Contextual Network and Identity log

Investigate Network and IAM activities with all the needed context

IAM Activity
Flowlogs
Enriched real-time network flow logs
Investigate network behavior with event-driven granularity, and posture awareness clarity.
IAM activity linked to related machines and identities.
Investigate any identity (Identity Access Management - IAM) activity with automatic correlation to resources. Analyze and understand any action done in your cloud. Track an entire user / machine session including operations done after assume roles.
Built in anomaly-detection engine
  • Get breach indications on machine and user activity against the MITRE ATT&CK® framework.
  • Detect Availability issues due to Unexpected traffic rejects and IAM errors.
  • Detect data extralification and costs spikes due to higher than baseline egress traffic volume.
We attribute Network and IAM logs to configuration paths, so that you can easily understand how data and configurations interact.