Recently Updated Pages
Log Collector Installation
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1:...
System Integrations
Introduction The System integration allows you to monitor servers, personal computers, and more...
Google Workspace Integrations
Introduction Google Workspace (formerly G Suite) is a suite of cloud computing, productivity an...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log ...
Google Workspace Integration - Elastic
Google Workspace Integration The Google Workspace integration collects and parses data from the ...
GitHub Integration - Elastic
GitHub Integration The GitHub integration collects events from the GitHub API(external, opens in...
CRAM View
CRAM View provides a dynamic visualization of your organization's structure, offering real-time i...
Cyber Security Risk Management
Overview: Cyber Security Risk Management is a systematic approach to identifying, assessing, and...
Security Assessment Questionnaires
Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate t...
Privacy Compliance
Overview The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Wo...
Security Compliance
Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...
Azure Application Insights Integration
Overview The Application Insights Integration allows users to retrieve application insights metr...
CSPM-AWS Integration using IAM Role
Overview This page explains how to get started monitoring the security posture of your cloud ass...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Virtual Penetration Testing
Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...
Vulnerability Assessment and Management
Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll ...
Threat Intelligence
Overview This advanced module operates as a virtual threat analyst, continuously gathering, anal...
Supply Chain Risk Management
Overview The dashboard provides with an overview of vendor and supply chain risks. It features a...
EDR Installation
Installing Endpoint Detection and Response (EDR) Please follow the instructions below and refer ...
Google Cloud Platform (GCP) Audit Logs - using a Pub/Sub
Requirements To integrate with Google Cloud Platform (GCP), you need to set up the following: ...