LOGSECURE LOGO WHITE FINAL2

Cryptographically Secure Logs for Secure Network Monitoring and Logging

LogSecure allows administrators to quickly identify discrepancies in logs which are the telltale signs left behind by bad actors or inside threats who use modified logs to cover their tracks.

Protecting Digital Evidence to Uncover Digital Crimes

crossclave graphic 3

Unprotected Log Data Makes A Bad Situation Worse

Traditional web-based systems attract a wide variety of attack vectors. A vulnerability often exploited is the improperly configured database or cloud. When set to operate on default settings it can leave your system totally exposed to attacks.

This is bad enough, but before any smart intruder exits your system, they cover their trail by deleting valuable audit and system log data, and, like a thief in the night, they are gone.

It takes roughly 197 days between time of attack and time of discovery. And even with the knowledge of compromise, don’t expect to learn much, given the destruction or manipulation of unprotected log data.

LogSecure Forensically Protects Immutable Logs for Monitoring and Auditing System Events

SpiderOak’s LogSecure provides organizations with forensically secure, immutable logs for monitoring and auditing system events

LogSecure allows administrators to quickly identify discrepancies in logs which are the telltale signs left behind by bad actors or inside threats who use modified logs to cover their tracks.

When combined with network monitoring, LogSecure allows for an immersive view of system events, user activities, and the integrity of the system.

 

logsecure graphic2

The LogSecure Advantage

businesswomen data security2 (working copy) copy

A New Approach to Data Protection

LogSecure leverages Zero Knowledge encryption and Distributed Ledger capabilities to render entire categories of vulnerabilities obsolete, and to extend a level of protection to remote work unachievable until today.

LogSecure Benefits Include:

  • Pinpoint and limit security impacts quickly
  • Review logs remotely via secured compartments
  • Precisely control access to logs for sensitive systems

LogSecure Features & Functions

End-to-End Encryption (No Knowledge)

LogSecure encrypts everything using NSA CNSAS cryptography. Keys to ciphers are held only by endpoints with a need to know, never by the server or administrators. LogSecure may be configured to use a specified algorithm, or even interface with hardware-based encryption modules.

Irrefutable Logging

LoLogSecure is built on a cryptographically authenticated distributed ledger that allows the past to be exactly reflected in the ledger, without worry of alteration. These logging capabilities mean that the state of this system can be reviewed, and access to data can be precisely defined, for any time within the system’s history – giving nearly unprecedented insights during security reviews.

Precise Control

LogSecure allows authenticated, authorized users (and only authenticated, authorized users) to export logs to encrypted compartments to prevent interreference after discovery. These compartments can be used only by those who have been given access by the creator, and are not generally accessible by all administrators.

servers

Next Steps

To learn more about LogSecure and all of SpiderOak's secure communications, collaboration, back-up and storage products please contact us below:







LOGSECURE LOGO BLACK FINAL 2
NEXT STEPS
Encryptr will be discontinued on 2021-03-04. Learn how to export your data and find an alternativeLEARN MORE