logo

Teiren SIEM

Cloud Threat Detection Security Solution
Utilizing Graph DB


to gain a detailed understanding of our product's features and usage.

Dashboard

Get a comprehensive view and manage
the entire state of corporate security at a glance.

product-1

You can monitor the entire security status of your organization through a single dashboard page, including log collection status, instance operation status, and overall security management level.

You can monitor real-time threats.

Real-time graphs display usage metrics for CPU, memory, and network.

Integration

Integration
from cloud to on-premise products

product-1

You can easily and seamlessly integrate your cloud infrastructure by simply entering an API key.

By installing an agent, you can easily and seamlessly integrate your on-premise infrastructure.

Current Supported Systems

NCP, NHN Cloud, AWS, WinSecLog, Jiran Security Office Keeper, Genian(NAC), Windows, Linux. ETC

product-1

Log Management

Collection, storage, and management
of all enterprise logs

With Teiren SIEM, you can perform the collection, storage, and management
of all enterprise logs in a single solution.

product-1

Log Filtering

It provides an easy filtering (search) environment with built-in indexing, regular expressions, and more.

Log Collecting

You can collect vast amounts of log data from various cloud and on-premise products. The integrated log data can be viewed on the Teiren SIEM web interface in table format or as original JSON.

product-1

Threat Detection

Analyze logs to detect real-time hacking threats

Experience Teiren's unique threat detection technology utilizing Graph DB.

product-5

Dynamic Threat Detection

Threats can be detected based on the flow of various activities. While previously only one security policy could be set for a single activity, Teiren SIEM allows you to configure multiple security policies as a single set.

We provide an internally developed Dynamic Rule Set that addresses complex hacking scenarios. With the policies provided by Teiren, companies can achieve robust security without the need for complex analysis.

For example, security policies can be created based on sequences such as [more than five failed login attempts โ†’ successful login โ†’ database modification โ†’ database deletion].

product-1

Static Threat Detection

It follows the same method as traditional security policy configuration. Enhance your companyโ€™s security in a familiar environment.

We provide over 120 default security policies from Teiren, enabling robust company security without the need for complex analysis.

product-8

Threat Analytics

We provide data in a table format familiar to security experts, as shown above. When a hacking incident occurs, enjoy rapid analysis speeds powered by Teiren's Graph DB.

We extract only data related to hacking incidents, significantly reducing the time spent on extensive searches when an incident occurs.

Compliance Service

Manage everything with Teiren SIEM!

With Teiren SIEM, you can manage not only log management and threat detection
but also compliance requirementsโ€”all in one platform.

product-1

Compliance Services

It offers all the necessary features for security compliance, including asset management, evidence management, and automated compliance mapping.

Ensure your companyโ€™s security compliance with Teiren SIEM, without the need for multiple solutions.

Compliance Report

Our system performs regulation mapping and evidence capture, delivering results in report form. Reduce the evidence collection time from over two weeks to just two hours.

product-1

Why Teiren SIEM?

Using SIEM is not an optionโ€”it's a necessity.

SIEM has become essential, not optional,
for enhancing the efficiency of corporate security officers and ensuring compliance with legal requirements.

๐Ÿš€

Increased efficiency for security professionals

For skilled personnel like security officers, manually managing data from internal systems and various security devices, as well as analyzing related threats, is highly time-consuming and inefficient.

Teiren SIEM, which integrates logs across the entire system and manages security, enhances the efficiency of security officers and provides greater convenience.

๐Ÿง‘๐Ÿปโ€โš–

Compliance with Legal Requirements

Laws such as the Personal Information Security Standards, the Information and Communications Network Act, and GDPR specify the need for regular log inspections to maintain system stability and detect potential external attacks.

For companies expanding into Europe, GDPR applies regardless of company size, meaning even small and medium-sized businesses may require SIEM for log inspections and external attack detection.

๐Ÿšจ

Advanced Threat Detection

Teiren SIEM utilizes Graph DB to analyze relationships between logs, enabling more advanced threat detection.

Through system integration, comprehensive security management is possible with correlation analysis across the entire system and assets.

๐Ÿข

Applicable to all companies and organizations

Teiren SIEM supports infrastructure across the entire environment, including public cloud and on-premises infrastructure.

Teiren SIEM can be implemented not only by general companies but also by critical national information and communications infrastructure, allowing broader adoption across various organizations.

bg-2

Pricing

Select a SaaS license
tailored to your corporate environment

์›”/์—ฐ๊ฐ„ ๋ผ์ด์„ ์Šค ํ˜•ํƒœ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Basic
$8,620 /year
$790 / Month
Stores up to 1TB per month
Log Management
Threat Detection
Standard
$28725 /year
$2515 / Month
Stores up to 3TB per month
Log Management
Threat Detection
Compliance Service
Premium
Pricing adjustable upon request.
Pricing adjustable upon request.
Stores up to 5TB per month
Log Management
Threat Detection
Compliance Service
Customizing

Do you have any additional questions
about the license?

Contact โ†’
product-1

Use case

Threat Detection

Cloud Infrastructure Privilege Abuse

๎ˆƒAccording to CyberArk's research, employees typically have access to over 30 applications and accounts, with 52% of them able to access critical corporate data.๎ˆ„ ๎ˆƒAdditionally, 80% of organizations experienced misuse or abuse of business application access in 2022, highlighting the need for improved visibility into user sessions and activities.๎ˆ„

threat-detection

Attacks exploiting gaps in cloud infrastructure configurations are on the rise, making a safer and more rigorous security management setup essential. If an attacker successfully breaches weak security and gains access to the cloud environment, proper configurations are necessary to minimize potential damage.

Teiren provides its own recommended configurations for cloud infrastructure and IAM. For instance, in the event of actions such as stopping event logging, relaxing IAM password policies, or making instances publicly accessible, Teiren offers information on potential risks along with a remediation guide containing improvements and solutions.

threat-detection

With guidance on potential risks from weak configurations and step-by-step instructions for making adjustments in the cloud console or CLI, users can easily modify settings, enabling a more secure infrastructure setup.

Compliance Service

ISMS-P Compliance

Recent hacking incidents, ransomware infections, and data breaches have been occurring continuously, with attack methods becoming increasingly sophisticated. Additionally, with the adoption of cloud technologies, companies face a surge in events, leading to substantial losses from security incidents. As the importance of information and personal data protection grows, the need for a structured certification system has become evident, making ISMS-P (Information Security and Personal Information Protection Management System) certification increasingly essential.

The ISMS-P certification is a system in which a certification body assesses and certifies that an organizationโ€™s set of measures and activities for ensuring the stability of the information and communications network and protecting personal information meets the certification standards. It is based on three categories: establishing and operating a management system, protection measure requirements, and requirements for each stage of personal information processing.

threat-detection
logo

Teiren Co., Ltd.

CEO : Liz Kim (SungYeon Kim)

Contact Number : (+82) 010-6539-2122

E-mail : liz0904@teiren.io

501, 474 Gwangnaru-ro, Gwangjin-gu, Seoul (Gwangjin Economy Hub Center, Kiwoom Hall, Teiren)