Anomaly Detection with SureLog SIEM UEBA Module Using Markov Chain
Anomaly detection in sequence data is becoming more and more important to detect
SURELOG TAXONOMY
A taxonomy improves the scope and stability of correlation rules. It also aids
The Differences Between Common SIEMs and SureLog
SureLog designed from the ground up. SureLog has many advantages when compared with
Threat Detection and Hunting with MITRE ATT&CK Techniques Using SureLog SIEM
Spearphishing Link (T1192) Spearphishing with a link is a specific variant of spearphishing. It
Log Storage and Hot Data
Hot data necessary for live security monitoring and cold data is for which
Detecting Unusual Activities Using SureLog Next Generation SIEM –Use Cases Part 2
This article is part of a series. Check out the full series Part1 [1]. The efficiency and effectiveness of security
Detecting Unusual Activities Using SureLog Next Generation SIEM: Use Cases
Next-Gen SIEMs have brought new capabilities to organizations and their security teams. They’re built from the ground
Never Seen Before Type of Rules With SureLog SIEM
Event correlation techniques are designed to detect events, make sense of them and
Not All SIEM Solutions Are Equal and Not All SIEM Use Cases Are the Same
Security Information and Event Management (SIEM) solutions are an important tool in a
SURELOG SIEM HAS MOST VALUABLE SIEM USE CASES
SureLog Rule As a Code [1] streaming platform detection capability is more than