Unified XDR & SIEM Protection for Endpoints & Cloud

DefenseBolt unifies historically separate security functions into a single agent and platform architecture — protecting endpoints, cloud workloads, and on-premise data centers.
1 +
Security events monitored daily
1 +
Security capabilities
1
Compliance frameworks

Security Events Dashboard

Total Events

179,847

L12+ Alerts

6

Auth Failures

33,983
Auth Success
62

RECENT SECURITY ALERTS

Defense Evasion — Windows

Brute Force — SSH

Password Guessing

Introduction

What is SIEM and Why Does Your Organization Need It?

Organizations today have various endpoints running multiple services. Even a small-scale organization has 10–20 systems generating constant logs. The challenge isn’t big data — it’s analyzing and utilizing it. These endpoints generate events crucial for detecting critical security violations and attacks. Organizations adopt SIEM solutions to tackle this exact problem.

Two Key Terms to Understand SIEM

Security Event Management – Deals with collecting logs from all endpoints across your infrastructure in real time.

Security Event Management – Deals with collecting logs from all endpoints across your infrastructure in real time.

SEM + SIM = SIEM

Security Information & Event Management

Endpoint & Cloud Workload Protection

One Agent. Complete Coverage.

DefenseBolt unifies historically separate security functions into a single agent and platform architecture — delivering comprehensive protection across all environments.

Public Cloud Protection

Full security coverage for AWS, Azure, GCP workloads with real-time threat detection and compliance monitoring.

Private Cloud Protection

Secure private cloud infrastructure with the same unified agent, ensuring consistent policy enforcement throughout.

On-Premise Data Centers

Protect on-premise servers and endpoints with centralized visibility and automated response capabilities.

Coverage Overview

Public Cloud Workloads

Private Cloud Infrastructure

On-Premise Data Centers

Container Environments

Hybrid Environments

Single Agent Architecture

DefenseBolt replaces multiple siloed security tools with one unified agent — reducing complexity and operational costs.

Active XDR Protection

Active XDR Protection from Modern Threats

DefenseBolt provides analysts real-time correlation and context. Active responses are granular, encompassing on-device remediation so endpoints are kept clean and operational.

The DefenseBolt XDR platform provides a comprehensive security solution that detects, analyzes, and responds to threats across multiple IT infrastructure layers. DefenseBolt collects telemetry from endpoints, network devices, cloud workloads, third-party APIs, and other sources for unified security monitoring and protection.

XDR Dashboard — Active Responses

Total Events (Last 24h)

Connection Blocked

File Quarantined

Process Stopped

Application Removed

XDR

Extended Detection & Response — Real-time correlation, context, and on-device remediation.

XDR Capabilities

Six Powerful XDR Capabilities

Comprehensive Extended Detection and Response capabilities that protect your entire infrastructure from modern threats.

Threat Hunting

Focus analyst attention and cut time spent analyzing telemetry from multiple platforms. DB maps detected events to relevant adversary tactics and techniques, ingests third-party threat intelligence, and allows custom queries to aid threat hunting.

Automated Response

Reduce average response time to incidents with the DB active response module. DB automatically responds to threats to mitigate potential impact. Use built-in actions or create custom actions according to your incident response plan.

Cloud Workload Protection

Provide security coverage for cloud workloads and containers. DB has built-in integration with cloud services to collect and analyze telemetry, protecting native and hybrid cloud environments including container infrastructure.

Behavioral Analysis

Detect and respond to threats based on unusual behavior patterns. Advanced analytics identify deviations from normal behavior — monitoring file integrity, network traffic, user behavior, and anomalies in system performance metrics.

Compliance & Reporting

Meet regulatory compliance requirements and demonstrate the effectiveness of your security program. DB performs regulatory compliance checks against PCI-DSS, HIPAA, GDPR, and more.

Threat Intelligence

DB incorporates threat intelligence feeds to detect and respond to known threats. Integrates with OSINT, commercial feeds, and user-contributed data to provide up-to-date information on potential threats targeting your infrastructure.

Comprehensive SIEM Solution

A Comprehensive SIEM Solution

The DefenseBolt Security Information and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events and incidents.

The DefenseBolt SIEM solution is a centralized platform for aggregating and analyzing telemetry in real time for threat detection and compliance. DefenseBolt collects event data from various sources like endpoints, network devices, cloud workloads, and applications for broader security coverage.

SIEM — Security Alerts (Live)

Windows
Defense Evasion, Execution

10

Amazon
Credential Access

5

Debian
Initial Access

5

RHEL7
Privilege Escalation
3
macOS
Credential Access

2

Data Sources

SIEM Capabilities

Six Powerful SIEM Capabilities

Everything your security team needs to monitor, detect, analyze, and respond — built into a single unified SIEM platform.

Security Log Analysis

Protect infrastructure and meet regulatory compliance by monitoring and auditing endpoint activity. DB aggregates, stores, and analyzes security event data to identify anomalies or indicators of compromise, adding contextual information to expedite investigations.

Security Configuration Assessment

Leverage DB SCA capability to identify misconfigurations and security flaws. DB scans systems against the CIS benchmark to allow you to identify and remediate vulnerabilities, misconfigurations, or deviations from best practices and security standards.

Regulatory Compliance

Simplify meeting regulatory compliance requirements. DB helps you track and demonstrate compliance with PCI DSS, NIST 800-53, GDPR, TSC SOC2, and HIPAA — generating the reports and dashboards your auditors need.

Vulnerability Detection

Detect vulnerabilities on monitored endpoints. DB prioritizes identified vulnerabilities to speed up decision-making and remediation. Ensures you meet regulatory compliance requirements while reducing your attack surface significantly.

Reporting Insights from SIEM

Generate insightful reports providing high-level analysis of security events. DB allows you to generate comprehensive, actionable information meeting your unique needs — demonstrating compliance with various regulations and standards.

Alerting & Notification

Receive real-time alerts and notifications when security incidents occur. DB correlates events from multiple sources, integrates threat intelligence feeds, and provides customizable dashboards. Security teams can respond quickly to minimize impact.

One Unified Platform

ONE UNIFIED PLATFORM for Complete Protection

DB delivers robust security monitoring and protection for your IT assets using its SIEM and XDR capabilities. Use cases are designed to safeguard your digital assets and enhance your organization’s cybersecurity posture — encompassing File Integrity Monitoring, Security Configuration Assessment, Vulnerability Detection, and more.

Use Cases

Four Key Security Use Cases

DefenseBolt covers the complete security spectrum — from endpoint protection to cloud security and everything in between.

Endpoint Security

Configuration Assessment
Malware Detection
File Integrity Monitoring

Threat Intelligence

Threat Hunting
Log Data Analysis
Vulnerability Detection

Security Operations

Incident Response
Regulatory Compliance
IT Hygiene

Cloud Security

Container Security
Posture Management
Workload Protection

Endpoint Security

Configuration Assessment

DB monitors system and application configuration settings to ensure they are compliant with your security policies, standards, and hardening guides. The DB agents perform periodic scans to detect misconfigurations or security gaps in endpoints that can be exploited by threat actors.

Additionally, you can customize configuration checks to properly align with your organization’s needs. Security alerts include recommendations for better configuration, references, and mapping with regulatory compliance.

CIS Benchmark Results

Pass
30 checks
Fail
33 checks
Not Applicable
1 check
Score
47%
Jul 20, 2020
Ensure root is the only UID 0 account
Jul 19, 2020
Ensure SSH root login is disabled
Jul 18, 2020
Ensure ntp is configured
Endpoint Security

Malware Detection

DB detects malicious activities and indicators of compromise that occur on endpoints as a result of malware infection or cyberattack. DB out-of-the-box ruleset and capabilities like Security Configuration Assessment (SCA), Rootcheck, and File Integrity Monitoring (FIM) help detect malicious activities and anomalies.

You can configure and customize these DB capabilities to suit your organization’s specific requirements and security policies.

Malware Activity Detection

Aug 12, 2020
Defense Evasion — Word Executing WScript
Aug 11, 2020
Defense Evasion — Signed Binary Proxy
Aug 10, 2020
Process Injection — SQL injection attempt
Aug 10, 2020
Credential Access — Multiple auth failures

Detection Capabilities

Endpoint Security

File Integrity Monitoring

DB monitors the file system, identifying changes in content, permissions, ownership, and attributes of files you need to keep track of. It natively identifies users and applications used to create or modify files.

You can use the DB FIM capability in combination with threat intelligence to identify threats or compromised endpoints. FIM also helps meet several regulatory compliance standards such as PCI DSS, NIST, and others.

FIM — Recent File Events

Aug 12, 2020
deleted — /root/.bash_history
Aug 11, 2020
modified — /etc/hosts
Aug 09, 2020
added — /usr/bin/curl
Aug 08, 2020
modified — /etc/hosts
User

root

Permissions
rwxrwxr-x
Last Modified
2020-07-30
Threat Intelligence

Threat Hunting

DB offers comprehensive visibility into monitored endpoints and infrastructure. It provides log retention, indexing, and querying capabilities that help you investigate threats that may have bypassed initial security controls.

Threat detection rules are mapped against the MITRE ATT&CK framework to aid in the investigation and referencing of tactics, techniques, and procedures commonly used by attackers. DB also integrates with third-party threat intelligence feeds and platforms for enhanced threat hunting.

Threat Hunting — MITRE ATT&CK

Total Events
226,415
L12+ Alerts
49
Auth Failures
39,232
Auth Success
51

Top MITRE ATT&CK Tactics

Threat Intelligence

Log Data Analysis

DB agents collect operating system and application logs, and securely forward them to the DB server for rule-based analysis and storage. The DB rules detect application or system errors, misconfigurations, malicious activities, policy violations, and various other security and operational issues.

💡 Data Sources: Azure activity logs, AWS CloudTrail logs, Stackdriver logs, Packet capture, Web logs, Web application firewall logs, Application logs

Attack Tactics by Agent

2020-08-19
Initial Access — Apache forbidden directory
2020-08-18
Credential Access — SSH non-existent user
2020-08-17
Lateral Movement — Unusual traffic pattern

Compliance Mapped

Threat Intelligence

Vulnerability Detection

DB agents pull software inventory data and send this information to the DB server. The collected inventory data is then correlated with continuously updated CVE (Common Vulnerabilities and Exposure) databases, to identify known vulnerable software.

Automated vulnerability detection helps you find the flaws in your critical assets and take corrective action before attackers exploit them for malicious purposes.

Vulnerability Severity Overview

Critical Severity

197

High Severity

1,054

Medium Severity

2,201

Low Severity

735

CVE-2020-6524
Google Chrome — High
CVE-2020-12888
Linux Kernel — High
CVE-2017-8512
MS Office — High
Security Operations

Incident Response

DB provides out-of-the-box active responses to perform various countermeasures against ongoing threats. These responses are triggered when certain criteria are met — including actions like blocking network access to an endpoint from the threat source.

In addition, DB can be used to remotely run commands or system queries, identify indicators of compromise (IOCs), and help perform incident response tasks efficiently.

Active Response — Alert Groups

Events (Last 24h)
5,327
Aug 16, 2020
Connection blocked — Poor reputation IP
Aug 15, 2020
File quarantined — Finance.doc
Aug 15, 2020
Process stopped — httpd
Aug 14, 2020
Application removed — nmap-ncat

Response Actions

Security Operations

Regulatory Compliance

DB provides the necessary security controls to become compliant with industry standards and regulations. Security controls include File Integrity Monitoring (FIM), Security Configuration Assessment (SCA), vulnerability detection, system inventory, and more.

Combined with its scalability and multi-platform support, DB helps organizations meet technical compliance requirements. Reports and dashboards are available for GDPR, NIST, TSC, and HIPAA.

Compliance Dashboard

PCI DSS Requirements Met
NIST 800-53 Controls
GDPR Controls
HIPAA Requirements
TSC SOC2

Built-in Compliance Controls

Security Operations

IT Hygiene

DB builds an up-to-date system inventory of all monitored endpoints. This system inventory contains data like installed applications, running processes, open ports, hardware and operating system information, and others.

Collecting this information helps organizations optimize asset visibility and maintain good IT hygiene. Capabilities like vulnerability detection, Security Configuration Assessment, and malware detection help protect monitored endpoints and improve IT hygiene.

System Inventory — Endpoint

CPU
Memory
Network Ports Open
Running Processes
Last Scan

Vulnerabilities Found

Cloud Security

Containers Security

DB provides security visibility into Docker hosts and containers, monitoring their behavior and detecting threats, vulnerabilities, and anomalies. The DB agent has native integration with the Docker engine, allowing users to monitor images, volumes, network settings, and running containers.

DB continuously collects and analyzes detailed runtime information — alerting for containers running in privileged mode, vulnerable applications, shell running in a container, changes to persistent volumes or images, and other possible threats.

Container Events — Docker

Top Event

Pull

Container Type
nginx_container
Action Detected
exec: cat /etc/passwd
Aug 15, 2020
Command in container — nginx
Aug 14, 2020
Image pulled — archlinux
Aug 14, 2020
Network bridge disconnected

MONITORED RESOURCES

Cloud Security

Posture Management

DB integrates with cloud platforms, collecting and aggregating security data. It alerts on discovered security risks and vulnerabilities to ensure security and compliance with regulatory standards.

Cloud Posture — Severity Overview

Critical Alerts
High
High Alerts
Active
Total Events
3,000 hits
GCP
Misconfiguration — HIGH severity on project
Azure
Exposed Kubernetes dashboard detected
AWS
Unusual outbound communication — EC2
Cloud Security

Workload Protection

DB monitors and protects workloads in cloud environments as well as on-premises workloads. You can integrate DB with cloud platforms like AWS, Microsoft Azure, GCP, Microsoft 365, and GitHub to monitor services, virtual machines, and the activities occurring on these platforms.

The centralized log management of DB helps organizations that use these cloud platforms to adhere to regulatory requirements.

Workload Protection — Cloud Sources

AWS Integration
Microsoft Azure
Google Cloud (GCP)
Microsoft 365
GitHub

Monitored Sources

Deployment Options

Flexible Deployment Options

Deploy DefenseBolt using your preferred tools and operating systems — designed for maximum compatibility and flexibility across your existing infrastructure.
Get Started Today

Secure Your Infrastructure with DefenseBolt — One Platform. Total Protection.

    What is your name?*

    What company do you represent?

    Phone number?*

    A few words about your project*

    Cart (0 items)

    Create your account