Skip to main content

Recently Updated Pages

Log Collector Installation

Log Collector Installations

Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1:...

Updated 1 day ago by Richmond Abella

System Integrations

System Integrations

Introduction  The System integration allows you to monitor servers, personal computers, and more...

Updated 2 days ago by John Polestico

Google Workspace Integrations

System Integrations

Introduction  Google Workspace (formerly G Suite) is a suite of cloud computing, productivity an...

Updated 2 days ago by John Polestico

Log Collector Hardware Requirements Guide

Log Collector Installations

What is a Log Collector? A log collector is a tool or software component designed to gather log ...

Updated 2 days ago by Richmond Abella

Google Workspace Integration - Elastic

System Integrations

Google Workspace Integration The Google Workspace integration collects and parses data from the ...

Updated 2 days ago by Richmond Abella

GitHub Integration - Elastic

System Integrations

GitHub Integration The GitHub integration collects events from the GitHub API(external, opens in...

Updated 2 days ago by Richmond Abella

CRAM View

Dashboard Overview

CRAM View provides a dynamic visualization of your organization's structure, offering real-time i...

Updated 3 days ago by John Polestico

Cyber Security Risk Management

Cyber Risk Management

Overview: Cyber Security Risk Management is a systematic approach to identifying, assessing, and...

Updated 3 days ago by John Polestico

Security Assessment Questionnaires

Cyber Governance

Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate t...

Updated 3 days ago by John Polestico

Privacy Compliance

Cyber Governance

Overview The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Wo...

Updated 3 days ago by John Polestico

Security Compliance

Cyber Governance

Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...

Updated 3 days ago by John Polestico

Azure Application Insights Integration

System Integrations

Overview The Application Insights Integration allows users to retrieve application insights metr...

Updated 3 days ago by Richmond Abella

CSPM-AWS Integration using IAM Role

System Integrations

Overview This page explains how to get started monitoring the security posture of your cloud ass...

Updated 3 days ago by Richmond Abella

Cyber Incident Management Module

Cyber Detection and Response

Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...

Updated 3 days ago by Juniele Galbe

Virtual Penetration Testing

Attack Surface Management

Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...

Updated 3 days ago by Janyl Cierra

Vulnerability Assessment and Management

Attack Surface Management

Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll ...

Updated 3 days ago by Janyl Cierra

Threat Intelligence

Attack Surface Management

Overview This advanced module operates as a virtual threat analyst, continuously gathering, anal...

Updated 3 days ago by Janyl Cierra

Supply Chain Risk Management

Cyber Risk Management

Overview The dashboard provides with an overview of vendor and supply chain risks. It features a...

Updated 4 days ago by Janyl Cierra

EDR Installation

System Integrations

Installing Endpoint Detection and Response (EDR) Please follow the instructions below and refer ...

Updated 4 days ago by Richmond Abella

Google Cloud Platform (GCP) Audit Logs - using a Pub/Sub

System Integrations

Requirements   To integrate with Google Cloud Platform (GCP), you need to set up the following: ...

Updated 1 week ago by Richmond Abella