Saturday, April 11, 2020

Assist In Integrating Log Sources With Siem











About:

To detect the alert in your environment you need to integrate the network, security and IOT devices to your SIEM. We support the following SIEM environment. 

IBM Qradar

Splunk
LogRhythm
ArcSight



You need to integrate your devices with proper parsed field else your Correlation rule engine will not work properly and thus no proper detection. 
We will support you to integrated these devices either supported or unsupported with the SIEM listed above. Please find a few examples of devices which we can integrate-



1. windows domain controller

2. A firewall like Cisco, Palo Alto etc.

3. Endpoint like Symantec, ESET and so on.

4. EDR solutions like Carbon Black, Crowdstrike etc.



Reviews


Seller's Response:

Very knowledgeable.

:

Good communicator. Was able to respond promptly for a short request. Will request help in the future.

:

He is very clear with his requirement which help me provide him work more efficiently. Great experience working with him

: :


No comments:

Post a Comment