Compliance

Advanced analytics is one of the biggest reasons many companies include Big Data technologies within their Cybersecurity arsenal. System Soft Technologies’ (SST) Security Intelligence and Analytics (SIA) Solution not only enables a platform for creating custom advanced analytics, but also includes a custom set of analytics for compliance with various regulatory requirements. This datasheet describes the Compliance Analytics Package and highlights the available reports.

Regulatory Compliance

Regulatory Compliance is on the top of everyone’s mind in this era of Cyber Security and the Internet of Things. More and More devices in the enterprise are connecting to the internet and more and more bad actors are appearing to disrupt the delicate environment that business find themselves operating in. These compliance regulations are indeed good for business but they include some serious development requirements and necessitate new roles to be created in the organization and new business processess as well. Gone are the days when your business would be robbed and you’d know it immediately. In this era, if could take a year or more for a breech to be discovered. If your organization is taking on compliance and requires a leader in the space to develop processes and help your team carrying forward, call on the compliance specialist at System Soft Technologies today to start a conversation about our Compliance Analytics Package.
System Soft Technologies’ SIA Compliance Analytics Package satisfies a subset of the following regulations:

  • HIPAA
  • SOX
  • FISMA
  • NIST 800-53
  • NIST 800-171

Compliance Analytics

System Soft Technologies’ SIA Compliance Analytics Package includes base dashboards and reports required by the regulations as highlighted below:

Dashboards

  • Event Summary
  • Investigation Reports
  • Administrative Account Activities
  • Privileged Commands Usage3
  • System Startups and Shutdown
  • Audit Message
  • User Logon and Logoff
  • User Account Added or Removed
  • Password Change or Reset
  • Security Objects Accessed and Delete
  • Network Monitoring


These dashboards and reports can be expanded, since System Soft Technologies’ solutions are all open source solutions, organizations can extend the solution to include activity in business-specific applications. For instance, healthcare companies could monitor patient lookups or financial companies can monitor transactions.

Data Sources

Highlights of the current supported sources for out of the box (OOTB) Compliance Analytics Package include:

  • Microsoft Windows Security
  • Microsoft Exchange
  • Cisco ASA
  • FireEye
  • WatchGuard
  • Palo Alto Network

Normalized Schema

Event specific views are used to map similar events from different log sources to normalize the schema. Use of event views ease development of new analytics and incorporate new log sources without modifying the OOTB Compliance Analytics. The following are highlights of the event based views:

  • User Login Successes or Failures
  • Password Change or Reset
  • Audit Message
  • Administration Activity
  • User Account Activity
  • Privileged Command Usage

Critical Thinking. Collaboration. Success.

Copyright ©2017 System Soft Technologies. All rights reserved.