incident details, search queries, notes, and attachments with ease.

Pricing

The cloud has become essential to running a modern financial institution and your shouldn’t have to pay extra to keep it secure. That’s why DefenseStorm includes cloud security in our simple, asset-based pricing. You pay a single affordable fee to secure your entire network from the ground to the cloud.

Product Details

DEFENSESTORM CLOUD WATCHES AND ALERTS ON THE PARTS OF AWS THAT AMAZON DOESN’T SECURE, LIKE YOUR OS, NETWORK CONFIG, APPLICATIONS AND ACCESS MANAGEMENT.

AWS CloudTrail

CloudTrail is a web service that provides visibility into user activity by recording API calls made on your account and delivers log files to your Amazon S3 bucket. This information helps you to track changes made to your AWS resources and to troubleshoot operational issues. Anyone using AWS should have CloudTrail enabled. CloudTrail records important information about each API call, including:

  • API Name
  • Identity of the caller
  • Timestamp of the API call
  • Request parameters
  • Response elements returned by the AWS service

AWS  ELB

An Elastic Load Balancer distributes incoming application traffic across multiple EC2 instances to increase the fault tolerance of your applications. It serves as a single point of contact for clients, which increases the availability of your application, and detects unhealthy instances and routes traffic only to healthy instances. The DefenseStorm platform ingests the ELB access logs that capture detailed information about requests sent to the load balancer. The logs contain:

  • Timestamp the request was received
  • Client’s IP address
  • Latencies
  • Request paths
  • Server responses

OpenDNS offers network security by reviewing all of your employees network connections on/off the corporate network. Since DefenseStorm is a layer that can “see everything”, we are able to correlate the events OpenDNS captures when users leave the corporate network with the rest of your corporate network events including:

  • Command & control callbacks
  • Malware over any port or protocol
  • Phishing over any port or protocol
  • Adding the Office 365 services is as simple as adding an app.
  • Administrators can use their Active Directory (AD) credentials to setup ingestion of Office 365 logs. No need to maintain separate passwords.

Supports the following:

  • File and folder activities
  • Sharing and access request activities
  • Synchronization activities
    • Site administration activities
    • Exchange mailbox activities
    • User administration activities
    • Group administration activities
  • Application administration activities
  • Role administration activities
  • Directory administration activities

Operating Systems:

  • Linux (auditd, auth, syslog)
  • Mac OS X
  • Windows (IIS, Snare, SQL Server, Exchange, SharePoint)
  • Unix environments

Other:

  • Common Applications (Apache, nginx, postfix, etc.)
  • Common Event Format (CEF)
  • Custom Application Logs
  • Java

Secure Your Cloud

Interested? Let us know how to reach you. No hassles, no sales pitch, no obligation.
 
Grab our latest eBook - Security Data Platform Webinar on October 12th - Space is limited!