CYBERSECURITY SIEM OVERVIEW

All the standard SIEM features plus powerful, no constraints proprietary features including visual attack maps, unlimited packet capture, network event analysis, no hardware, and no sofware licenses.

SIEM – All standard features plus more proprietary features

  • Threat Detection Monitoring and Alerts
  • Intrusion Detection System (IDS)
  • Custom Reporting & Visualization
  • System Events & Message Collection
  • Log Retention
  • Business Intelligence & Analytics Collection
  • Network Event Analysis

“Veritas Cyber is being referred to as NSA-in-a-Box.”

Attack Maps - Learn More

Attack Map Visuals

Custom attack maps and monitors provide data visualization for fast responses.

  1. Customize Cybersecurity Attack Map Monitors to meet your business needs.
  2. Filter any specific data such as country of origin attacks, network owner names, exact geography, attack types and more.
  3. Create alerts based on criteria you set.

Unique Proprietary Features

  • Enterprise scalability to capture and analyze billions of events per day and convert it into meaningful human-readable text
  • Ability to do historic forensic audits of user behavior on hundreds of billions of records
  • Proprietary Attack maps, attack & event analysis, visualizations and alerts
  • Launch Counter-Attacks Versus Bad Actors, Country and Bad Actors IP Blocking
  • Identify and pin-point location, AS number and profile of attack
  • Analyze real-time and past data with no limitations on historical capacity
  • Unlimited Packet Capture & Analysis, Network Event Analysis, & Intrusion Detection
  • Cybersecurity API

Managed Intrusion Detection System - Learn More

DUAL IDS ENGINES

Monitor, scrub, and store data on your network.

  • Firewalls
  • Routers
  • Switches
  • Linux Servers
  • Windows Servers
  • VOIP Phones
  • Any Application