Cloud Security Management

Syntax have a solution for Cloud Security. It is perfect for customers with cloud applications, perimeter network security devices, network infrastructure, hybrid computing environments and server/ desktop estates.

Find out more about how we can help you with all your cloud security and log management needs
Call today on 020 7307 5008

Contact form

The Problem we solve

Network perimeter security is no longer effective in a cloud world, as compromise is not detected by traditional on-premise security appliances, information security systems or scanning services.

By using phishing and social engineering techniques, attackers are easily bypassing perimeter defences and becoming insiders.

Credential Theft and ‘Pass-the-Hash’ lies behind most cyber-attacks today (1). 81% of hacking breaches leverage stolen passwords (2).

The compromise is not easily identified as the usage appears to be normal – user credentials are often shared between email, applications and data stores, and are susceptible to lateral attacks.

The impact of credential theft is instant and costly – leading to theft of data, reputational loss and targeted whaling attacks.

Customers are looking for cost effective solutions to monitor, alert and investigate compromised systems within their cloud and on-premise estate.

1 Source: Information Age  
2 Source: Verizon 2017 Data Breach Report

Tackling the problem

Syntax Cloud Forensics gives you visibility from comprehensive log data and uses forensic analysis to identify and combat credential theft.

Our incident responders are searching for tell-tale signs of infiltration such as IP GEO changes, new forwarding rules, login attempts, DNS reconnaissance, lateral movement, privilege, and domain escalation.

The use of structured techniques to analyse user and entity behaviour – to establish the extent of post-infiltration activity – is an essential part of the assumed breach response.

 

how syntax cloud threat security works

Importance of file log analysis

Maximum logging is required for maximum visibility and maximum visibility requires real-time observation of comprehensive log data. We provide developers and operations teams to send and obtain instant visibility to all their relevant log data to one tool.

Comprehensive logging is critical as it provides the active data pool repository for analysis of transactions, errors and the foundation for incident responders to carry out intrusion detection and forensics.

For this reason, information security experts recommend real-time, comprehensive logging as the foundation for maximising IT security effectiveness.

Our real-time log engine delivers high performance by design. This enables unrestricted streaming and ingest of log data to support comprehensive event analysis.

This is the only log solution that aggregates logging, provides holistic system visibility to reduce downtime and risk from security threats. Examples of log data sources include Office 365, Azure AD, Microsoft Dynamics, on-premise Windows logs, syslog and JSON.

 

cloud threat security

Key Features

Realtime Log Management / API
A combination of real- time log management and API based connectors to enable the collection of Microsoft Office 365, AD Security audit and any other cloud system logs

Forensic Capability
The Syntax solution has forensic capability to monitor for suspicious activity, investigation of suspect systems and real-time visibility of potential malicious activity

Next Generation Log Engine
Next generation log engine delivers real-time performance at a fraction of the cost of legacy log tools or security appliances

Hybrid Capability
The solution can be extended to hybrid deployments and Windows desktop and server estates to monitor for malicious activity and zero-day exploits within the network perimeter

Key Benefits

Multiple Sources
By combining logs from multiple sources including Office 365, Windows and AD servers the solution provides comprehensive system visibility based on detailed log collection and analysis

MTTD Reduction
The solution reduces the Mean Time To Detection (MTTD) of breaches and provides a cost-effective solution for organisations that do not want to implement and manage log management solutions

MTTR Reduction
The Mean Time To Respond (MTTR) is reduced by real-time analysis of logs, identifying and detecting suspicious behaviour at its first instance

Reputational Risk Reduction
The solution reduces the potential reputational risk associated to an in-house phishing attack on its customers

Managed Service
The solution is provided as a managed service with no need to invest in monitoring systems or SecOps resources

Find out more about how we can help you with your IT requirements

Call today on 020 7307 5008

contact us