ELISA

SECURITY MANAGER

CENTRAL OPERATIONAL AND SECURITY MONITORING

It is a robust and powerful, yet cost-effective solution for log collection, correlation and analysis. It meets the needs of most organizations and complies with the requirements of the Cyber Security Act.

We offer friendly
comprehensive security supervision

Security risk detection

Provides high comfort in the analysis of detected security incidents and relevant logs.

Low acquisition costs

It is a very cost-effective LM / SIEM solution that meets the needs of most organizations.

Friendly user interface

Searching in events couldn’t be easier, it will be appreciated by security administrators as well as administrators responsible for the operation of systems.

News from world of logs

THE FIRST CZECH ZABBIX ONLINE MEETUP

THE FIRST CZECH ZABBIX ONLINE MEETUP

CoreIT together with partners DATASYS, S.ICZ and TOTAL SERVICE invites you to the first Czech online Zabbix Meetup. You can look forward to the presentation of our colleague Lukáš Malý and other...

COMING SOON ELISA 4.7

COMING SOON ELISA 4.7

Information technology is constantly moving forward, and we are constantly monitoring and evaluating the opportunities it brings. In this regard, we strive to respond to current trends and customer...

ELISA IS NOW UNDER DISTRIBUTION NETWORK NOVICOM

ELISA IS NOW UNDER DISTRIBUTION NETWORK NOVICOM

Novicom – Czech manufacturer for network management, monitoring and securityThe company has been operating on the Czech IT market in the same way as ours since 1994. It focuses on medium and large...

TOOL FOR INTERCEPTING AND EVALUATING
CYBERNETIC SECURITY EVENTS

The ELISA tool has a practical web user interface and a performance-efficient correlation processor, with which we can easily correlate events even within a time window of several weeks or even months. Included is a set of the most commonly used correlations – detection of repeated failed logins at several levels, the spread of malicious code on the network, etc.

Searching the event database is similar to searching the Internet, simply by entering keywords. After a short training, even an inexperienced user can also formulate complex filters that far exceed the possibilities of searching in relational databases. Dividers can be saved for reuse.

It is common to distribute a database to multiple servers in order to share the load and high availability of indexed data. An integral part of ELISA is the globally widespread ZABBIX operational monitoring tool, the web interface which also includes settings for configuration of log collection and evaluation in ELISA.

KEY PROPERTIES

  •  Automatic evaluation.
  • Security risk detection.
  • A clear and simple web user interface.
  • Compliance with the Cybersecurity Act, GDPR, ISO, PCI.
  • Built-in Change Auditor.
  • Further advanced SIEM functions.
  • OpenVAS and GSM integration.
  • Flowmon ADS integration.
  • Physical and virtual appliances.
  • Distributed log collection.
  • Horizontal scalability.
  • High performance (up to 10 000 EPS).
  • Low initial costs.

The solution is suitable for medium and large companies, municipal authorities and other public institutions.

Security Information and Event Management

ELISA also utilises an advanced correlation engine supporting contextual correlation, even over periods of several months. This allows the detection of cybersecurity events, not only through repeated elementary incidents, but also the spread of hidden malware over a network or users signing into applications after several weeks of inactivity.

The ESM allows you to enrich the events with information from external sources and calculates a “risk score” for all events, allowing one to easily prioritise the steps needed to resolve alarms that appear. The EMS includes support for regular monitoring of configurations (the so-called Change Auditor) and other advanced SIEM functions.

What information can ELISA uncover?

WHAT EXCEPTIONS EXIST IN THE

COMPANY IS?

WHO MADE CHANGES

TO THE DATABASE?

WHO IS TRYING TO GUESS

SOMEONE’S PASSWORD?

WHO DELETED THE FILES

ON THE SHARED DRIVE?

FROM WHERE ARE PEOPLE ACCESSING YOUR

COMPANY WEBSITE?

WHICH USERS ARE DOWNLOADING THE MOST

DATA FROM THE WEB?

References overview

CONSULTATION & DEVELOPMENT

DATASYS s.r.o.
Pavel Štros
+420 603 280 019
monitoringdatasys.cz

PARTNERSHIP

Novicom, s.r.o.
Tomáš Dokoupil
+420 774 618 385
tomas.dokoupilnovicom.cz

SUPPORT

elisadatasys.cz

Support Policy