DNIF HYPERCLOUD is a good SIEM solution. One of the tools' features is very high scalability in terms of the events generated per second. The product is aligned with the MITRE ATT&CK framework. It is easy to deploy. It can be integrated with any pre-existing solution in our company's environment. The tool can work as a secondary tool from DNIF.
Assistant Manager (information Security) at Tata Projects Limited
User
2022-12-08T10:54:00Z
Dec 8, 2022
In our project, we are mostly using authentication activities, real-time notification & alerting, log correlation & threat intelligence solutions. The DNIF tool is very authentic and capable of providing the desired output. In projects like emergency response systems, it is very important to have such features, which DNIF is providing. The real-time notification is alerting us so that we can act immediately. The environment is protected from threats through its threat intelligence solution. This is a good tool for emergency response system monitoring, and I highly recommend it.
Deputy General Manager - Information Security (Lead ISA) at a energy/utilities company with 1,001-5,000 employees
Real User
2022-11-23T13:14:32Z
Nov 23, 2022
Our company is using the solution to build a next-generation security operations center that automates all administration and orchestration. It will include our entire MITRE framework and use cases being mapped at the moment. We were already developing UEBA and SOAR when we started using the solution. UEBA will track when users move around to determine if movements are suspicious or should be mapped with threat activity. The solution is a hybrid model. The hardware infrastructure and log collector is on-premises. We provide IP addresses that open a specific communication with the solution's cloud console where our EPS data is contained. We administrate the SIEM via the cloud portal and manage operations or log management on-premises.
This is a log management solution that comes with some inbuilt use cases and capabilities. It's a SIEM tool and clients generally use it in their Security Operations Centers for two purposes. First is the compliance requirement to retain logs for at least a year; the second is to identify unauthorized activities or security incidents in an environment. I recently used this solution before leaving the company to pursue my master's in cybersecurity. The company is a reseller.
Exec. VP & Head - IT at a consultancy with 11-50 employees
Real User
2020-03-16T06:56:19Z
Mar 16, 2020
We have integrated all our network devices, our servers, and our applications as well as some customized applications. We use the solution to collect the logs. We track items such as unsuccessful logins, any identical opening identification, repeated use of passwords within a certain timeframe, unsuccessful login attempts, etc.
CEO at Irisk Assurance Consultancy Services Pvt Ltd
Real User
2019-03-06T07:40:00Z
Mar 6, 2019
We are a security operation center and we implement and manage DNIF for clients. As a SIEM solution, it collects logs not only from network devices like firewalls, servers, databases, switches, or routers, but it also collects logs from applications. The use case is that we can develop very complex correlation rules, correlating the application logs and the device logs. It enables us to detect fraud within organizations by correlating multiple logs from multiple data sources.
DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the flagship SaaS platform from NETMONASTERY that delivers key detection functionality using big data analytics and machine learning. NETMONASTERY aims to deliver a platform that helps customers in ingesting machine data...
DNIF HYPERCLOUD is a good SIEM solution. One of the tools' features is very high scalability in terms of the events generated per second. The product is aligned with the MITRE ATT&CK framework. It is easy to deploy. It can be integrated with any pre-existing solution in our company's environment. The tool can work as a secondary tool from DNIF.
In our project, we are mostly using authentication activities, real-time notification & alerting, log correlation & threat intelligence solutions. The DNIF tool is very authentic and capable of providing the desired output. In projects like emergency response systems, it is very important to have such features, which DNIF is providing. The real-time notification is alerting us so that we can act immediately. The environment is protected from threats through its threat intelligence solution. This is a good tool for emergency response system monitoring, and I highly recommend it.
Our company is using the solution to build a next-generation security operations center that automates all administration and orchestration. It will include our entire MITRE framework and use cases being mapped at the moment. We were already developing UEBA and SOAR when we started using the solution. UEBA will track when users move around to determine if movements are suspicious or should be mapped with threat activity. The solution is a hybrid model. The hardware infrastructure and log collector is on-premises. We provide IP addresses that open a specific communication with the solution's cloud console where our EPS data is contained. We administrate the SIEM via the cloud portal and manage operations or log management on-premises.
This is a log management solution that comes with some inbuilt use cases and capabilities. It's a SIEM tool and clients generally use it in their Security Operations Centers for two purposes. First is the compliance requirement to retain logs for at least a year; the second is to identify unauthorized activities or security incidents in an environment. I recently used this solution before leaving the company to pursue my master's in cybersecurity. The company is a reseller.
We have integrated all our network devices, our servers, and our applications as well as some customized applications. We use the solution to collect the logs. We track items such as unsuccessful logins, any identical opening identification, repeated use of passwords within a certain timeframe, unsuccessful login attempts, etc.
We are a security operation center and we implement and manage DNIF for clients. As a SIEM solution, it collects logs not only from network devices like firewalls, servers, databases, switches, or routers, but it also collects logs from applications. The use case is that we can develop very complex correlation rules, correlating the application logs and the device logs. It enables us to detect fraud within organizations by correlating multiple logs from multiple data sources.