• Compliment your Security Team or Use our Experts

    A conversation about technology & security

    A fast and cost-effective way to jump start your security program…Keep your organization secure and meet compliance standards.  Most successful attacks take only a few minutes to accomplish their goal, whereas most breach detections usually happen hours, days, or even weeks after the fact. Let us help you reduce the gap.

    Verizon offers recommendations in their latest breach report based on the SANS Top 20 Security Controls. Properly configured SIEM assists in completing over 70% of these controls.

  • Basics Coverage to Action Against Threats

    Cyber Security ServicesAvailable in hours, our industry leading managed and monitored SIEM solution offers not only centralized logging but security event monitoring.  These solutions typically require significant investment in  infrastructure and staff to support.  We have 24/7 teams in the US organized in pods of 5 analysts that can support 18 to 25 clients depending upon size and complexity.  As soon they are at 80% capacity, we deploy another pod.

    Logit360 and 24/7 monitoring is a solution to monitor, manage, and optimize your IT services boosting business efficiencies and performance.  Our system is hosted in our own cloud to protect your data.  Your data is separated from other client’s data, and you retain all ownership of your data. We can offer the following services through our integrated platform, Logit360:

    • Remote monitoring and alerting
    • IT event correlation and analysis
    • Critical business services monitoring
    • Managed network services
    • VID and desktop monitoring
    • Security monitoring
    • Cloud security management
    • Compliance reporting
    • User activity management
    • Security risk assessment and consulting

    Our SIEM solution will allow you to reduce the costs associated with servers and storage needed for centralized logging, as well as the staff to install, configure and maintain the systems.  Our staff can assist you in identifying the devices on your network that should be monitored, the configuration steps necessary to monitor your network, and the configuration of the logging solution.  Deployment only requires a virtual data collector to be deployed to your environment that will seamlessly deliver events via SSL to our datacenter.  Logit360 will correlate these events and alert you and our team to customizable metrics to meet compliance standards.

    These alerts can not only help you stop attacks that are in progress, but also help you quickly recognize if a breach does occur.  Most successful attacks take only a few minutes to accomplish their goal, whereas most breach detections usually happen days, weeks, or even months after the fact.  Let us help you reduce the gap.


I would like to have a single solution for both real-time log analysis as well as long term Log Management. My current SIEM product does not provide this capability does Logit360 support this requirement?

Our optimized file-based event database coupled with parallel data management and analysis enables Logit360 customers to have a single solution for analyzing both real-time data and historical data. Computing and storage can be incrementally added without service disruption. In contrast, most SIEM vendors must purge and archive long term data to avoid overwhelming their real-time relation databases, necessitating the use separate tools one set of tools to manage real-time, and another to manage historical data. This approach also has limitations for the amount of data that can be analyzed so while the data stored may meet retention requirements, the ability to actually analyze and cross-correlate across the stored data is often severely limited.

I need to collect events from 100’s of Windows servers without agents and support the latest Windows version? Can Logit360 do that?

Logit360 is deployed using a scalable architecture.  Multiple collectors can be deployed and connected to clustered worker nodes in our cloud solution.  This spreads the load over multiple worker nodes.

My current SIEM system can only correlate and alert within 1 system. As I deploy event collection on servers or collect Netflow from routers, I need to deploy multiple SIEM systems and need to correlate across them. Does your architecture support this?

Logit360 can do real time global cross-correlation across geo locations. One simple way to do this would be to filter and forward all events to the supervisor node, but that would slow down the supervisor node. Logit360 employs a novel summarized information exchange mechanism where the worker nodes do the pre- processing of the events and only sends summarized values to the supervisor node, which can then do final analysis and trigger alerts. The entire category of rules can be parallelized this way by the Logit360 clustered system and provides customers a way to scale event processing and alerting

As I see an IP address in my dashboard or alert, I would like to know the user behind that IP and the user’s network location if it is an internal one, or learn about the owner, domain etc from internet sites for external IPs. Can Logit360 do this?

Logit360 provides full identity and location information for IP addresses both external and internal, and in real time. For internal IP addresses, Logit360 derives the identity information by combining Active Directory discovery, domain logon information, DHCP events, Wireless and VPN logons and the location information from Wireless and VPN logons and Logit360s own layer 2 discoveries. The challenge here is that each source of information is partial, e.g. DHCP address assignments provides (IP Address, MAC address and Host name), domain logon provide (IP Address, Host name, User name) etc. The various pieces need to be stitched together into one consistent identity and location entry and it should also dynamically reflect the changes as they occur as the user moves around. Logit360 has a novel in-memory database based approach for merging the pieces various identity and location information on a first and last seen time basis. This contextual information is available to the user for every IP address displayed on the user interface. Logit360 binds the user identity and location information to events to allow for historical analysis.

For an external IP address, Logit360 provides information such as geo-location, whois lookup and trace-route information. With a single click, administrator can find out whether this IP is a part of known spam databases using tools like SAN StormCenter, Cisco Senderbase or HoneyPot database.

How do I prioritize my alerts in Logit360?

Logit360 has the notion of a business service that is a smart container of network devices, servers and applications serving a common business purpose. Every incident is tagged with the affected business service and can be used to prioritize incidents. Logit360 goes beyond traditional event severity by providing users business impact context to incidents.

As I investigate my incidents, I would also like to add additional context. For example, when there are lots of denied connections to a server, I would like to know the CPU and memory usage on the server as well as the changes that happened on the server in a preceding time period. Can I quickly do that in Logit360 UI itself or do I have to jump to another console?

This is easily possible in Logit360 since all aspects of a device are monitored. All the user needs to do is to discover the device and set up monitoring. Then the basic system level CPU/memory/disk space/disk I/O/network interface utilization, the top applications consuming most resources on that server as well as the changes made on that server are all available within 1 click. The information is also kept up to date on a periodic basis.

I would like to customize various dashboards and create reports in various formats that I can show to my management. What capabilities does Logit360 provide for me to be able to do this?

Logit360 supports the exporting of real-time, historic and saved search results / reports in both PDF and CSV formats. The PDF reports contains multiple colored trend charts and can be customized with customer logos and custom notes. The CSV format can be exported directly into spreadsheet products or can be used to feed to other applications easily. Furthermore, saved reports are available as templates that can be used as dashboard widgets enabling fully customized dashboards.

How flexible is your reporting framework? How many system reports do you ship with the product? Can I issue a simple Google-like search to find keywords in order to perform root cause analysis?

Logit360 features an advanced SQL-like search and cross-correlation engine with multiple patterns and advanced filtering and aggregation capabilities that can be computed in a distributed manner. This enables support of IT infrastructure, availability, performance, change and security scenarios, as well as allowing compliance requirements to be handled in a unified manner.
Logit360 ships with more than 1000 (and growing) of built-in and extensible reports spanning availability, performance, security and change management, as well as compliance and inventory.

We support simple keyword Google-like searches with operators such as AND, NOT, etc, and also feature the capability of searching through real-time event data using either structured (condition-based), or simple keyword queries

What is your database architecture and how scalable is it? Do I need to worry about purging and other issues? Can I add more storage capacity to the system as I expand my data centers? How good is the system performance when you have millions of events coming in and are performing queries on the data simultaneously?

Logit360 uses a hybrid database, storing events in indexed flat-files, and storing device configuration in an embedded commercial relational database (PostgreSQL). Logit360s vendor has a patent-pending, multi-tiered, clustered architecture, where computing and storage can be seamlessly added to the cluster to increase performance and event storage capacity. This combination of proprietary database and parallel processing gives Logit360 the dual advantage of unlimited low cost storage and high event analysis performance that other monitoring solutions strive for.

How good is Logit360’s support for 3rd party devices? What’s your framework for supporting 3rd party devices/applications? I want to add support for a new device what do I need to do?

For our data center and cloud monitoring solution to be useful for availability, performance, security, change and compliance, we need to support the heterogeneous environment that reflects a real data center with best-of-breed equipment from various vendors. So we are committed to supporting third party software and device in a timely fashion.

Since Logit360 monitors all aspects of a data center, our support for a single device or application tends to be comprehensive, ranging from auto discovery to categorization and normalization of SNMP traps, syslogs, netflow, WMI metrics and other event/ protocol formats concerning availability, performance, security and change. While a significant majority of Tier 1 and 2 vendors are already supported, we are continuously adding new device support and keeping the existing device support up to date.

There are some technical innovations that we have developed to accelerate the device support process. Typically, there are two ways to add device support – custom coding and scripts.
Custom coding involves parsing the device information within the shipping product code (Java or C++, within the main code or via an SDK in an agent). Scripts typically reside outside the main product code. The main tradeoff between custom coding and scripts is performance and flexibility. Scripts are flexible but custom coding gives you performance a perl based program designed to parse Netflow data or firewall logs would certainly not be able to keep with the event rate for high-end routers/fire- walls.

However, Logit360s product has developed a unique XML based scripting language through which comprehensive device support can be added without sacrificing performance.

While XML based parsing definitions exist in other products (such as Splunk), Logit360s XML parsing language has the power of programming languages (e.g. if-then-else, switch-case, temporary variables, etc) that makes comprehensive device support possible. In addition, we have developed a XML compiler and execution environment that enables Logit360 the means to execute the XML code without losing performance. In fact all our device support is written using the parsing XML language. The Logit360 device support library includes a large number (over 1000 and growing) of parsed event attributes that encompasses events and logs from various IT management domains. This enables flexible support for a wide range of devices. More importantly, this is done without losing event processing performance and storage efficiency.

These technological innovations enable rapid and flexible device support. All it takes is to modify an existing parser XML file or create a new parser XML file and add it to the Logit360 system. In this way, new versions of supported devices can be easily added since they simply often add a few new logs. Logit360 has access to a dedicated team focused on device support, allowing us to provide high-quality and timely coverage.

How is Logit360s reporting performance? And what if I need even faster processing?

The slowness in query response times in many SIEM products often comes from the use of a relational database. While relational database are easy to build a SIEM system around, the read-only monitoring data is ill-suited for relational database because of the following reasons

  • If data is inserted at high event rates (e.g. when dealing with firewall, netflow or Active Directory data), the database limit is quickly reached, causing the vendors to archive old data. In many systems, only a few months of data can be kept in a relational database. The effect is that another system needs to be brought up to analyze at the old data.
  • Event data may require many attributes (over a few hundred) to be parsed; a relational database table with so many columns can be unwieldy and causes performance and storage inefficiencies (also known as degradation and bloat).
  • Parallelizing a relational database for faster query performance is a non-trivial matter, both in terms of cost and implementation and maintenance complexity

On the other hand, the discovered information about devices, systems and applications (so called CMDB) is highly structured, updated often, data that merits a relational database.

Logit360s product has developed a hybrid data management system that stores unstructured event data in flat file based database and structured CMDB data in an embedded commercial relational database (PostgreSQL). A data management layer unifies the two data management technologies and presents a single relational database like interface and the best of both worlds is achieved. As an embedded RDBMS, the system does not require administrative tuning / index optimization.

More importantly, the ability to store events in a flat file database also enables query parallelization and solves the slow reporting problem. The Logit360 solution is deployed in a hierarchical supervisor-worker setup as explained previously. The supervisor node divides a query into many sub-queries, distributes the sub-queries to the worker nodes, and creates the final query result by combining the results from the various worker nodes. Since the flat files are stored in NFS on a separate system, instant query response time reduction can be obtained by simply bringing up additional worker nodes.

I need a flexible rules architecture so that I can change firing frequency, and create more sophisticated rules to catch security incidents. For example, “3 login failures followed by a success within a 10 minute time window”, or “multiple login failures not followed by a success to the same system within a 1 day time window”. Does the Logit360 rule architecture support this?

Logit360 contains a sophisticated rule framework that can support anything from simple threshold performance rules, to highly complex security rules, all with a simple user interface. It supports the following constructs:

  • More than 1000 event attributes with which to form rule conditions
  • Operators such as equals, greater than, IN, CONTAINS, BETWEEN, IS and their negative conditions
  • Ability to create multiple sub-patterns then combine them using the temporal operators: AND, OR, FOLLOWED_BY, OR_NOT, AND_NOT, and NOT_FOLLOWED_BY
  • Ability to create exceptions to rules in order to fine-tune their output
  • Ability to exclude rules from firing during specific time ranges
  • Ability to send business policy based alerts on resulting incidents, thus sending the right kind of alert to the right person. Alerts can be sent via email, SMS, SNMP Traps or XML via HTTP.

Logit360 supports both simple and advanced work-flows when creating or editing rules.

Click here to add your own text