Our Products

Asthra: Host security monitoring

Asthra helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities:

 File integrity monitoring

Asthra monitors the file system, identifying changes in content, permissions, ownership, and attributes of files that you need to keep an eye on.

Intrusion and anomaly detection

Agents scan the system looking for malware, rootkits or suspicious anomalies. They can detect hidden files, cloaked processes or unregistered network listeners, as well as inconsistencies in system call responses.

Automated log analysis

The agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage. The security engine rules help bring to your attention application or system errors, misconfigurations, attempted and/or successful malicious activities, policy violations and a variety of other security and operational issues.

Policy and compliance monitoring

Asthra monitors configuration files to ensure they are compliant with your security policies, standards or hardening guides. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured.

This diverse set of capabilities is provided by integrating OSSEC, OpenSCAP and Elastic Stack, making them work together as a unified solution, and simplifying their configuration and management.

Asthra provides an updated log analysis ruleset, and a RESTful API that allows you to monitor the status and configuration of all aoolication agents.

Asthra also includes a rich web application (fully integrated as a Kibana app), for mining log analysis alerts and for monitoring and managing your security infrastructure.

Asara: Host and Network security monitoring

Asara is a Linux distro for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

Data Types

Alert data

HIDS alerts from OSSEC and NIDS alerts from Snort/Suricata

Asset Data

Asset Data from Bro

Full content data

Full packet capture from netsniff-ng

Host data

Host data via OSSEC and syslog-ng

Session data

Session data from Bro

Transaction data http/ftp/dns/ssl/other logs from Bro

Avata: Big Data Security Analytics

Avata provides a scalable advanced security analytics framework built with the Hadoop Community evolving from the Cisco OpenSOC Project. A cyber security application framework that provides organizations the ability to detect cyber anomalies and enable organizations to rapidly respond to identified anomalies

This product is the next-gen security analytics platform and spins 10 amazon large m4 machines as part of the installation. This product is only suitable for very large enterprises or Telco provides which generate a large amount of security data.


SOC Analyst

Don’t spend days looking at alerts created by rules when only a few alerts matter

SOC Investigator

Avata enables massive amounts of data to identify and triage anomalies

SOC Manager

Automatically create incidents/cases with integrated workflow systems

Forensic Investigator

“Just in time evidence collection response” transforms data in real-time

Security Platform Engineer

Single platform to manage and operate the ingestion, processing of cyber data

Security Data Scientist

Perform data science lifecycle activities, train, evaluate and score analytical models

Aloka: Service management and eHealth

Aloka provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. The product is useful for the below infrastructure service availability and eHealth

System Monitoring

Protocol Monitoring

Application Monitoring

Database Monitoring

Log Monitoring

Bandwidth Monitoring