Security Data Lake
Security Data Lake is a powerful Security Information and Event Management (SIEM) solution and log analytics platform that centralizes, secures, and monitors machine-generated data across multiplesources. Security Data Lake provides teams in cybersecurity, IT operations, and compliance with actionable insights by delivering rapid search, real-time alerting, and powerful visualization features.
Core capabilities
Security Data Lake provides essential capabilities that enhance visibility, strengthen security operations, and simplify monitoring and investigation across your environment.
Collects and enriches log data from multiple sources to create a unified, searchable view.
Detects and alerts on threats in real time to support faster response.
Displays key metrics and trends through customizable dashboards.
Correlates related events to reveal patterns, dependencies, and root causes.
Identifies unusual or suspicious activity using anomaly detection techniques.
Analyzes user and system behavior to uncover insider threats or compromised accounts.
Supports compliance efforts with automated reporting and retention controls.
Integrates threat intelligence feeds to provide context for alerts and detections.
Simplifies forensic investigations with linked searches, evidence, and timelines.
Improves deployment and visibility with pre-built content packs and configurations.
Core Features
The core functionality of Security Data Lake is built on the following well-defined components:
Data ingestion and management
Inputs - Define how and from where Security Data Lake receives data, whether from syslog, GELF, Beats, or custom sources, allowing flexible configuration for various log types and protocols.
Streams - Route, tag, and filter logs in real time to organize and control data flow and access based on defined conditions.
Index Model - Configure retention, rotation, and sharding policies to manage log data storage efficiently and ensure compliance with data lifecycle requirements.
Pipelines - Apply transformation and enrichment logic as messages flow into Security Data Lake, enabling normalization, tagging, and dynamic routing before indexing.
Monitoring and analysis
Search Your Log Data - Quickly locate and analyze events with an intuitive query interface and time-based filtering for both structured and unstructured log data.
Dashboards - Build customized visualizations such as charts, graphs, and KPIs to monitor system health, security events, or application performance, with support for role-based access control.
Alerts - Detect conditions of interest using configurable event definitions that support both real-time notifications and retrospective alerting based on historical data.
Anomaly Detection - Automatically identify deviations from normal behavior using statistical baselines and trend analysis, allowing early detection of unusual activity or performance degradation.
Threat detection and response
Sigma Rules - Implement standardized detection logic using the Sigma rule framework, enabling the translation of community-driven rules into actionable Security Data Lake alerts and correlation queries.
Illuminate - Deploy curated, domain-specific content packs that include pipelines, dashboards, and detection rules for common platforms, accelerating visibility and threat detection.
Investigations - Create focused workspaces that consolidate related search results, contextual data, and evidence for efficient incident response and collaborative forensic analysis.
Security Data Lake licenses
There are two Security Data Lake licenses available, which provide the following features:
GravityZone Security Data Lake
GravityZone Security Data Lake for MDR