Assuria CyberSight ingests heavily enriched log and event data from ALM-SIEM and provides massively scalable and flexible big data analytics and threat hunting functionality, extending the powerful and automated rules based analytics within ALM-SIEM. CyberSight provides security analysts with powerful threat hunting capabilities through unlimited access and insight into log and machine data and external threat intelligence.
How CyberSight works
CyberSight provides real time complex experimental search and visualisation capabilities, along with deep dive forensic investigative features to provide deep visibility into potential threats, attacks and undesirable activity. The Big Data Analytics architecture allows analysts to create, evolve and save almost any kind of search and query of ALM-SIEM collected system and log machine data, for almost any purpose.
See how CyberSight works with our short video!
Assuria’s Next Generation SIEM Security Big Data Analytics Solution
Information At Your Fingertips
Cybersight’s new analytics allow you to identify the information you need, quicker, faster and more efficiently than ever before. New query tools allow you to create use simple or complex criteria to view your log data in new and exciting ways.Read more
Force Directed Graphs
Explore your data connections for suspect patterns. By finding relationships between event attributes allows the uncovering of hidden patterns and normal behaviors within event data. By graphically plotting relationships you can rapidly visualize normal activity and identify unexpected interactions, allowing more focused exception reporting.Read more
Investigate your data using threshold and outlier analysis. By understanding the relative occurrence or frequency of behaviors on your systems it gives you a more accurate detection of anomalies. By discovering the normal or expected patterns of activity, you can identify exceptions to these patterns based on evidence rather than rule-of thumb thresholds.Read more
Use hierarchical sunburst analysis to explore data over time. Finding time-based patterns of behavior can be complex in large data-sets. Using a multi-tier starburst visualization, you can easily drill-down through time periods and hierarchical event attributes, such as users or systems. You can do this to identify unusual occurrences or peak periods of activity.Read more
Search events using free text or regular expressions. You can search for a given user, machine or file name. Narrow your search by using event tags/field values, standard true, false, and standard comparison operators. Or search across your complete log store.Read more
Examine raw, original or tagged log data and then refine using on-the-fly queries. Save these queries for further analysis or use them to create dashboard widgets or custom reports.Read more
CyberSight is Assuria’s new SIEM Big Data Security Analytics solution
Assuria CyberSight is built upon ALM-SIEM, Assuria’s CESG CCTM Accredited Forensic SIEM/Log Management solution as used by government agencies, major commercial organisations, local government departments and IT service providers worldwide to deliver IT security intelligence and visibility of system activity to the people who need it.
CyberSight enriches log data provided by ALM-SIEM and provides massively scalable and flexible big data analytics functionality to extend the powerful and automated rules based analytics within ALM-SIEM to allow security analysts unlimited access and insight into log and machine data.