SECURITY LOG MONITORING

Sophisticated log ingestion, monitoring and event correlation with a powerful data analysis engine and SOC monitoring for rapid threat insights.

Protect your organization

from cyber attacks

It is not enough to collect logs and alerts on possible breaches. Security Log Monitoring tracks incidents in real time, applies advanced analytics, categorizes them and sends them to experts for review. We then investigate and prioritize leads and events for deeper analysis or immediate action.

Man and woman working on a laptop at a standing desk in a brightly lit office space

Benefits

Threat Detect

Gain immediate visibility

We help you achieve a deeper understanding of your security posture by applying a more strategic approach to threats and focusing on the most critical issues.

Gain immediate visibility

We help you achieve a deeper understanding of your security posture by applying a more strategic approach to threats and focusing on the most critical issues.

Total Solution

Continuous infrastructure monitoring

The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all your devices, endpoints, systems and networks.

Continuous infrastructure monitoring

The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all your devices, endpoints, systems and networks.

Efficiency

The flexibility to fit your needs

Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, Lumen can accommodate you.

The flexibility to fit your needs

Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, Lumen can accommodate you.

Illustration of an orange shield with a white globe icon on the front

Features and Specs

  • Single sign-on service with support for multifactor authentication
  • 24/7 monitoring, proactive customer notification and escalation of items of interest
  • Intuitive dashboard with customizable widgets for leads, investigations, ingestion rate and an interactive map
  • Seven years of backup and storage, and visibility of up to 12 months of full-text indexed, searchable log data to investigate and provide deep context to threat trends
  • Advanced asset risk profiling and unique risk-based alert process combining automation with rigorous human review to evaluate multiple transaction types: CEF, syslog, LEAF and a variety of other standard log types
  • Correlation from multiple streams of data — pulling insights from both real-time events and our ATI-curated threat intelligence to detect threats with greater fidelity at the earliest stages
  • Dedicated delivery lead to oversee coordination of the onboarding process

  • Security Analytics: Access advanced search capabilities and extend threat detection visibility to the last 12 months, making low and slow attacks easier to recognize.
  • Threat Intelligence: Dig deeper into log data with intelligence from community feeds, social media searches, dark web searches, honey pot infection records and third-party research.
  • SOC Monitoring with Incident Handling: Leverage our team of experts to reduce resource and infrastructure costs. As incidents are detected, our analysts will escalate them and provide transparent access to the same event console.
  • Cloud Security Monitoring: Get visibility into cloud environments and accounts, applying best-practice controls to cloud service configurations.

  • Predictable, consumption-based pricing model-based on volume of security-related data transmitted per day, eliminating capital expense, administration and maintenance costs
  • Flexible implementation models including comanaged and maintained by Lumen
  • No implementation costs or licensing fees for log collection appliances. 

Resources