Anomaly Detection with SureLog SIEM UEBA Module Using Markov Chain
Anomaly detection in sequence data is becoming more and more important to detect
SURELOG TAXONOMY
A taxonomy improves the scope and stability of correlation rules. It also aids
The Differences Between Common SIEMs and SureLog
SureLog designed from the ground up. SureLog has many advantages when compared with
Threat Detection and Hunting with MITRE ATT&CK Techniques Using SureLog SIEM
Spearphishing Link (T1192) Spearphishing with a link is a specific variant of spearphishing. It
Log Storage and Hot Data
Hot data necessary for live security monitoring and cold data is for which
SureLog Intelligent Response
SureLog Intelligent Response
Detecting Attacks with SureLog SIEM
Detecting Attacks with SureLog SIEM
Real Time Multi-Dimensional Data and Log Enrichment with SureLog SIEM
Data enrichment is the key ingredient required for effective threat detection, investigation, and
Detecting Unusual Activities Using SureLog Next Generation SIEM –Use Cases Part 2
This article is part of a series. Check out the full series Part1 [1]. The efficiency and effectiveness of security