Event Correlation
Event correlation takes data from either application logs or host logs and then
Profile Based correlation
SureLog leverage automated behavioral profiling to automatically detect anomalies and autonomously define rules
Anomaly Detection
Anomaly detection is used to determine the types of anomalies occurring and to
Threat Intelligence
Threat intelligence, is organized, analyzed and refined information about potential or current attacks