Data Collection Flow

File Shippers

Logo
Logo
Logo
Pointed Arrow

Connectors

Logo
Logo
Logo
Pointed Arrow

Parsers

Logo
Logo
Logo
Pointed Arrow

Enrichment

Logo

Cloud Apps

Collect, aggregate and analyze logs from any cloud application source. Simple setup. Get the whole picture from all your cloud applications, infrastructure, and devices.

Security Devices

Collect all log data from your all your security devices, on-premises and cloud implementations for a consolidated view of all activity across all your security solutions and retain the data for as long as you need to.

Enterprise Network

Collect all your enterprise network and endpoint device logs for full visibility to all activity across all layers of your network.

Collect, Parse, Enrich, Load

With integration of all your security and log sources, Elysium Analytics automatically collects all the data you need from any source. Easily parse, map, and group your data in Elysium Analytics Open Data Model for full context and fast analytics. Context and Threat Intel enrichment add event and non-event contextual information to security event data in order to transform raw data into meaningful insights.

Collect your data

With integration to all your security and log sources, Elysium Analytics automatically collects all the data you need from any source; cloud, on-prem, or SIEM solution. Leveraging Kafka, Logstash, Beats, and Nifi.

Parse your data

Parse, map, and group your data in Elysium Analytics Open Data Model for full context and fast analytics.

Enrich your data

Context enrichment adds event and non-event contextual information to security event data in order to transform raw data into meaningful insights. User typically enrich with geo data, asset lookup data, and more.

Add Threat Intel to your data

Enrich your data with Threat Intel and get a broad view of the threat landscape external to your organization allowing your security team to more effectively detect threats, measure overall relevant risk exposure, and become more effective at mitigation. We have implemented a RESTful API as well as STIX & TAXII support for simple ingestion into our data lake.

Load your data

Loading your data into the data lake is billed by the second and can be configured to continuous loading or batch loading. Since you are billed by the compute resources you consume, you can configure frequency and capacity based on what your needs are.

Connect to your data

Combine all your on-prem IT logs, enterprise network logs, cloud logs and network traffic data into one scalable data lake and combine your in-cloud and on-prem data silos into one scalable Snowflake data lake

Search

Arrow pointing up/Back to top