Leading Source for UK Technology News & Insights
Navigate the Digital Frontier with Resilient Cybersecurity Expertise
Our comprehensive Security Information and Event Management (SIEM) solution provides real-time visibility into your network, empowering you to detect, investigate, and respond to security incidents swiftly and effectively.
By centralizing log data from diverse sources, SeerSIEM enables you to analyze security events, identify anomalies, and detect advanced threats. With advanced analytics and machine learning capabilities, our solution automatically prioritizes critical alerts, reducing alert fatigue and enabling rapid response.
Throughput: Up to 10 GbE (Gigabit Ethernet)
Concurrent sessions: Up to 5 million concurrent sessions without packet loss
Behavioral anomaly detection: Detects new and unknown attacks using anomaly detection methods based on learning.
Comprehensive set of attack:
GUI: Web based graphical user interface.
Auto detect application-layer protocols:
Network traffic monitoring: Defines charts of packet rate, flow rate and volume usage in various time periods for different application layer protocols and add them to dashboards.
Support Netflow: Receives and processes Netflow reports.
Traffic flow analysis: Analyzes the traffic flow information and extracts new attack evidences.
Throughput: Up to 10 GbE (Gigabit Ethernet).
Detect Zero-day attacks:
Supporting various sensors: Supports adding new organization’s applications to receive their logs.
Throughput: To be able to process Up to 20 thousands event per second on one appliance and scalable for higher rates.
Supported Sensors: Unlimited sensor numbers are supported.
Event filters: It is possible to define arbitrary filters logs according to organization security policies.
Compression rate: The logs is compressed by 10:1 rate.
Secure transmit: The security of the data is fulfilled by providing confidentiality and integrity of connections between modules.
Reliable transmit: Using a cache for retaining received logs temporarily to prevent data loss in network disconnection.
Event Per Second: Receive and store up to 50,000 EPS.
Long Retention period:
Data encryption: Encrypts stored data in archive to prevent unauthorized access to data.
Message Exchange Format: IDMEF and IODEF formats are supported.
Real time Data Retrieval: Facilities for searching and real-time retrieval of archived data based on various parameters.
External Storage: Supports the storing of data for long term archive on a external storage such as SAN and NAS.
Real-time analysis: Upon completion of the attacks symptoms, Immediately is reported.
Multistage correlation:
Cross-Device Correlation: Logs of network services and devices is analyzed and correlated with alerts of security applications and devices.
Eliminate of FP: Detect and eliminate false positive alerts if corresponding vulnerabilities is not exist in attack targets.
Efficient engine: The correlation engine does not miss attacks while reduces very high percent of reported events.
Predefined correlation rules:
Behavioral abnormal analysis: Detect abnormal events by statistical analysis of logs.
Supported Rules: The number of supported rules is Unlimited.
Event per second throughput:
Visual attack graph:
Integrated knowledge base:
Incident handling process:
Interaction with human teams: supports interaction with CERT, NOS and forensics teams.
Incident handling guidelines: