Protecting Digital Evidence to Uncover Digital Crimes
Unprotected Log Data Makes A Bad Situation Worse
Traditional web-based systems attract a wide variety of attack vectors. A vulnerability often exploited is the improperly configured database or cloud. When set to operate on default settings it can leave your system totally exposed to attacks.
This is bad enough, but before any smart intruder exits your system, they cover their trail by deleting valuable audit and system log data, and, like a thief in the night, they are gone.
It takes roughly 197 days between time of attack and time of discovery. And even with the knowledge of compromise, don’t expect to learn much, given the destruction or manipulation of unprotected log data.
LogSecure Forensically Protects Immutable Logs for Monitoring and Auditing System Events
SpiderOak’s LogSecure provides organizations with forensically secure, immutable logs for monitoring and auditing system events
LogSecure allows administrators to quickly identify discrepancies in logs which are the telltale signs left behind by bad actors or inside threats who use modified logs to cover their tracks.
When combined with network monitoring, LogSecure allows for an immersive view of system events, user activities, and the integrity of the system.
The LogSecure Advantage
A New Approach to Data Protection
LogSecure leverages Zero Knowledge encryption and Distributed Ledger capabilities to render entire categories of vulnerabilities obsolete, and to extend a level of protection to remote work unachievable until today.
LogSecure Benefits Include:
- Pinpoint and limit security impacts quickly
- Review logs remotely via secured compartments
- Precisely control access to logs for sensitive systems
LogSecure Features & Functions
End-to-End Encryption (No Knowledge)
LogSecure encrypts everything using NSA CNSAS cryptography. Keys to ciphers are held only by endpoints with a need to know, never by the server or administrators. LogSecure may be configured to use a specified algorithm, or even interface with hardware-based encryption modules.
LoLogSecure is built on a cryptographically authenticated distributed ledger that allows the past to be exactly reflected in the ledger, without worry of alteration. These logging capabilities mean that the state of this system can be reviewed, and access to data can be precisely defined, for any time within the system’s history – giving nearly unprecedented insights during security reviews.
LogSecure allows authenticated, authorized users (and only authenticated, authorized users) to export logs to encrypted compartments to prevent interreference after discovery. These compartments can be used only by those who have been given access by the creator, and are not generally accessible by all administrators.