The Enigma Platform
(TAKING THE COMPLEXITY OUT OF UNDERSTANDING SECURITY DATA)
STEP 1: DATA INGESTION
We start by ingesting security log data from various source systems within your environment. Ranging from security tools to network infrastructure systems.
The data at this stage can be in the form unstructured system events or structured tool alert data.
How it works
Source data is collected through API’s
We have support for real-time & batch processing
Data is then parsed and stored in your organizations index
Additional data enrichment can be performed
Once stored, the data is ready for analysis
STEP 2: ANALYTICS AND INSIGHTS
Stored data is used to populate pre-built cybersecurity dashboards and insights.
These insights can be customized based on the role of the end-user (analyst, manager, director, executive).
The custom visualizations act a single pane of glass. Allowing security professionals to spot anomalies and suspicious activity in their network.
Data is presented through a simple, intuitive interface.
Allowing all personnel, both technical and non-technical, the ability to quickly garner meaningful security information.
STEP 3: ALERTING AND REPORTING
ENIGMA ALERTS
Actionable alerting is something of a myth in the security realm.
Most tools produce tons of alerts and noise just to act like they are doing something. This results in an overabundance of false positives and alert fatigue for analysts.
The Enigma Platform solves this problem by providing the end-user with the ability to customize their alerting suite.
We provide logic for alerts we can create with the available data
You tell us what you want (and don’t want) to be alerted on
ENIGMA SECURITY REPORTS
Reporting security trends and metrics can be an extremely challenging task for organizations. Especially when presenting your organizations security status to upper management and the board.
Most tools either provide an abundance of irrelevant, unwanted data in their reports, or fail to provide metrics that actually matter.
The Enigma Platform is designed to be the worlds most intuitive security tool. Providing users the ability to create reports based off dashboards, insights, and any relevant data stored within the system.
Extract the exact insights you need at the precise moment you need them.
Our reporting feature allows users to:
Use previously built visualizations and insights to create reports
Build custom security reports that tell the full story of an event
Present key security findings and trends to management, executives and the board in a "user-friendly" manner