Assuria CyberSight provides all of the power of ALM-SIEM and extends its capabilities to provide massively scalable and flexible big data analytics and threat hunting functionality through tight and automated integration with ElasticSearch©. It extends the powerful and automated rules based advanced correlation and security analytics features within ALM-SIEM, allowing access to external AI/ML and SOAR features where required. CyberSight provides security analysts with powerful threat hunting capabilities through unlimited access and insight into log and machine data and external threat intelligence.
Auto Monitor
Explore
Enrich
Visualize
How CyberSight works
CyberSight provides real time complex experimental search and visualisation capabilities, along with deep dive forensic investigative features to provide deep visibility into potential threats, attacks and undesirable activity. The Big Data Analytics architecture allows analysts to create, evolve and save almost any kind of search and query of ALM-SIEM collected system and log machine data, for almost any purpose.
CyberSight
Assuria’s Next Generation SIEM Security Big Data Analytics Solution
Information At Your Fingertips
18/08/2017
Cybersight’s new analytics allow you to identify the information you need, quicker, faster and more efficiently than ever before. New query tools allow you to create use simple or complex criteria to view your log data in new and exciting ways.
Read moreForce Directed Graphs
18/08/2017
Explore your data connections for suspect patterns. By finding relationships between event attributes allows the uncovering of hidden patterns and normal behaviors within event data. By graphically plotting relationships you can rapidly visualize normal activity and identify unexpected interactions, allowing more focused exception reporting.
Read moreStatistical Analysis
18/08/2017
Investigate your data using threshold and outlier analysis. By understanding the relative occurrence or frequency of behaviors on your systems it gives you a more accurate detection of anomalies. By discovering the normal or expected patterns of activity, you can identify exceptions to these patterns based on evidence rather than rule-of thumb thresholds.
Read moreTime Analysis
18/08/2017
Use hierarchical sunburst analysis to explore data over time. Finding time-based patterns of behavior can be complex in large data-sets. Using a multi-tier starburst visualization, you can easily drill-down through time periods and hierarchical event attributes, such as users or systems. You can do this to identify unusual occurrences or peak periods of activity.
Read moreTextual Search
18/08/2017
Search events using free text or regular expressions. You can search for a given user, machine or file name. Narrow your search by using event tags/field values, standard true, false, and standard comparison operators. Or search across your complete log store.
Read moreExamine
18/08/2017
Examine raw, original or tagged log data and then refine using on-the-fly queries. Save these queries for further analysis or use them to create dashboard widgets or custom reports.
Read moreCyberSight is Assuria’s new SIEM Big Data Security Analytics solution
Assuria CyberSight is built upon ALM-SIEM, Assuria’s CESG CCTM Accredited Forensic SIEM/Log Management solution as used by government agencies, major commercial organisations, local government departments and IT service providers worldwide to deliver IT security intelligence and visibility of system activity to the people who need it.
CyberSight enriches log data provided by ALM-SIEM and provides massively scalable and flexible big data analytics functionality to extend the powerful and automated rules based analytics within ALM-SIEM to allow security analysts unlimited access and insight into log and machine data.