Powerful SaaS solution for malicious activity detection
Cyber Security team of Micki corporation have developed algorithms of detection and classification cyber security incident the accurate is about 99%. So it was only a matter of time before release convinient web application enables you to scan access log files from your servers.
REAL-TIME LOG PROCESSING
At this moment our team start to implementation mechanism of continued log delivery. Customer just should setup his rsyslog to our Logstash and system will inform you about incident soon after it was held.
ANALYZE ANOMALIES OF USERS BEHAVIOR
Not all 100% of found incident will be a real attempted break. A little part is a false positive. Such events can detect anomalies in users requests without any negative payload and this may reflect some bugs in your soft, for example, after adding new features.
BUILD MAP OF RISK TARGETS
Between we also provide you information about most offen attacked urls of your application. Some times this may reflect existing back-door in your system or vulnerability of your application, vulnerability third-party tools which are used in your project. Anyway each of this case is a good reason to ascertain the details of the attack.
RESEARCH ATTACKERS INFORMATION
During to scanning your system collects information about IP addresses associated with a cybersecurity incident to make a hacker profile and represent to you in a user-friendly format.