Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools
You are here: Home / Security Solutions / LogPoint – SIEM / Forensics and Traceability

Forensics and Traceability

An unparalleled search engine.

• Sharply targeted search results thanks to an advanced labeling/tagging structure.

• Convert any search – from simple to advanced – on the fly into a permanent Dashboard.

• Turn any search into an elegant report with an advanced report generator.

Advanced log analytics.

• Easily display data in the best possible fashion.

Out-of-the-box rules and security signatures.

• Choose from thousands of built-in signatures from the most common devices, operating systems,  applications and more.

• Smart support for other proprietary formats.

• A unique application structure ensures fast and easy-to-manage upgrades for new rules and   signatures.

Data Enrichment.

• Enhance log messages with data from other sources, e.g.: CMDBs, portals or any other data source –   static or dynamic.

• Enriched data for a given log message can be included in the correlation alerts.

• Manual controls and reporting are reduced, as external data is automatically included in the forensics   processes.

Contact us for more information.

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • US Charges 20-Year-Old Head of Hacker Site BreachForums
  • Tesla Hacked Twice at Pwn2Own Exploit Contest
  • CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement