Log Correlation Engine

The Log Correlation Engine provides the capability to define rules and detect threat scenarios. SGBox aggregates and analyzes log data from across your network applications, systems and devices, making it possible to discover security threats alerts or trigger automatic countermeasures using scripts or interacting with external systems via API’s. The correlation rules may be used on real time or historical data. SGBox easy and intuitive GUI allows the creation of complex chained event based correlation rules in a few simple steps


Predefined Rules Set

File Integrity Monitoring

Automated Response

It is possible to choose correlation rules from many predefined templates, constantly updated and guaranteed by the experience of our Security Engineers. Monitor file activities to protect sensitive information from theft, loss and malware. Check and view details or changes made to files and folders identifying an advanced persistent threat attack. . SGBox can engage automated response in case of threats by launching scripts or interacting with security components via API or APPs to mitigate theats.