Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

QRadar Technical Blog: To Flow Or Not To Flow

QRadar began life as a network product, converted to an event log management tool and is now returning to its roots with QRadar Network Insights (QNI).

Read More

QRadar Technical Blog: Using QRadar to check for WCry

After the events of the last few weeks you might wish to protect your network against a second invasion of the WannaCry malware. By all accounts the next instance may well be nastier than the first.

Read More

QRadar Technical Blog: Suggested Deployment

After the last blog regarding the use of data nodes, there has been a request for suggestions around how the deployment should look. First we should say that there are many ways of deploying QRadar and while there are certainly some wrong ways, there are many ‘right’ ways each depending upon the size of network, number of devices, activity and other metrics.

Read More

QRadar Technical Blog: Why Add A Data Node To QRadar

This is a common question posed by QRadar users trying to understand some of the newer additions to the QRadar family.

Read More

QRadar Use Case Series: Part 3: Data Exfiltration Attempt Through Online Storage

Welcome back to the third instalment of this IBM QRadar use case series. I am going to give ‘User Activity Monitoring’ a break for some time and focus this particular post on ‘File Activity Monitoring’. Although, not that dissimilar, we are identifying trends around directories and in particular files.

Read More

QRadar - Managing Reference Data

One of our QRadar Security Engineers takes you through managing reference data prior to the release of QRadar 7.2.8.

Read More

QRadar Use Case Series: Part 1 - User Activity Monitoring - Employee Probation

In this series of use case scenarios using IBM QRadar SIEM, we will look at a set of key log sources which are required for a successful deployment. These log sources although not glamorous are embedded into all companies, forming the backbone of most organisations security posture.

Read More