StormEye

New Generation log management system built for today’s distributed environments
StormEye SIEM

What is StormEye?

To protect your cyber safety with the power of logging

StormEye, a security information and event management (SIEM) system, consist of a log source collector, a large-scale logging database and a real-time data analytic system. They play key-roles in collecting log sources from different devices and services, real-time processing the collected logs and serving the log data in our blazing-fast database. No matter the network size and structure, StormEye deploys in either a self-hosted or SaaS environment. Organizations can overview their cybersecurity postures and potential threats and breaches at any time via StormEye portal.

Security

Incident management

Infinite retention

StormEye SIEM

Advantage to your Business

Prepare for unknown

Organization networks are at risk of digital threats now more than ever. That is why organizations start collecting cybersecurity log data and metrics for the needs of defences and compliances. Combatting the daily bad-actor attacks such as infiltrating organization systems, exfiltrating internal data assets, or even ransomware attacks, collecting cybersecurity log data and metrics helps organizations complete the insight into seeing anomalies, threats, and problems, to increase the chance of finding the root cause of the issue and effectively mitigating the impact.

Products Features

Integration
Seamlessly integrates with popular platforms and systems
Adaptable
Deploys self-hosted on-premise, private cloud, public cloud or multi-cloud
Real-time
Serves with blazing-fast database for real-time performance and queries
Flexible Retention
Retains your log data as long as you need without much worrying about
Scalability
Scales up processors and databases to serve hundreds of terabytes with no compromises
Cost Effective
Groundbreaking technologies to save your cost to do big
Stormeye SIEM

Choose to face or to escape?

The risks of cybersecurity will become more serious as your enterprise develops.

SIEM Easy to setup and integrate

Easy to setup and integrate

StormEye, a security information and event management (SIEM) system, is an all-in-one log management platform that is easy to install, use, and scale. StormEye has unique features that help integrates effortlessly with existing tech stacks. With our easy-to-use built-in tech support, users are able to customize datalog types and alert for the unique needs of different functions with different environments, which makes integrating StormEye into existing systems is simple and quick.

Runs in every environments

Organization networks can be very different and complicated compared to others. StormEye provides a wide range of deployment options include self-hosted on-premise, public cloud and private cloud to fit the needs. Organizations do not need to worry about the complexities and difficulties of StormEye system implementation.

SIEM
SIEM

Enterprise scalability

Cybersecurity should keep pace with enterprise scalability and StormEye should scale as well. StormEye provides the ability to scale up its processor and database capacities with no compromise. Organizations can scale the capacity at any time according to their needs.

Blazing-Fast database

StormEye serves the blazing-fast database for every client to query their log data in real-time. Organizations no longer need to wait for the data query time even the query output size is large.

SIEM
StormEye SIEM

Real-time processing

With StormEye’s groundbreaking processing technology, collected log data are processed in real-time. No matter how large is the volume of the data that send to StormEye, data is ready immediately for query and investigation.

Incident Management

Collected system and platform log data can be the fingerprints of a cybersecurity breaching incident. StormEye generates alerts by monitoring potential anomalies and malicious activities to notify organizations to aware of the issue.

StormEye SIEM
StormEye passive monitoring

Passive monitor

To port into StormEye, the syslog protocol for devices is used. Therefore no interference or block of the existing network or packet, not doing any network monitoring or packet inspection.

Active protection

StormEye provides visibility to all documents and files by logging all data. It reduces the loss from accidents and the potential of insider file yhreats.

StormEye SIEM Active protection
  • Personal information

  • Transaction data

  • Intellectual property

  • Enterprise System

Integrations

High compression

Ingest Any Format

Custom parsers

Fast Ingest

Real-Time

We Work Well With

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally.

source: https://en.wikipedia.org/wiki/Amazon_Web_Services

Google Cloud Platform is a cloud computing service provided by Google, which provides infrastructure services, platform services, and serverless computing environments on servers that execute Google search and YouTube.

source: https://en.wikipedia.org/wiki/Google_Cloud_Platform

DigitalOcean is a cloud infrastructure built in the United States, and the underlying software developers provide virtual dedicated servers. DigitalOcean became the second largest web service company in the world in 2015.

source: https://en.wikipedia.org/wiki/Digital_Ocean

Red Hat is an American company that develops and sells Linux suites and provides technical services as its business content. Its famous product is Red Hat Enterprise Linux.

source: https://en.wikipedia.org/wiki/Red_Hat

Ubuntu is a Linux distribution based on Debian and mainly desktop applications. There are three official versions of Ubuntu, including a computer version, a server version, and a Core version for IoT devices and robots. 

source: https://en.wikipedia.org/wiki/Ubuntu

CentOS is one of the Linux distributions, which is compiled from the source code released by Red Hat Enterprise Linux in accordance with the open source code regulations.

source: https://en.wikipedia.org/wiki/CentOS

Debian is a UNIX-like operating system composed entirely of free software. Most of the software it contains is licensed under the GNU General Public License and is packaged, developed and maintained by a team of participants in the Debian project.

source: https://en.wikipedia.org/wiki/Debian

Fedora Linux is one of the more well-known Linux distributions. It is developed by the Fedora project community and sponsored by Red Hat.

source: https://en.wikipedia.org/wiki/Fedora_(operating_system)

Apache HTTP Server is an open source web server software of the Apache Software Foundation, which can run on most computer operating systems. 

source: https://en.wikipedia.org/wiki/Apache_HTTP_Server

NGINX is a web server with an asynchronous framework and can also be used as a reverse proxy, load balancer, and HTTP cache. 

source: https://en.wikipedia.org/wiki/Nginx

OpenResty is a Nginx-based web platform that can use its LuaJIT engine to execute Lua scripts. The software was created by Zhang Yichun.

source: https://en.wikipedia.org/wiki/OpenResty

Internet Information Services (IIS) for Windows® Server is a flexible, secure and manageable Web server for hosting anything on the Web.

source: https://en.wikipedia.org/wiki/Internet_Information_Services

MySQL was originally an open-source relational database management system. In 2009, Oracle acquired Sun Microsystems, and MySQL became a product of Oracle.

source: https://en.wikipedia.org/wiki/MySQL

MariaDB is a replica of MySQL’s relational database management system, developed by the community, with commercial support, and aims to remain open source under the GNU GPL.

source: https://en.wikipedia.org/wiki/MariaDB

Oracle Corporation is a global large-scale enterprise technology software company headquartered in Austin, Texas, USA. As of 2019, Oracle is the world’s second-largest software company by revenue after Microsoft.

source: https://en.wikipedia.org/wiki/Oracle

PostgreSQL is an open source object-relational database system. There is a wealth of information to be found describing how to install and use PostgreSQL through the official documentation.

Microsoft SQL Server is a relational database solution launched by Microsoft Corporation of the United States.The built-in language of the database originally used the SQL language defined by the American Bureau of Standards and the International Standards Organization, but Microsoft has partially expanded it to become SQL for operations.

source: https://en.wikipedia.org/wiki/Microsoft_SQL_Server

Linksys is an American network equipment brand, currently owned by Belkin, a subsidiary of Hon Hai.

source: https://en.wikipedia.org/wiki/Linksys

ASUS Computer, abbreviated as ASUS, is a Taiwanese multinational technology company founded in 1989 and headquartered in Beitou District, Taipei City, Republic of China. ASUS products are mainly home and business hardwares.

source: https://en.wikipedia.org/wiki/Asus

DrayTek Corporation is a Taiwan-based manufacturer of networking equipment and management systems. Their mission is to deliver high-quality and high-integrated networking services at an affordable price and be your reliable networking solution partner.

source: https://en.wikipedia.org/wiki/DrayTek

QNAP Technology, referred to as QNAP, with English translation and brand name QNAP, is a multinational technology company originating from Taiwan, headquartered in Xizhi District, New Taipei City. 

source: https://en.wikipedia.org/wiki/QNAP_Systems

Synology Technology Co. Ltd. is a network-attached storage service provider in Taiwan, headquartered in New Taipei City. As of 2017, Synology has been marketed globally under the Synology brand, ranking first in the world in the market share of SMEs and home NAS.

source: https://en.wikipedia.org/wiki/Synology

Microsoft Corporation is a technology company. It develops, licenses, and supports a range of software products, services and devices. Windows 10 is currently the latest version of Microsoft software.

source: https://en.wikipedia.org/wiki/Microsoft

Product Plus

Let our Experts Defense Your System with StormEye.

Outsource your security operations to us. We actively monitor and analyze your cyber threats and alerts.Hackers are getting sophisticated and hidden, tracing their tracks, and defensing your system are painful. But hackers know hackers, with our professionals, your digital assets are safely secured. Alerts may not always be real but there are patterns to analyze. We save your time to view alerts. We alert you.