LogSentinel SIEM is a next-gen Security Information and Event Management (SIEM) system offering simplicity, predictability, and innovation like nobody else. By leveraging the latest technologies like blockchain and AI, it helps organizations of all sizes and industries to eliminate their blind spots and reduce the time and cost of incident detection and investigation.
LogSentinel SIEM offers one-of-a-kind security innovation: privacy of logs, audit log integrity, unlimited retention, and full visibility, all at a flat and predictable fee. Our zero-setup cloud SIEM, our open-source agent, and built-in CASB can handle every system and every setup (local, cloud, legacy systems, on-prem, or cloud infrastructure) even in complex organizations.
In other words, LogSentinel offers a solution that was previously thought to be only fit for large enterprises, to customers that could not have afforded it, and who are left vulnerable because of that – due to licensing costs, implementation complexities, the need for full-time security analysts to get value out of it, or lack of support for their legacy systems. The architecture and flexibility of the product allow us to give them an enterprise security tool in a way they can afford and manage. And we're happy to help SMEs in their security efforts because the world won’t be more secure if a few large companies buy every security product out there. It'll be more secure if every enterprise has access to the best tools.
Based on our record, Microsoft Azure Active Directory should be more popular than LogSentinel. It has been mentiond 15 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Human users using Roles can leverage IAM Identity Center (formerly AWS SSO) which offers a pretty good experience, whether we're federating from Active Directory (a popular choice for enterprises) or managing users within Identity Center (fine for individuals or small team). We get an easy console sign-in experience and similarly frictionless command line access. - Source: dev.to / 12 months ago
The question is tagged Azure-Active-Directory, which is an IAM/IDP product. That provides plenty of context. Source: about 1 year ago
Because the configuration is a highly critical feature, we need to authenticate via an API key or by means of other auth methods. For example, most API Gateway providers such as Apache APISIX enabled token-based access to Admin API and they highly advise generating your own token and regularly changing it. Or Azure API Management relies on Azure Active Directory (Azure AD), which includes optional features such as... - Source: dev.to / over 1 year ago
I will not explain too much about Azure AD. I'll recommend reading the documentation and the home page of the Azure AD. In short, Azure AD (Azure Active Directory) is a cloud-based identity and access management service. You can use the identity provided by Azure AD for connecting various applications or services, including AWS. If you want to learn more about Azure AD, please visit the documentation. - Source: dev.to / over 1 year ago
It is a directory with a lot of functionality. There's actually a number of products under the Azure AD name, including: * Azure AD, their employee/workforce solution. It's a directory, authentication and authorization system. Think Okta or AWS SSO. I imagine this is mostly what the survey was tracking. * Azure AD B2C, their CIAM solution. Think Auth0, Cognito or FusionAuth (disclosure, I'm a FusionAuth employee).... - Source: Hacker News / over 1 year ago
Well I dumbed it down a bit, the company is called https://logsentinel.com/ . It's an SIEM system to prevent cyber-attacks. Source: over 2 years ago
I wonder what "blockchain" means here. The word is all over https://logsentinel.com/ but it may be just to make "immutable audit trail" more buzzwordy. In 2017 they posted a skeptical https://techblog.bozho.net/blockchain-its-all-greek-to-me/ which in linked to from very recent https://techblog.bozho.net/digital-transformation-and-technological-utopianism/ > Technology alone will not solve anything. And my... - Source: Hacker News / over 2 years ago
Okta - Enterprise-grade identity management for all your apps, users & devices
Event Log Explorer - Windows event log viewer software. Windows event log analysis, view and monitor security, system, and other logs on Windows servers and workstations
Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.
TrueVault - TrueVault is a HIPAA compliant database as a service. Healthcare applications use TrueVault to store protected health information (PHI). TrueVault provides all client-side and server-side functionalities required by HIPAA.
OneLogin - On-demand SSO, directory integration, user provisioning and more
MyEventViewer - MyEventViewer is a simple alternative to the standard event viewer of Windows.