Discover

View your data patterns using statistical analysis, force directed graphs, Sun burst time analysis and geo location.

Explore

Investigate discovered log data by refining queries by either a standard taxonomy or raw event fields. Customize your data view to only display the information you need.

Focus

Enrich your log data with asset, threat, geo location, identity and behavior analysis. Query using people rather than user accounts, assets or geo location instead of IP addresses or host names.

Visualize

One you have discovered activity your wish to monitor, save your query, transform it as a dashboard widget or export it to a custom report.

How cybersight works

CyberSight provides real time complex experimental search and visualisation capabilities, along with deep dive forensic investigative features to provide deep visibility into potential threats, attacks and undesirable activity. The Big Data Analytics architecture allows analysts to create, evolve and save almost any kind of search and query of ALM SIEM collected system and log machine data, for almost any purpose.

See how CyberSight works with our short video!

 

CyberSight

Assuria’s Next Generation SIEM Analytics Solution

Information At Your Fingertips

18/08/2017

Information At Your Fingertips

Cybersight’s new analytics allow you to identify the information you need, quicker, faster and more efficiently than ever before. New query tools allow you to create use simple or complex criteria to view your log data in new and exciting ways.

Read more

Force Directed Graphs

18/08/2017

Force Directed Graphs

Explore your data connections for suspect patterns. By finding relationships between event attributes allows the uncovering of hidden patterns and normal behaviors within event data. By graphically plotting relationships you can rapidly visualize normal activity and identify unexpected interactions, allowing more focused exception reporting.

Read more

Statistical Analysis

18/08/2017

Statistical Analysis

Investigate your data using threshold and outlier analysis. By understanding the relative occurrence or frequency of behaviors on your systems it gives you a more accurate detection of anomalies. By discovering the normal or expected patterns of activity, you can identify exceptions to these patterns based on evidence rather than rule-of thumb thresholds.

Read more

Time Analysis

18/08/2017

Time Analysis

Use hierarchical sunburst analysis to explore data over time. Finding time-based patterns of behavior can be complex in large data-sets. Using a multi-tier starburst visualization, you can easily drill-down through time periods and hierarchical event attributes, such as users or systems. You can do this to identify unusual occurrences or peak periods of activity.

Read more

Textual Search

18/08/2017

Search events using free text or regular expressions. You can search for a given user, machine or file name. Narrow your search by using event tags/field values, standard true, false, and standard comparison operators. Or search across your complete log store.

Read more

Examine

18/08/2017

Examine raw or tagged log data and then refine using on-the-fly queries. Save these queries for further analysis or use them to create dashboard widgets or custom reports.

Read more

CyberSight is Assuria’s new SIEM Big Data security analytics solution

Assuria CyberSight is built upon ALM SIEM, Assuria’s CESG CCTM Accredited Forensic SIEM/Log Management solution as used by government agencies, major commercial organisations, local government departments and IT service providers worldwide to deliver IT security intelligence and visibility of system activity to the people who need it.

CyberSight enriches log data provided by ALM SIEM and provides massively scalable and flexible big data analytics functionality to extend the powerful and automated rules based analytics within ALM SIEM to allow security analysts unlimited access and insight into log and machine data.